A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Fraudulent login attempts exceeded a million per day and made up over 90% of the traffic to the login URL. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. The Fortune 500 retailer deployed the Shape solution and completely eliminated account hijackings.
A Fortune 500 retailer sought out Shape after their WAF, IP reputation feeds, rate limits, and other defensive measures failed to stop credential stuffing attacks. Attackers used botnets, automated account checkers, and web proxies to defeat security measures. At peak, the attacks on the retailer web application involved over 100,000 new IPs that were used once, and never again. Some of the attackers also mimicked browser, or browser agent behavior to simulate human visitor behavior.
Attackers acquired spilled credentials from the open web (criminal marketplaces and password dump sites).
Attackers tested credentials, using distributed bots, web proxies, and other tactics to evade defense.
accounts when the
credentials were valid.
Attackers sold gift cards via secondary markets such as eBay and Raise.com, for
85-90% of their value.
Following a successful initial deployment, the Fortune 500 retailer is rolling Shape out to protect additional web applications and API services used by mobile applications. The retailer has eliminated $10s of millions in fraudulent transactions and chargeback fees. The retailer also benefits on an ongoing basis from threat intelligence (collected and correlated across all Shape deployments) and consultation provided by Shape’s anti-automation experts to stay ahead of cybercriminals.