How to fulfill PSD2 requirements without causing buyers friction during online purchases?

When discussing PSD2 requirements, most stakeholders will have Strong Customer Authentication (SCA) in mind. SCA involves authentication methods that are more advanced than the old-fashioned static PINs and passwords. But this comes with a cost. SCA implementation is much more complex for payment service providers, as well as for the end-user. It requires additional actions on their side, such as a downloaded mobile token, supported biometrics, retyping OTPs, and more.

Yes, PSD2 requirements advocate Strong Customer Authentication, but what does that really mean for the stakeholders? SCA demands authorization which involves two out of three secure elements, namely: possession, knowledge, and inherence. Regardless of the methods chosen, PSD2 brought another tool to increase security measures as well as improve the end-user experience: Risk-Based Authentication. PSD2 makes it clear that the strength of authentication should correspond to the level of risk for a given transaction.

Utilize predefined PSD2 requirements and RTS exemptions

PSD2 requirements and corresponding Regulatory Technical Standards on Strong Customer Authentication specify that SCA exemptions are applicable. The prerequisite to applying any of the exempted scenarios is to conduct a transaction risk analysis. TRA rates a transaction either high, medium, or low risk. Such analysis can be as simple as a Low-Value Payment which presumes that transactions below 30 EUR, even in cases of fraud, pose a low risk and low financial impact.

For non-low-value payment transactions, a more sophisticated risk scoring approach is necessary on the issuer side. Mentioned risk analysis should consider the usual end-user behavior, their habits, channels, and devices they use, common geolocation, known delivery addresses, and more. On the other hand, issuers also need to track relevant merchants, meaning their fraud rate, blacklists, risky currencies, etc. As expected, sophisticated risk analysis requires advanced risk scoring solutions.

PSD2 requirements move liability to the acquirer and merchant

The main issuer's concerns are fraud costs and chargeback liability. With 3D Secure 2, acquirers and merchants shift liability to the issuer side. Therefore, issuing banks favor SCA for apparent reasons. It protects them and the cardholders from a wide range of fraudulent online payment activities.

Since merchants are much more fond of frictionless transactions than issuers, PSD2 requirements and the recent 3D Secure protocol enable merchants and acquirers to communicate their authentication preferences in the 3DS transaction flow. However, this does not mean that the authentication is invalid. Merchants who opt for this approach trust that the authentication is valid if they sign in to the merchant's web or mobile shop; i.e. the buyer authenticates during login to the web or mobile shop. This is not Strong Customer Authentication. Still, taking into account transaction amount, common delivery address, type of purchased goods or services, used card data; which is usually visible in the webshop; hopefully following the PCI DSS rules; merchants can be quite sure that the buyer is not a fraudster. Demanding additional authentication by the issuer usually makes end-users irritated and unsatisfied with the lengthy transaction authentication process.

Additionally, if the issuer approves an SCA transaction based on the merchant exemption, in case of fraud, merchant is the one that takes the liability for chargeback costs.

Give the buyer a choice

Different regions, merchants, and goods and services result in different buyer preferences when it comes to SCA or SCA exemption. The best option is to let the buyers decide for themselves. With the introduction of Trusted Merchant Listing in 3D Secure 2.1, which is additionally enhanced in 3D Secure 2.2, buyers are able to choose trusted merchants in order to avoid SCA. Prior, issuing bank analyzed eligible merchants and listed them to be included in the SCA exemption. Contrary to Merchant exemption preference, liability shift for fraud costs and chargebacks moves to the issuer side. To minimize this risk, Merchant Whitelist eligible candidates also need a risk assessment. This is done by using advanced risk scoring solutions regarding the merchant fraud rate.

No exemption? Use biometrics

Biometry is the most applicable, most user-friendly, and the most secure authentication method when talking about 3D Secure authentication in online payments. This is recognized by card schemes, as MC and VISA introduced KPIs for issuers to measure biometry authentication rates. As Juniper research states, already in 2019, facial recognition software was deployed on around 96 million mobiles, forecasting that biometric facial recognition will be present in 90% of smartphones by 2024, making biometric authentication widely applicable. Implementation of biometry solves Dynamic linking as required by PSD2. In the end, applying biometrics is extremely fast and straightforward when combined with push notification during online payment authentication.

eBook: Leveraging the full potential of payment data

ASEE provides actionable advice on how to confront the high cart abandonment rates for mobile, as well as provides the tools that have the capacity to address other mCommerce challenges.

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Top 7 IoT device security issues: Smart things, smarter fraud

The number of IoT connected devices in 2019 was 7.74 billion. The forecasted figure for 2025 will (more than) double, reaching 16.44 billion devices. We are talking about a heavily used technology, coming in all shapes and sizes, with limited regulation and standards bound to it. Lack of security awareness by both end-users and manufacturers should raise alarm bells.

What are IoT devices?

Let's start by splitting the term ''Internet of Things'' into sections to better understand what we're dealing with. The ''things'' are the IoT devices, and the Internet is – well, the Internet. Since IoT devices come in all shapes and sizes, offering a multitude of individual solutions for specific use cases, commonly up to a few functionalities per device, the IoT environment is as diverse as it gets.

The Internet of Things (IoT) describes the network of physical objects—“things”— embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. These devices range from ordinary household objects to sophisticated industrial tools. - Oracle 

One of the most familiar examples would be Smart Homes, showcasing the power of IoT and its accessibility. With an application in charge of your Smart Home system, you're able to manage your smart locks, check up on your surveillance system, adjust the temperature in each individual room, and more. There are also portable IoT devices, Smart Watches being the first thing that pops up in pretty much anyone's mind.

eBook: Is your app
among prime targets?

By now, you have an idea of how broad the IoT industry is. It includes every software, gadget, sensor, etc., with the capacity to connect to the Internet network. Although diversity is a good thing, in this case, the lack of standardization of security protocols and demand so high, resulting in manufacturer's focus solely on faster time to market, the IoT poses a significant threat to both your physical and informational security.

IoT device security challenges

The IoT movement unveiled new ways of interacting with the Internet. It's no longer just us, humans; devices are using it too, 24/7 to be exact. This means that there is no way to monitor how the device interacts with the Internet unless there is another machine in play. This constant communication between the device and the internet is present because much of the concept designed around a particular IoT device relies on real-time responses, monitoring, and other functionalities.

If a thermostat receives information that the room temperature is lower than the one stated in the custom settings, it will react in real-time and adjust it accordingly. Your Smart Watch is ''watching'' you at all times, reminding you to take a stroll after an hour of sitting in the same spot. Like we said, without constant connection and exchange of data, much (if not all) of the IoT functionalities are useless.

This unsupervised flow of information exchanged by the IoT device is causing trouble for cyber security experts since the technology is being pushed onto the market with loose security standards. Regarding that, the IoT is not yet in its mature stage. Known and emerging challenges need to be resolved. This includes both the secure by design principle from the manufacturers, as well as building user awareness about the security issues.

The top challenges concerning IoT device security are the following:

Common IoT attacks

An article by ChannelFutures lists some of the most common IoT attacks, and this is the breakdown:

Privilege escalation

Known IoT device bugs, design issues, and OS oversights are exploited by attackers in order to gain access to data that is usually protected from an application or the user.

Eavesdropping

Network interception in case of an unsecured connection between the IoT device and the network is used for stealing sensitive information.

Brute-force password attacks

Since most IoT device passwords are weak, brute force attacks are a successful method of gaining access to the device.

Firmware hijacking

In case a firmware update coping from a source that is not legitimate is downloaded to the IoT device, the attacker is able to hijack the device and download malware.

Denial-of-Service attacks

DoS attacks are a popular way for hackers to put an entire company offline or gain access to sensitive information. DoS is notorious because of its presence in IoT related attacks.

Physical tampering

When devices deployed in an environment where control management and access to the device is difficult to supervise, physical tampering is a serious threat. For example, company printers can spread malware, endangering the entire company network.

Top 7 IoT device security issues

The IoT industry is only getting bigger, and so is the number of issues that come with it. The key to successful adoption is to understand repercussions and minimize any known IoT device security issues.

