Online fraud is serious business, with U.S. consumers losing $5.8B to fraud in 2021. That’s a 70% increase over 2020.1 One in 20 Americans were victims of fraud in 2021, with account takeover fraud and new account fraud seeing huge increases over previous years.2
Why has online fraud become so severe? Changes in consumer behavior, such as a rise in online shopping along with greater adoption of digital payments, have provided more targets for fraud. Buy Now, Pay Later has also become increasingly popular, growing by 300% per year since 2018.3 Experian predicts this will be a major fraud target, as criminals use stolen or fictional identities to buy items without paying.
Criminals are also using technology to their advantage, employing bots and malware to bypass security measures. They change tactics to evade detection, even resorting to manual effort to get around anti-automation measures. And while organizations try to implement steps to stop fraud, often those measures are an inconvenience for customers.
Businesses are struggling to respond to these attacks. A KPMG survey found that more than half of organizations surveyed said the shift to remote work made it harder to detect and respond to fraud.4 Existing silos between fraud prevention and security teams have been exacerbated by remote work. When these teams don’t collaborate, it’s harder—if not impossible—to identify an attack in time to respond effectively.
Security and fraud teams must work together with integrated tools and processes to successfully prevent online fraud while maintaining a positive customer experience. This convergence requires stakeholder collaboration to share information, data, and intelligence, eventually moving to a fully integrated model where security and fraud are aligned under a single organizational structure.
In addition to coordination between security and fraud teams, fraud prevention requires a multi-pronged approach to thwart attackers.
1. Prevent account takeovers
ATO fraud is common due to breached information like passwords and other Personally Identifiable Information (PII) available on the Dark Web. It can be difficult to know an account has been compromised unless there’s unusual activity or a vigilant customer who notices something is wrong. However, real-time monitoring and machine learning can identify suspicious activity immediately to stop ATO fraud, whether it’s caused by credential stuffing or manual attacks.
2. Mitigate bots and abuse
Bots and automated attacks are often the first approach for attackers, due to the low cost and effort. They can also be used for reconnaissance to allow criminals to retool their attacks. Security needs to both respond and adapt to evolving bot attacks to prevent losses. With AI, bots can be identified and blocked without adding friction for genuine users.
3. Stop human-driven fraud
If automation such as bots are unsuccessful, attackers often move to either emulate human behavior using machines or fully manual attacks. Multi-factor authentication is often used to verify identity, but it can frustrate users. AI can be used to determine whether someone trying to access an account is who they claim to be and verify their intent. This provides a better customer experience and can provide intelligence to business leaders for further optimization.
Prevent Online Fraud with F5 Running on Google Cloud
F5 solutions use custom AI, machine learning, and real-time monitoring to prevent online fraud. F5 Distributed Cloud Bot Defense protects against bot-based attacks such as credential stuffing and fake accounts, using AI to respond to retooling. Distributed Cloud Bot Defense is a managed service that prevents bot attacks, blocks account takeovers, and identifies fake users in real time. Distributed Cloud Account Protection uses AI to predict instances of fraud along the customer journey while slashing friction for legitimate consumers by up to 90%.
Google Cloud is a flexible, secure cloud provider that embraces open source, making it an excellent platform to migrate infrastructure and modernize applications. It’s also multi-cloud friendly, providing capabilities around Kubernetes as well as big data and analytics. Google Cloud has always prioritized security; the platform’s strong security and cutting-edge encryption allow companies to safely store and analyze sensitive personally identifiable information.
F5 running on Google Cloud can help you defend against bots, authenticate with intelligence to reduce user friction, and protect user accounts. Closed-loop AI trained on verified human data combined with a secure cloud provider means you can reduce fraud without sacrificing the user experience.
Sources:
1 FTC, “New Data Shows FTC Received 2.8 Million Fraud Reports from Consumers in 2021,” Feb
2022
2 Javelin, “2022 Identity Fraud Study: The Virtual Battleground,” Mar 2022
3 Experian, “Experian Launches 2022 Future of Fraud Forecast,” Jan 2022
4 KPMG, “A triple threat across the Americas: KPMG 2022 Fraud Outlook,” Jan 2022
About the Author
Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.
F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
Volterra and the Power of the Distributed Cloud (Video)
How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.