1. IoT Users are oblivious, and nobody seems to care

We're used to managing our account passwords and taking care of our email accounts, successfully ignoring phishing attacks and spam. But what about our IoT devices? As we're dealing with emerging technology, we are still unaware of the amount of sensitive and potentially valuable information stored within our gadgets. Social engineering attacks are a popular way for hackers to gain access to that information by targeting the user instead of the device. Doing so through our unexplored, brand new IoT device seems to be a very logical first step.

2. IoT Manufacturers are turning a blind eye to compliance matters

Each day brings a brand new IoT device on the market, which translates to a number of undiscovered IoT device security issues. Lack of compliance caused by manufaturers rushing to launch the next big thing is the primary source of emerging security issues. Furthermore, when implementing the ''secure by design'' principle, they always seem to overlook the ''secure'' part. When developing a new IoT device, manufacturers should avoid bad practices, including weak or hardcoded passwords, lack of security best practices, OS issues, and insecure data storage and transfer.

3. An army of bots

If a single IoT device is infected with malware, the threat lies there, with one user. But when there is a larger number of infected devices, creating an army of bots, entire systems and networks are endangered. Take a quick trip to 2016 and revisit the Mirai botnet incident. Since IoT device security is not at its peak, the devices are an easy target for hackers, which is later used as a weapon. An army of bots is able to send out huge amounts of traffic; causing system failures that result in potential threats to a large group of individuals.

4. Overlooked IoT device security updates

Who is to blame? Both manufacturers and end-users. A common scenario when purchasing an IoT device is that it comes with the latest software update and never lives to another update – ever. This is because manufacturers allow the use of the IoT device without the latest update. Also, the update process differs from the one on your smartphone – maybe there is no notification or automatic updates. And let's be real, would you remember to check whether your smart lightbulb is up-to-date with the latest version? Yeah, me neither.

5. Eavesdropping and espionage

Taking control over the surveillance system often results in a ransom requests. Invading the user's privacy is also followed by theft of sensitive information. But the shivers you would get the moment after walking into your home knowing you had a recent IoT device security incident is probably the most frightening. To combat this issue, some IoT devices are being banned due to insufficient security measures and assumptions they might be a threat to a user or a larger group of people. Take the ''Cayla doll'' as a prime example of a seemingly unsuspecting smart toy; presumably recording and storing voiceprints of the entire household at all times.

6. IoT device security issues in healthcare

IoT made great breakthroughs in the healthcare department. Real-time monitoring of your patients with a pacemaker from the comfort of their home is a real success story. On the other hand, tampering with IoT in healthcare could lead to devastating consequences. Imagine the repercussions of an infected IoT device handling insulin shots for a diabetic. The same thing applies to stealing and altering patients' medical records. 

7. Physical protection concerns around IoT device security

IoT devices that can't be stored at a secure location are exposed to physical attacks. For example, a smart surveillance system's memory card has easy access. The consequences vary from unauthorized access to sensitive information to blackmail.

IoT device security and consequences

The above mentioned IoT device security issues and threats are frightening enough on their own, but the most concerning part are the actual consequences. The diverse nature of IoT devices and their presence in both the virtual and physical world generate unpredictable results; sometimes positive, sometimes negative. If we take the industrial use of IoT, consequences range from minor power outages, financial losses to reputational damages. Following this, the healthcare industry is no exception to those threats. Smart homes, filled with smart appliances, are proving to pose both physical and informational threats, leaving us with consequences that are extremely hard to get over.

However, IoT devices are not here to raise havoc but to make our everyday tasks easier. As with all emerging technologies, it is our responsibility to design them and use them with caution. This includes implementing security measures and protocols that eliminate any known IoT device security issues; as well as being on the lookout for emerging threats and thinking critically before jumping into our new project.

How ASEE fits in?

Any IoT device managed through a mobile application is vulnerable to an additional set of threats – mobile app security threats. In order to unlock your smart door, you'd use a designated mobile app to do so. To gain a more in-depth insight of your workout supervised by your smart watch, you'd grab your smartphone and check your workout history in-app.

 To combat known and emerging threats, ASEE developed a solution with mobile application security in mind, App Protector. By integrating our solution with your mobile application, you are enabling the detection and prevention of mobile app security threats in real-time. This includes hooking attacks, jalibreak/root and emulator detection, screen recording and debugging. Make the security of your mobile application and its users a priority, not an afterthought. Find out more about why mobile app security has become imperative in today's mobile-first environment.

eBook: Is your app among prime targets?

Find out which vulnerabilities and threats are typical for gaming, smart home, IoT, healthcare, and fintech industries and how to protect your mobile application with high-level security mechanisms.

eBook: Is your app among prime targets?

To find out more about our App Protector solution, contact us or visit our blog section.  

Mobile app statistics to keep an eye on in 2024

Let's crunch some numbers with the help of buildfire's mobile app stats for 2024. As of today, we have 6.3 billion smartphone users. An average smartphone user has around 80 apps installed on their phone. The fact that more than 60% of those apps remain untouched after the initial login/use makes the following conclusion even more concerning. Now, if we multiply those two numbers, we get the total for the surface on which mobile app attackers can operate. You're curious about the total, right? That's 504 billion opportunities for hackers to harm the end-user, company brand, or developer's reputation. It's time to talk about mobile app security.  

What is mobile app security? 

Mobile app security is a measure for preventing malicious use of mobile applications through various types of attacks. With the ongoing growth of available mobile applications, mobile app security has become imperative in today's mobile-first economy. The average app user might not be showing much concern about the security of their applications. However, developers agree on one thing. The standard smartphone operating system platforms alone do not offer sufficient security.  

To get the point across, let's look at some relevant stats

''Mobile application security must be a proactive measure, not an afterthought.'' 

That is why the focus is shifting toward safeguarding mobile applications in a way that does not disturb the look and feel of the application in question. Being able to both detect and prevent mobile application attacks in real-time is the end goal.  

Importance of mobile app security 

To understand the weight of how important mobile application security is today, you need to be aware of the consequences that come with unsecured apps. As we already mentioned, the potential for hackers is vast. There is a number of applications out there offering little to no security when it comes to protecting the end-users and their data.  

eBook: Mobile application security toolkit

We're going to take mobile banking applications as a prime example for a potential hacker attack. What's in it for the hacker? Loads of good stuff; client personal data including email, phone number, home address, credit card numbers, bank account numbers. The attacker can make illicit transfers, tamper with the rightful owner's account in many ways. That is, if we are talking about a targeted attack on an individual. What happens when the target is not the client but the bank itself? Picture this. A hacker is able to surpass the security of an mBanking application. He then gains access to a couple hundred thousand customers' sensitive information. What follows is blackmail, demanding ransom from the bank in order to keep quiet about the bank's security issue. That is just one out of numerous scenarios happening when it comes to insufficient mobile app security. 

And we're not talking about an extreme case here. Company brand image and developer reputation are common targets by attackers by using end user accounts to tamper with the application. This is why mobile app security must be the focus of the entire application development lifecycle, not an afterthought.  

Mobile app security threats 

Without implementing any form of mobile app security, your app is vulnerable to reverse engineering attacks and is prone to manipulation Take a look at the most common mobile security threat that you should keep an eye on:  

Poor data encryption

In case your app is storing sensitive data in a local file without encryption, it's time to switch things up. Encrypt those data and use Keychain (iOS) or Keystore (Android) for storing decryption keys.  

Vulnerable OSs

Hackers are up to date with all of the loopholes in the operating systems in order to tamper with them. Make sure that your operating system is always up to date with the latest version.  

Reverse engineering 

In simple terms, reverse engineering, in this case, is application development, only backward. Hackers often disassemble apps piece by piece in order to understand the algorithms and workflows, followed by exploiting detected vulnerabilities.  

Mobile app attacks  

Rooting or jailbreaking your device puts your smartphone at high risk. This is because the default OS security measures can be easily removed. Your phone won't be able to recognize if an app from an unsecured source is being installed. Exact copies of an original app developed by hackers, injected with malware, can steal data contained on your phone.  

Furthermore, fraudsters are getting pretty creative throughout the years when coming up with new or transforming old hacker attacks targeting mobile apps. These include the previously mentioned jailbreaking/rooting, debugging, hooking, screen recording, emulator attacks, and others.  

Mobile app security ft. RASP 

RASP, short for Runtime Application Self-Protection, is a technology developed with mobile application security in mind. When the app is up and running, so is RASP. RASP protects mobile applications from various types of malicious attacks in real-time by both detection and prevention. Most RASP-based security systems have the following responses to potential attacks: notifying the user, notifying the server, or terminating the application in use. Depending on the risk level of a detected attack, applications with integrated RASP technology will respond accordingly. Also, by implementing RASP, you are not affecting the design or the performance of the application whatsoever. Everything remains the same, except for the added layer of security provided by RASP technology.  

By collecting data which is showcasing the ''normal'' behavior of the app and its users, advanced RASP versions are able to develop patterns and decide which ones are out of the ordinary. Meaning, some type of fraud. This data includes typical information such as IP address, device type, geolocation but also takes into consideration advanced data, including whether the device is jailbroken or rooted. RASP has insight into application logic, configuration, and event flows. This makes it highly successful at detecting both known and emerging fraud.  

How does App Protector fit in? 

App Protector is a security technology integrated into the application runtime environment, capable of controlling application execution, detecting early intrusion, and preventing real-time attacks. The end goal of App Protector is to protect all of the application's stakeholders; owners, developers, and the app's end-users.  

App Protector detects threats present within the device on which the application is installed, alerts, and neutralizes those threats. If an anomaly is detected, App Protector responds in one out of three ways:  

It comes in two modes: offline and online. Offline mode offers configuration which is hardcoded, while the online mode comes with a portal enabling configuration customization in the form of selecting a wanted response for the individual security threat. App Protector is successful at detecting and preventing mobile app threats, including jailbreaking/rooting, debugging, emulator attacks, hooking, and screen recording (for iOS).  

passwordless authentication

eBook: Mobile application security toolkit

Learn more about mobile security threats landscape and what are the three key pillars of anti-tampering for mobile. A detailed look at code obfuscation, integrity checking and Runtime Application Self-Protection (RASP).

eBook: Mobile application security toolkit

To find out more about our App Protector solution, contact us or visit our blog section.  

What is debugging and how do hackers use debuggers to compromise your mobile application?

When software behaves in an unexpected manner or crashes without any external factors, it's time to do some debugging. Debugging is the process of revealing and resolving errors and issues, called ''bugs'', within software, systems, mobile applications, and other.

What is debugging? 

It is an exceptionally demanding task, requiring focus and a great amount of patience. In some cases, debugging takes more time than coding a program from scratch. Why is that so? Well, with complex software structures, one component is dependent on another component, or even a couple of them. That means that a bug in a single component indirectly affects numerous other lines of code that need to be revisited and adjusted accordingly. 

Try App Protector Free

To aid them in the debugging process, programmers use debuggers. A debugger is a tool that enables you to view the application code while it is running. You can stop the execution of the program, analyze variable values, execute the program in steps (line after line), set breakpoints on specific lines which stop the execution, and more. This detailed view of the code in its running mode enables you to understand flows and application logic, as well as to detect errors within the code. 

Debugging process 

Upon detecting an issue causing the application to run in an unexpected manner, the debugging process goes as follows: 

  1. Reproduce the bug before making any changes within the code. Always. 

Reacting on the basis of a problem description often results in an issue greater than the one you started with. Fixing a single line of code might affect other functionalities that are not obvious at first. Make sure that you are able to reproduce the bug and save yourself from the trouble of revisiting the code all over again. 

  1. Collect info for a detailed bug description. 

More information means narrowing down the error area, as well as eliminating additional issues arising from the bug fix.  

  1. Use a debugger. 

Help yourself and use a debugger to aid you in the debugging process.  

  1. Bug snapshot. 

Capture the program when the bug appears. Make sure to get all of the variable values and states at the spot. 

  1. Analyze the snapshot. 

Based on the snapshot, analyze the values and try to reveal the cause of the issue. 

  1. Fix the bug. 

Fix the bug and make sure that your bug fix does not affect any other lines of code, resulting in a new bug.   

Debugging approaches 

There are a couple of debugging approaches, and here are the most popular ones adopted by developers: 

Despite the general inefficiency and low success rates, debugging by brute force is the most popular method among programmers. According to O'Riley, there are at least three categories when discussing the brute force method; debugging with a storage dump, debugging according to the common suggestion to ''scatter print statements throughout your program'', and debugging with automated debugging tools. 

This approach is based on deduction. Your starting point is where the program showcases the incorrect result. From there, you build your solution backward in order to reveal which variables are causing the trouble. 

A number of hypotheses are developed in connection to the occurring bug, followed by creating a list of possible causes. This is followed by testing each of the listed possible causes and, finally, the elimination process. Another name for the cause elimination method is the induction and deduction method. 

Program slicing is based on taking a group of program statements and testing conditions at a particular point of interest. It is a simplified and less time-consuming approach to debugging.  

Mobile app debuggers with malicious intentions 

From the above introduction to debugging and debuggers, by now, you should be able to see how there's also room for malicious practices. Debugging and debuggers enable the user to get insight into the application logic. If someone with bad intentions and a sufficient amount of programming knowledge decides to misuse a mobile application, they can easily use debuggers to achieve their goals. 

Debuggers and reverse engineering 

Debuggers come in handy when practicing reverse engineering. In terms of software and cybersecurity, reverse engineering is the process of disassembling a piece of software, followed by a thorough analysis of its functions and logic in order to fully understand its behavior. 

You can see how things can go south when a person with malicious intentions, the right tools, and enough knowledge decides to tamper with an app. Debugging allows you to see the app from the inside understand application logic and flows. This knowledge assists the attacker with designing an imitation app containing a piece of malicious code. From there, there is a number of possibilities to tamper with the app, from individual attacks to data breaches. 

What's also of interest for the attacker are the logging levels. Debuggers provide insight into debug log levels containing information necessary for diagnosing issues, troubleshooting, or running an application in the test environment. It contains more granular information, the kind you wouldn't need in the usual production environment. By providing detailed diagnostic information about the application flows and logic, debug log level can prove to be a very useful resource for an attacker. 

Debugging detection and prevention 

Although the initial idea of debuggers is a safe haven when fixing occurring bugs, malicious use has been around for quite a while. When talking about mobile application security, App Protector is a safe haven that safeguards your app from various types of threats, including debuggers. By integrating App Protector into your mobile application's runtime environment, you are ensuring detection and prevention of the following threats

If an anomaly in the application's behavior is detected, App Protector responds in one out of three ways:  

  1. Notifies the app's end-user about a potential threat, suggesting to uninstall the application. 
  1. Sends a notification to the server, resulting in immediate application termination. 
  1. Generates false values, hindering the attacker from further misuse.  

By implementing App Protector, the look and feel of the original mobile application remain intact. However, the security levels are significantly increased, protecting your application and its end-users.  

App Protector Free SDK

Download App Protector SDK

App Protector SDK is a mobile security component built into the application's code enabling runtime protection as well as a variety of mobile application hardening techniques, including jailbreak detection.

Try App Protector Free

To find out more about our App Protector solution, contact us or visit our blog section.  

How implementing 3D Secure 2 ensures ultimate security without compromising user experience?

When discussing heightened security measures regarding online payment security, it is very important to take the customer's online shopping journey into account. Making a transaction more secure without interfering with User Experience is a challenge, but 3D Secure 2 ensures exactly that, maximum security alongside smooth user experience.

To provide mentioned features, some actions need to be performed on the issuer domain; such as transaction risk analysis and risk scoring. These are the foundations of the so-called frictionless flow, which grants online payment security without disrupting the user experience. Furthermore, to make the risk assessment even more precise, KYC (Know Your Customer) checks on the merchant side can also apply. To get valuable insight into how 3D Secure tackled this challenge, keep reading.

Transaction authentication flow

During the main task of authenticating the buyer, 3D Secure 2 does not only rely on direct Customer Authentication using solely something that the buyers own or have in their possession. A strong focus is on banks knowing their customers, who are the actual buyers, during the transaction processes. This analysis looks at the customer's purchase and payment behavior patterns. It identifies deviations from this behavior pattern, which will result in additional authentication.

eBook: Leveraging the full potential of payment data

The so-called frictionless flow introduced by 3D Secure 2, but the final results depend on the risk score and fraud analysis tools used in the transaction risk analysis and monitoring process. When the risk scoring system at the issuer side recognizes the buyers' behavior; such as the buyers using the same device they usually use the same IoS version, using IP address lookups, and additionally transaction amount not exceeding the average spending amounts; the issuer does not need to ask the buyers for additional authentication. The risk scoring system conducted by the issuing bank should also consider merchant information within the transaction taking place. This includes the merchant's security background and historical fraud rate to make risk assessment more precise.

User experience results

The User Experience (UX) with 3D Secure will look similar to transactions without 3D Secure for the buyers or payees. However, it'll include a much higher security level, preventing fraudsters from making transactions with the payee's lost or stolen cards. Banks still hesitate about the benefits of frictionless transactions. As shown by Ravelin: only 10% or less of all transactions are frictionless. For comparison, with standard authentication, the average time to authenticate the buyer is about 37 seconds. Frictionless flow it takes as much as 5 seconds; providing a smooth user experience and reducing shopping cart abandonment rate due to the simplified checkout process.

eBook: Leveraging the full potential of payment data

ASEE provides actionable advice on how to confront the high cart abandonment rates for mobile, as well as provides the tools that have the capacity to address other mCommerce challenges.

eBook: Leveraging the full potential of payment data

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Mobile application hooking opening doors for app manipulation 

What is Hooking? 

Hooking covers a wide range of code modification methods aimed at altering the behavior of the mobile application in question. This is done by intercepting function calls, messages, or events passed between the software components. The code used for function interception is called a hook. It applies to changing the behavior of operating systems and mentioned software components as well.  

Legit use cases of code hooking include extending functionality and debugging. But of course, we are here to talk about the malicious side of code hooking, which has caused headaches on many occasions. Generally speaking, there are two hooking methods to be aware of, source modification and runtime modification.  

Both methods have the same end goal, app manipulation. However, the difference is in the timing. With source modification, the attacker inserts a hook before the application is in runtime by altering the library source through reverse engineering. Runtime modification, as the names states, includes inserting a hook while the application is running.  

Easy access to hooking tools 

What makes code hooking even more attractive is the high availability of tools for injecting and executing malicious code. Frida, a free, dynamic instrumentation toolkit enabling software professionals to execute their own code in traditionally locked software, opens doors to malicious practices. Even though the tool's intended use is to aid developers, pen-testers, and security researchers, bad actors are present as well. 

App Protector Free SDK

Download App Protector SDK

App Protector SDK is a mobile security component built into the application's code enabling runtime protection as well as a variety of mobile application hardening techniques, including jailbreak detection.

Try App Protector Free

Cybercriminals, black hats, and other fraudsters are able to compromise mobile applications, inject malicious code, and alter the mobile application's behavior/logic in a malicious manner. By combining Frida and hooking,  the bad guys are able to design application experiences that have the look and feel of the original application. These types of attacks usually aim at applications that have established a certain amount of trust with their users. The trick is not to make the user doubt their next step within the application. And that is how a successful mobile application attack is executed.  

Consequences of code hooking 

By injecting a malicious piece of code, the attacker is altering the application logic and changing its behavior. Hooking is a common tool for Man-in-the-Middle attacks (MitM), where the fraudster attempts to intercept the communication between the sender and the receiver of the message.  

Let's take a look at a simple example to get the idea of how hooking can cause damage in a real-life scenario. MitM attacks involve three actors. The communicator – a person who is sending the information; the receiver – a person to which the communicator is attempting to send the information; and the middleman – a person intercepting the communication.  

Our good actors are Alice, the communicator, and Bob, the receiver. Alice owes Bob $20 and wants to settle her debt. She logs in to her mBanking account and fills out all the necessary information to transfer the $20 to Bob; first name, last name, account number, and other details. Upon pressing the send button, Alice is not aware of Frank – the bad actor. Frank hooked the application and changed all of the vital details of the transaction in the background to receive the $20. Alice is not aware of this, and Bob is a few bucks short.  

Is there a cure?  

App Protector is a security solution with a Mobile-first mindset. Covering various types of mobile application security threats, providing both detection and prevention of real-time attacks, App Protector safeguards your mobile application and its users from malicious practices.  

Upon detecting any type of anomaly and unusual application behavior, App Protector neutralizes the potential attack by either notifying the end-user about a suspected misuse or terminating the application at once. App Protector is able to detect whether an application is under a hooking attack, running on emulator or debugger, and jailbroken/rooted.  

Online mode enables the customization of threat responses. Also, it includes an admin portal used for a tailored approach for a specific mobile application security threat. Offline mode offers a hardcoded configuration where the selection of threat responses is not available.  

By integrating App Protector with your mobile application, you won't see any changes in the design of your application nor in the application logic. You're only ensuring an additional level of security, safeguarding your mobile application and the end-users. 

App Protector Free SDK

Download App Protector SDK

App Protector SDK is a mobile security component built into the application's code enabling runtime protection as well as a variety of mobile application hardening techniques, including jailbreak detection.

Try App Protector Free

To find out more about our App Protector solution, contact us or visit our blog section.  

Mobile Emulators Fraud: How to protect your applications?

Mobile emulators, besides their original use cases, have become a tool used by hackers for targeting mobile applications. By allowing access to multiple devices and apps at once, they have proven to be a successful method of bypassing authentication and rule-based security measures. To find out what cybersecurity experts are dealing with at the moment, keep on reading!

What are mobile emulators?  

Mobile emulators are tools designed for running tests on mobile devices using desktop computers, particularly useful when it comes to testing mobile applications. They allow developers to simulate, imitate, and optimize mobile app software and hardware behavior without the need to use multiple types of devices.  
 
A great part of the mobile emulator utility is making the design of the application responsive. Mobile applications need to work well on different types of mobile operating systems and interfaces, which includes factors such as different screen resolutions. You can emulate any device type, model, manufacturer, screen, location, touch screen taps, and swipes – all without possessing a physical device.  

Try App Protector Free


Emulators are a cheaper and more efficient way of developing mobile software because they offer scale. There is no need to test on various types of devices. By using an emulator, you are set up for success because of its accessibility, time efficiency, and ease of use.  
 
Unfortunately, with mobile emulators being within such an easy reach, the technology is also used for illegal practices

Role of mobile emulators within mobile fraud 

When given to the hands of an attacker, mobile emulators are able to cause a great amount of damage. Victims include all of the mobile app stakeholders: app owners, developers, and end-users. Widespread use of mobile emulators among hackers makes a lot of sense since it enables them to run large-scale attacks directly from their desktops.  
 
Here are some common use cases for mobile emulators regarding mobile fraud: 

Furthermore, the traditional rule-based security platforms can be easily bypassed with the use of a mobile emulator. In case an emulated instance of a device ID is blacklisted, the attacker simply discards it and creates a new one.  


With the evolving security technology, attackers are evolving as well. Their attacks are getting more and more sophisticated by the minute, demanding the full attention of cybersecurity experts. To get an idea of how sophisticated these hackers are nowadays, find out what happens when a group of organized hackers walks into a bar and finds 20 emulators.

Mobile emulators went rogue: Evil Mobile Emulator Farms 

We have to mention the infamous fraud operation that used mobile emulators as its weapon of choice to commit fraud on a never before seen scale. The name of the operation, Evil Mobile Emulator Farms. Researchers from IBM Trusteer have detected a fraud operation that used mobile device emulators in order to drain millions of dollars in just a few days.  
 
A group of organized professionals used about 20 emulators, which imitated 16,000 smartphones belonging to end-users of an mBanking application. A separate case brought findings that are even more shocking - a single emulator imitating 8,100 devices.  


To follow through with the attack, hackers had a lot of prepping to do. Their tasks included the collection of usernames and passwords, device types and IDs, parts of SMS messages (the ones containing OTPs for successful 2FA). This indicates yet another task, infecting the spoofed mobile devices with malware prior to the emulator attack. 
 
After taking care of the data necessary to bypass the authentication, the attackers were able to automate the attack by using emulators. Since the actual purpose of an emulator is to mimic the behavior of a mobile device; the attackers automated the attack by scripting it and feeding the login data to the mBanking app. And that is, in short, how US and EU banks lost millions in a matter of days.

How to fight back? 

ASEE developed a mobile app security solution capable of detecting and preventing real-time attacks – App Protector. By covering a multitude of mobile application threats; including emulators, App Protector is a security powerhouse capable of safeguarding your application and its users.  
 
In case of a detected anomaly within the device or the application, App Protector neutralizes the threat by responding  in one out of three ways: 

App Protector allows customization of responses when in online mode. Online mode offers an admin portal used for configuration customization. Meaning that the administrator is able to select the preferred response for a specific type of detected threat. The offline mode of App Protector comes with hardcoded configuration where such customization is not available.  
 
It is important to notice that the integration of App Protector with your mobile application does not affect the look or feel of the app itself. There is no tampering with the design and performance of the app; only a much needed additional layer of security for you and your end-users.  

App Protector Free SDK

Download App Protector SDK

App Protector SDK is a mobile security component built into the application's code enabling runtime protection as well as a variety of mobile application hardening techniques, including jailbreak detection.

Try App Protector Free

To find out more about our App Protector solution, contact us or visit our blog section.  
 

TOP 5 most reliable and user-friendly authentication methods in online payments

The interdependence of security and user experience is an everlasting topic. A common denominator that ties these two together is the authentication method used during online payment processing. Explore which authentication methods provide a seamless user experience while keeping you secure from fraudulent attacks.

Authentication methods in a nutshell

The definition of authentication can be explained as a process of identifying a user requesting access to a particular service. Until recently, simple credentials in the form of a username and password would suffice, but with today's security standards, we need something much stronger.

Different business requirements demand different security levels, achieved by carefully choosing or combining various authentication methods available. When it comes to user experience, it plays a significant role in user satisfaction during online payment processing. Therefore, the authentication method applied must provide convenience and security at the same time. If the authentication process does not offer convenience and runs smoothly, it causes high cart abandonment rates. On the other hand, if the authentication does not provide appropriate security measures, the threat of fraudulent activities involving payment cards rises and results in chargeback costs.

Download 3DS Mobile SDK Datasheet

Balancing between security and user experience is a challenge, but we at ASEE know how to approach this issue. The answer lies in Strong Customer Authentication (SCA) that enables various authentication methods tailored to the user's needs.

PSD2 driving innovation in online payment security

As a part of the PSD2 regulation from September 2019, Strong Customer Authentication (SCA) requirement is in force. SCA presents an additional layer of security in online payments and is based on at least two authentication factors from the following categories:

This means that stakeholders needed to get creative and adopt a variety of authentication methods available for the end-user in order to be able to process a seamless and secure online payment.

Our top 5 authentication methods

We prepared a comprehensive list of authentication methods that provide both security and convenience during the processing of an online payment. Let's dig in!

1. Biometric Authentication Methods

Biometric authentication relies on the unique biological traits of a user in order to verify their identity. This makes biometrics one of the most secure authentication methods as of today. Additionally, it causes less friction during the authentication process in comparison to previously mentioned methods, making for a great user experience. Most common identifiers include fingerprint scans, facial recognition, and voice-based identification. 

PROS

Hard to spoof – biometric identifiers such as fingerprint and retina are unique by definition for each individual. Also, when combined with Dynamic linking (i.e., adding additional transaction data in authentication data), spoofing is almost not feasible.

Simple to use – does not require memorizing various PINs and passwords, a straightforward authentication process.

Fast and reliable – biometric authentication provides more security and is less time-consuming.

CONS

Privacy concerns – one of the major issues users have with this method is privacy concerns. Even though this feeling is very subjective, it prevents a significant number of cardholders from using it. Biometric data are stored in a trusted environment, encrypted and inaccessible to regular operating systems.

Possible errors – errors including false acceptance and false rejection of an authentication attempt.

2. QR Code

QR code authentication is typically used for user authentication and transaction validation. A typical flow for transaction verification starts with the user logging into their internet banking web application and opening a payment order. The internet banking application offers the user to process this payment using a QR code presented on the screen. To process the payment, the user needs to scan the QR code with their smartphone using authenticator software (can be apart of their mobile banking application). To finalize the payment, the user is presented with transaction details and, upon inspecting the validity of the showcased data, the user additionally confirms the online payment.

PROS

Simple to use – the authentication process is straightforward.

2FA proof – easily combines with other authentication factors for increased security.

No additional hardware – independent from third-party hardware.

CONS

Lack of familiarity – the general public is not widely familiar with this particular authentication method, resulting in a possible poor customer experience.

Device dependence – requires the use of smartphones alongside correct reader software capable of scanning the QR code.

3. SMS OTP

This simple yet effective authentication method involves sending an SMS message to the user's mobile phone, containing a one-time password used for finalizing the authentication of online payments.

PROS

Simple to use – the authentication process is straightforward.

Access – in case of suspicious activity, only the user who has the device in their possession can verify the transaction's validity by entering the received OTP.

Familiarity – SMS OTP is one of the oldest forms of two-factor authentication, making it widely accepted by both users and security protocols.

CONS

Data network requirement – if a user is unable to use their phone network (e.g., the connection is down), they won't be able to receive the OTP. Also, SMS OTP delivery might not happen in real-time, causing a delay, and the authentication time could run out.

Compliance – SMS OTP authentication is not entirely PSD2 compliant, e.g. if a mobile phone is not in possession of its rightful owner, the fraudster can easily receive SMS OTP on the stolen device and process a transaction.

4. Push Notification Authentication Method

A push-based authentication system sends a notification to an app on a user's device, informing them about an authentication attempt. The user is able to inspect the details of the authentication attempt, and based on their knowledge about an, e.g., the transaction taking place, either confirm or deny request verification. 

PROS

Simple to use – if the authentication details do not raise any suspicion, the user simply confirms the authentication request.

Efficient fraud protection – push-based authentication enables simple implementation of Dynamic linking, which proves to be efficient in preventing phishing and MITM (man-in-the-middle) attacks.

Low cost – this method leverages user's existing mobile phones, eliminating additional hardware costs and maintenance costs.

CONS

Data access – notifications are sent through data networks, so in order for this method to be applied, the user must have data access.

Security issues – the user might accidentally approve a fraudulent transaction because of our habit of automatically approving incoming notifications.

Dependency – Push notification authentication demands having an appropriate mToken application installed on a user's device, as well as mToken activation, i.e., it requires certain actions to be undertaken in order for the authentication method to be available to the cardholder.

5. Behavioral Authentication Method

Behavioral authentication verifies a user's identity based on unique patterns recorded during interaction with devices (e.g., smartphone, tablet, computer). Identification factors include everything from the angle at which the user is holding their phone to pressure applied while typing. This type of authentication method allows for a genuinely frictionless experience without having to worry about the level of security it is providing the user with.

PROS

Simple to use – straightforward authentication process.

Hard to spoof – just like the fingerprint and retina are unique by definition for each individual, the same applies to the way a user interacts with their device.

Great user experience – the authentication process is passive, and friction is out of the equation.

CONS

Case sensitive – can be affected by the user's physical state and emotional behavior.

Invasion of privacy - major issue users have with this method is privacy concerns. What disturbs users the most is not knowing what data is actually collected, who has access to it, and how it is going to be used in the future. How far is too far?

3DS Mobile SDK Datasheet

Learn about fast and simple onboarding of your mobile application to 3D Secure programs. Unlock frictionless authentication and heighten online payment security at once.

Download 3DS Mobile SDK Datasheet

To find out more about Trides2 portfolio, contact us or visit our blog section.  

How App Protector prevents mobile app attacks?

Mobile app security is one of the most important aspects and features that one app must have. It protects the app from mobile app attacks such as hackers or malware. In the digital world we live in, it becomes a necessity to be aware of common app security problems and ways how to protect your app.

Users engage in various activities on their phones on a daily basis - exchanging messages, personal and financial information, and much more. Their expectation from application owners is to test their applications, prevent mobile app attacks, and ensure that end-user information is safe. Mobile app security is one of the most important aspects and features that one app must have. It protects the app from external threats such as hackers or malware. In the digital world we live in, it becomes a necessity to be aware of common app security problems and ways how to protect your app. 

Common threats in Mobile App Security 

 Most of the time, application owners are rushing to launch it on the market, disregarding some key aspects of the application's security implementations. Once the application is available to download after the release, anyone, including hackers, has access to the application and to its code. If the application is not secure enough, hackers can scan the application and see vulnerabilities within the application's code. Additionally, the application can be subject to disassembly or decompiling app, which allows malicious people or groups to tamper with the application or insert themselves in the communication between the app and the organization's server to collect valuable information. 

Try App Protector Free

Mobile app security threats

If your application is not protected, it is sensitive to reverse engineering and exploitation.  To protect your application, here are some of the most common mobile security threats that you should be aware of: 

Security best practices against mobile app attacks

Some key parts of mobile app security are:  

What makes App Protector different? 

It would take developers a lot of time to research, implement and test all possible threats and mitigations on their own. ASEE offers App Protector that developers can integrate into the application to ensure app protection at runtime, used on Android and iOS platforms. An additional product component is the App Protector Portal, a web-based portal with several key highlights. The first one is that it allows a detailed analysis of current threats in a modern UI while keeping all the relevant data clearly stated. The second one is the dynamic configuration of App Protector that can change depending on the attacks. This second highlight enables ease of configuration change which saves time and response time in case an urgent change in configuration is necessary. 

The App Protector  ensures safe communication between servers and applications, exchanging information about detected threats such as: 

If you want to protect your applications and; not less important, end-users of your applications, App Protector should be one of the key components of your apps.  

App Protector Free SDK

Download App Protector SDK

App Protector SDK is a mobile security component built into the application's code enabling runtime protection as well as a variety of mobile application hardening techniques, including jailbreak detection.

Try App Protector Free

To find out more about our App Protector solution, contact us or visit our blog section.  

How to reduce Cart Abandonment Rate with Risk-Based Authentication?

When talking about online payments, the first red flag that comes to mind is fraud. But there is another threat that is being overlooked. That being cart abandonment rate, which is causing headaches for both merchants and issuers. The first version of the 3D Secure protocol lacked in the user experience segment, making the cardholders suspicious when processing their payments, thus abandoning their purchases. Let's see how Risk-Based Authentication tackled this issue and eliminated friction which was the leading cause for increased cart abandonment rates.

Cart abandonment rate, a silent threat

Cart abandonment rate is a common KPI for measuring the performance of your web store. It indicates how many customers added an item to your web store shopping cart but never finalized the purchase.

In other words, it showcases the rate of customers who showed interest in a particular product/service by adding it to the cart but left without making the purchase compared to the total number of completed transactions

eBook: Decreasing Cart abandonment Rate on Mobile

Industry benchmark based on a number of studies states that the average cart abandonment rate is 69.80%. An abandonment rate greater than the industry benchmark is due to a variety of reasons. Some of them being shipping costs, required sign-up, limited payment options, or checkout processes that are hard to follow.

By tracking their cart abandonment rates, merchants can better understand how their customers behave during their online shopping experience. Also, it is a helpful tool for determining why visitors are not converting into customers.

3D Secure 1 pain points

Security threats in the online payments environment are as real as they get. But the simple truth is that most cardholders did not encounter such unpleasant situations. From their perspective, additional security layers are an inconvenience during the checkout process. They make the cardholder abandon the purchase because of long checkout time or unfamiliarity with the screens. The first version of the 3D Secure protocol provided sufficient security. Still, it does not consider the user experience, especially when discussing mobile versions of the web stores. Simply because the protocol was introduced long before such channels of eCommerce stepped to the scene.

This resulted in a spike in cart abandonment rates. The cardholders had to deal with more friction in order to process a single payment, although that meant a more secured transaction. From the cardholder's perspective, heightened security measures were seen as irritating rather than looked positively upon.

Luckily, the newest version of the protocol, 3D Secure 2, introduced Risk-Based Authentication, enabling frictionless transactions while further improving the payment's security. 

How Risk-Based Authentication helps

Risk-Based Authentication calculates the level of risk for a particular transaction. Upon scoring the transaction as either high, medium, or low risk, the cardholder follows additional authentication steps if needed. It is a dynamic, parameter-driven system that appoints an appropriate authentication method according to an individual transaction's risk score.

Some of the mentioned parameters include the device, location, network, transaction amount, number of transactions, delivery address, behavioral history, new or existing customer, and more.

To better understand how Risk-Based Authentication works, let's use a real-life example. Suppose a new customer is processing a purchase. In that case, the system detects that there is no previous transaction history in connection to the card. The cardholder will likely be challenged in the form of an additional authentication method. However, suppose an existing customer is processing a transaction with an, e.g., known device, and the transaction is within the transaction amount average. In that case, the cardholder is not asked for any additional authentication, and a frictionless transaction will be processed.

Tackling Cart Abandonment Rates with RBA

Risk-Based Authentication promotes the so-called frictionless transactions; i.e., a transaction that does not require additional authentication on the cardholder side because the transaction is low risk. It allows issuers to approve a transaction without interacting with the cardholder. By eliminating friction, the user experience is automatically better.

A complete flow, enabled because of Risk-Based Authentication, is the following:

  1. A customer adds items to their shopping cart and proceeds to confirm the order.
  2. After entering their usual purchase information, a customer proceeds to checkout.
  3. ACS server collects and checks the risk-based parameters (e.g., device, network, browser version, delivery address, transaction amount...)
  4. A thorough history review compares the transaction with the customer's behavioral profile.
  5. If the transaction risk score is low, ACS authenticates the cardholder without demanding additional interaction with the cardholder.

Benefits of implementing RBA

Benefits for the cardholders are obvious, a secured transaction with minimum effort regarding authenticating themselves. But the business benefit for merchants lies in reduced cart abandonment rates caused by reduced friction during the processing of online payments. It allows merchants to protect themselves and their customers from fraud while increasing revenue and customer satisfaction due to the frictionless experience enabled by Risk-Based Authentication.

As of right now, issuers are not confident in granting frictionless transactions, i.e., transactions that do not require additional authentication. The reason being is the fact that the issuing banks are the ones who take the liability in case of a fraud attempt. However, risk scoring services are acquiring more and more data by the minute and working on AI data analytics. That data applies to that same data in order to create and analyze customer profiles. This will result in detecting even the smallest deviations from the standard profile and the issuer can step in with SCA to confirm the authenticity of the cardholder.

eBook: Decreasing Cart abandonment Rate on Mobile

Learn how to optimize your mobile app in order to lower cart abandonment, provide your customers with a great user experience and drive more revenue.

eBook: Decreasing Cart abandonment Rate on Mobile

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Understanding Dynamic Linking within PSD2

Nowadays, online transactions can be conducted using multiple internet-enabled devices (computers, smartphones, tablets), making the online shopping experience convenient for both cardholders and merchants. But growth in online and mobile payments brought concerns in other areas such as card-not-present fraud. In order to enhance online payment security, Dynamic Linking came into play.

Intro to Dynamic Linking

With PSD2 came Strong Customer Authentication. And with SCA came Dynamic Linking; a key component designed to prevent social engineering attacks during the processing of a transaction. It enhances SCA and is a part of the latest 3D Secure 2 upgrade.

SCA is an additional layer of security, based on at least two elements from the following categories:

Top Online Payments Security Trends

Dynamic Linking aims to specifically link each transaction to its amount and the recipient of the payment. The end goal is to prevent social engineering attacks such as ''man-in-the-middle'' attack. The fraudster attempts to interrupt the connection established between the payer and the payee and hijacks the authentication code to authorize fraudulent transactions. If Dynamic Linking is applied, a ''man-in-the-middle'' attack won't be successful. This is because the authentication code will automatically fail if either one of the transaction details, transaction amount, or the payee, has been altered.

Dynamic Linking Requirements

Article 5 of the Regulatory Technical Standards (RTS) specifies the requirements for Dynamic Linking. Four main requirements are vital when discussing Dynamic Linking, and those are the following:

Conclusion

Implementation of SCA enhanced with Dynamic Linking impacts many participants involved in the online payment chain. To conclude, the main goals of these heightened security measures affecting the payment chain are available in the summary:

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Decoupled Authentication Explained

Merchant Initiated Transactions (MIT), or the so-called 3RI (3D Secure Initiated Transactions), are not in the scope of PSD2. However, such transactions could also be the source of potential fraud if left unauthenticated. Until Decoupled Authentication, issuers were only able to accept mentioned types of transactions without authentication or decline. Decoupled Authentication enables buyers to authenticate transactions at a time when they were offline. Let's see how it works!

3D Secure 2 & Decoupled Authentication

The latest upgrade of the 3D Secure 2 protocol includes multiple new features, one of them being Decoupled Authentication; an authentication method that allows cardholder authentication to be separate from the payment workflow/process and without customer interacting with the online merchant. Authentication responsibility shifts to the Issuing Bank, enabling cardholder authentication execution even though the cardholder is offline.

Top Online Payments Security Trends

Decoupled Authentication Flow

Standard 3D Secure authentication, whether browser or in-app, is showcased in real-time, meaning that the authentication is being performed during the payment process. The challenge screen is displayed to the cardholder while the checkout is taking place. It gives them a predefined timeframe to complete the given challenge.

Alternatively, decoupled customer authentication is performed without interacting with the online merchant's webshop or app. This type of authentication verifies the transaction by using a different channel (e.g., push notification, email). The merchant sets a timeframe in which decoupled authentication takes place. The timespan varies from just a few days up to a week.

Decoupled Authentication is available in 3D Secure protocol version 2.2. It is a natural progression from Out-of-Band Authentication (OOB).  With OOB, the Issuer sends a Push Notification to a banking application, which prompts the cardholder to complete the authentication. It allows the cardholder several days to complete the authentication process. It is ideal when the cardholder is not immediately available for authentication, but authentication is mandatory. Therefore, decoupled authentication is a type of Merchant-Initiated Transaction (MIT), and it is applicable to all device channels: browser, app, and 3RI.

Authentication flow

DA enables authorization at a time different from when the transaction took place, on a different device (smartphone, tablet).

The standard decoupled authentication method applies the following flow:

For the authentication process to run smoothly, it is vital that the cardholder is provided with all necessary data elements. Those elements involve merchant name, incremental transaction amount, reasons for additional authentication, making the user experience as seamless as possible.

Use Cases

If the Issuing Bank wants to authenticate its cardholder outside of the standard 3D Secure flow, it can use decoupled authentication.

Use cases are the following:

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

MWC Barcelona 2022 Highlights: 5G, IoT and security

MWC sure came back in style. After 2020 being canceled and 2021 bringing hybrid mode with a limited number of visitors; 2022 attracted over 60 000 attendees with high expectations. And MWC delivered quite an experience.

About MWC Barcelona

The Mobile World Congress, or simply MWC, is one of the biggest conferences dedicated to mobile technologies, traditionally held in Barcelona. From its first event in 2006, MWC Barcelona continued to deliver innovation in the mobile environment and wow the public with its selected exhibitors. The fact that it was an entirely live event, contrary to the previous two years, made the crowd that much more excited.

Major companies and industry leaders presented the latest flagship products in their fields. Also, the latest features and applications on the software side received the spotlight. With over 1500 exhibitors, one could have seen it all. From the latest mobile phone devices, electric vehicles, flying cars, to military-level encryption solutions, software optimizers of 5G signal, AI recommendation engines, low code platforms for digital banking, and much more. With all that technology in one place, there are several trends that have our undivided attention.

Machine Learning and Artificial Intelligence are still a hot topic

Even though Machine learning and Artificial intelligence have been around for quite a while; the duo is still an indispensable part of any major tech conference. From recommendation engines that utilize machine learning so that the system would know better next time, to face recognition and liveness detection, which are one of the key components of the modern digital onboarding process – both ML and AI have much to say and deliver in the technology world of today, as well as the future.

IoT and 5G bringing the WOW factor

Next on the list of our personal favorites is the Internet of Things. Similarly, as with 5G, MWC delivered genuine production-ready implementations of IoT, with smart homes being the stars of the show. Major companies showcased smart door lock solutions, lighting/heating solutions, home video surveillance; all controlled by a mobile application.

Security of everything, and anything

Saving the best for last, our forte – security. With the latest numbers on cybersecurity and a clear trend that the cybercrime is on the rise, security of everything and anything was a major topic; regardless of the industry and the technology on which specific use case scenarios are based. For communication platforms, encryption is almost a mandatory feature. The same, if not more, applies to drones or connected vehicles. If mobile applications are used to control any service or a device; then specific mechanisms need to be implemented to assure that the applications will be protected from mobile-specific threats.

Lastly, it is important to note; other trends may have their peak at some point in the future and could become obsolete at one point in time. However, security as a general topic will never have its peak – it will only have to improve day after day. Technology is here to stay, and so are the threats that uninvitedly come with it.

MWC Barcelona 2022 wrap up

We landed with high expectations, and MWC Barcelona went above and beyond them. For that, ASEE wants to congratulate MWC Barcelona on a successful event and the opportunity to meet innovation in every corner of the room, make valuable connections, and of course, enjoy the show.

App protector download datasheet

For more security-related talk, feel free to contact us. Zero obligation. We'd love to hear you out!

Data Enrichment: How does it fight fraud and reduce friction?

Data enrichment enables turning raw data into valuable sources of information. Along with providing more context, data enrichment ultimately leads to a more accurate risk assessment. Simply put; if you have more data, your fraud prevention and detection decisions will have a higher confidence rate, leaving less room for errors.

What is Data Enrichment?

A "by the book"definition of data enrichment would be the following: ''Data enrichment is the process of broadening and enhancing a set of collected data with appropriate context from additional sources relevant to the initial data set.'' Sounds pretty straightforward, but how do you exactly enrich the initial dataset?

eBook: Leveraging the full potential of payment data

There are countless ways to enhance existing data, and you can get fairly creative with your enrichment. However, when it comes to fraud prevention, common tools are the following:

Along with mentioned enrichment methods, there is more room for growth. The full potential of data enrichment lies in the mobile industry.

Mobile-first Economy Fueling Fresh Data

Nowadays, businesses are living the mobile-first economy trend. The most noticeable switch regarding mobile lies in banking and mCommerce, accessibility and convenience being the main motivator for end-users to switch to mobile. To back this up, techjury brings us some jaw-dropping mCommerce statistics.

This switch brings both threats and opportunities. Threats lie in a new payment channel allowing more ground for fraudsters to operate on. This opens doors for new types of fraud in the mobile payments ecosystem. On a more positive note, mobile enables a fresh perspective on user data and allows for quality data enrichment.

Common data extracted from mobile devices include the device brand, operating system, installed version of the OS. But why stop there? With mobile, you can go as far as behavioral factors, i.e., how the user interacts with the device itself. What kind of a keyboard is the user using? Custom or regular? Is the user connected to their usual Wi-Fi? Are there any unfamiliar Bluetooth devices connected to the smartphone? What about typing speed? The angle at which the user is holding the phone?

These are just a few examples of what information you are able to collect if you take a look at available data for mobile. This information provides so much more context and serves as one of the pillars for online payments fraud prevention and detection.

Benefits of Implementing Data Enrichment

Apart from the obvious benefit consisting of more accurate data that provides a more precise risk assessment, there are more that follow.

Getting to know your customers

By enriching user data, you are contributing to the security of the whole online payments ecosystem. Appointing new properties and tuning the risk parameters accordingly significantly reduces fraud and provides a whole new set of insights for future fraud prevention and detection development.

Eliminate friction

A huge part of online payments is the user experience. The end-user wants their online transactions to run smoothly and securely. Added pop-up forms and redirects create unnecessary friction that can easily be avoided by running user checks in the background.

Reduce Cart Abandonment

Added friction in the form of clumsy browser redirects and confusing authentication flows often end up in abandoning the purchase as a whole. By implementing data enrichment, you enable frictionless checkout, thus reducing cart abandonment rates.

How can Trides2 Help with Data Enrichment?

Trides2 is an online payments security portfolio consisting of issuer, acquirer, and merchant solutions to fit their particular need. When discussing data enrichment and online payment security in mCommerce, 3DS Mobile SDK is the star of the show. By implementing 3DS SDK into merchant applications, you are enabling additional data collection resulting in data enrichment, more secure payments, and frictionless transactions for end users. For more information about 3DS SDK, go to our recent blog post: 3D Secure 2 Mobile SDK: In-app purchasing never looked so good.

eBook: Leveraging the full potential of payment data

ASEE provides actionable advice on how to confront the high cart abandonment rates for mobile, as well as provides the tools that have the capacity to address other mCommerce challenges.

eBook: Leveraging the full potential of payment data

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Difference between WebView Payment Gateway and Native 3DS SDK

To help you distinguish the difference between WebView Payment Gateway and Native 3DS SDK, we sat down with our development team and provided some answers. See what our software developers Lea Rački and Kristian Stanić have to say about the fundamental difference and appropriate use cases for one and the other.

Warm-up

What are WebView Payment Gateway and Native 3DS SDK used for?

WebView Payment Gateway is a merchant service provided by an eCommerce application service provider that authorizes credit card or direct payments processing.

eCommerce Apps Guide: Striking a Balance
Between Security and User Experience

Native 3DS SDK is software for facilitating cardholder authentication that is embedded in a merchant mobile application. 3D Secure Mobile SDK is the mobile-device-side component of the 3D Secure system. Its role is to secure authentication during mobile-based purchases. When a cardholder initiates an In-App transaction, the 3DS SDK communicates with 3DS core components in order to authenticate the cardholder.

What are the fundamental/most noticeable/most relevant differences between WebView Payment Gateway and Native 3DS SDK from an end-user perspective?

End users would appreciate more the user experience offered by Native 3DS SDK since it's more user-friendly. During the entire transaction flow, the user stays within the same mobile app without the need to be redirected to an external browser. This makes the payment flow more fluid.

What are the fundamental/most noticeable/most relevant differences between WebView Payment Gateway and Native 3DS SDK from a developer perspective?

The main difference lies in implementation. In the case of WebView Payment Gateway, the implementation process is much easier because the mobile developer does not need to take care of the data flow or manage the screens – it is already implemented within the WebView. The developer's only task is to display the Payment Gateway URL inside the WebView. On the other hand, Native 3DS SDK requires a more complex implementation. The reward? The application flows are far more customizable and adaptable for mobile phone displays – so it's worth it.

Web 3DS SDKNative 3DS SDK
WebView approachNative approach
Easier to integrate into merchant appMore customizable UI
Quicker to integrate into merchant appMore customizable UX
Receiving, encrypting, and transmitting transaction data is done in the webReceiving, encrypting, and transmitting transaction data inside the app
 DS certificates and public keys configuration
 DS Logo images
 Support both native UI screen and WebView UI screen

Integration

What are the steps necessary to integrate WebView Payment Gateway?

  1. Specify the Payment Gateway URL address to display inside the WebView
  2. Handle responses
  3. Read the documentation

What are the steps necessary to integrate Native 3DS SDK?

  1. Prerequisites
  2. Read the documentation
  3. Study use cases
  4. Provide data necessary for initialization  and SDK workflows
  5. Handle responses from SDK

User Experience

What is the end result of both cases in terms of UX?

WebView is easier to integrate, but it's less customizable, and screens are not adapted for mobile phones.

Which one is more user-friendly and why?

Native 3DS SDK is a winner in this case. This is because all of the buttons, labels, loading indicators, and other UI components and customized and adapted to the screen size appropriately. The user stays within the same mobile application during the entire transaction flow, and there is no redirection to external browsers making the transaction processing smooth and fluid.

Which of the two allows for a more tailored approach, and how?

As mentioned, the user experience in the case of Native 3DS SDK due to enabled customization and its responsive nature. Also, 3DS mobile SDK returns a more detailed transaction status (completed, canceled, timedout, protocolError, runtimeError) and is able to return a list of detected security warnings so that the merchant can implement customized reactions to given detections and transaction statuses.

Data acquisition

Which data is additionally collected in the case of Native 3DS SDK integration?

3DS SDK collects data from mobile devices specified in the official EMVCo documentation. In terms of common data elements, some of them are platform, device model, timezone, IP address, longitude, and latitude. Data collection also takes into consideration the OS, so there are Android specific (device ID, IMEI, country code, network name operator, phone type...) and iOS-specific (user ID, system font, language, timezone..) data elements. All data is collected in order for ACS to analyze if the initiated transaction is risky. In case the ACS flags the transaction as not secure, the 3DS Mobile SD will demand an additional authentication step. 

Business cases

In which case is it acceptable to go with WebView Payment Gateway?

A typical use case involving WebView Payment Gateway would be the one where UI and UX do not play an important role.

Could you provide a use case scenario for Native 3DS SDK?

Well, the opposite – when UX and UI play a significant role. Better user experience enables you to reduce transaction abandonment rates and increase transaction volume. In case a merchant wants to provide their customers with a more customizable UI, such as landscape and dark mode, as well as security checks (securing external communication on its own, DS certificates, and public keys configuration). 3DS Mobile SDK can return a list of detected security warnings enabling the merchant to implement customized reactions for given detections.

What are the benefits of implementing Native 3DS SDK?

Wrap up

Both approaches offer secure transaction processing, while Native 3DS SDK enables the checkout process to be fluid through user experience improvements. By implementing our Native 3DS SDK, you are provided with an EMVCo certified solution and up to date with the latest regulations. Moreover, you are opening doors for a more tailored approach to in-app purchasing and transaction processing to your customers, which comes with increased transaction volume and lower cart abandonment rates compared to the WebView Payment Gateway approach.

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

As a dedicated guide for eCommerce app owners and merchants this eBook covers m-commerce security best practices and provides turnkey solution for in-app payments security. 

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

To find out more about Trides2 portfolio, contact us or visit our blog section.  

SDK vs. API: Settling the difference for anyone to understand

SDK and API tend to be confusing terms for non-developers when trying to understand their purpose and concept. Some believe that they need to choose between the two when developing an app, which is wrong. Within this article, you'll get an overview of SDKs and APIs and be able to distinguish when to use one or the other.

A common misconception around SDKs and APIs is that you need to decide which one you're going to use for successful app development. Although they heavily overlap, there is a significant difference between the two, and this is our attempt at explaining it.

What is an SDK?

SDK, short for Software Development Kit, is a collection of tools that enables developers the creation of custom apps that can be added on top of another program. It's important to note that they are platform and operating system specific (iOS SDK, Android SDK...).

By implementing SDKs, you are enhancing an existing app by adding more functionalities. An SDK usually includes documentation, processes, libraries, code samples, and guides that help developers during integration with their own apps. Think of it as a literal toolkit; you are provided with all the components to build a table yourself. Of course, tools and components will vary depending on the manufacturer, but generally, you are equipped with all of the necessary building blocks to assemble your project.

A Guide for m-commerce Merchants and App Owners

What makes SDKs so great is the time efficiency. There is no need to build functionalities from scratch. Everything is pre-built. You just need to make the new functionalities compatible with the existing system.

In case you're wondering what comes within a good SDK, these are the things to look for:

What is an API?

API, short for Application Programming Interface, enables the connection between multiple programs. It is an intermediary allowing applications to talk to each other. API, in general, is an interface and can be used for multiple purposes and discussed on different levels of abstraction. For the purpose of this article, we will refer to API as a set of functionalities offered by a particular backend service (REST endpoints and message formats).

To better understand the concept and use case for APIs, let's take a common example – weather forecast. Picture this; you own a traveling company, and you have a booking website. You want your customers to see the weather forecast for their destination and selected time period. What you need is a weather forecast display to showcase such information. The problem? You own a traveling company, not a meteorological service. In order to fetch weather data, you'll need to make some calls to a weather service and display information to your website's end-users.

Try TriDES2 DEMO

Each weather forecast functionality (temperature, humidity, UV index, and more) can be apart of your website by integrating a specific API in your weather display. This API will then communicate with a server containing the necessary weather data. It will retrieve the data, and with the help of JavaScript, the information will be available on your web page.

To conclude, APIs provide efficiency and faster time to market when developing apps by eliminating the need for creating functionalities from scratch.

Difference between an SDK and API

Since SDKs and APIs overlap in theory, it can be confusing to tell the difference between the two. If you are struggling to make a decision whether to use an SDK or an API, ask yourself the following:

How much functionality do I really need to add on top of an existing app?

As mentioned, the main motivation is time efficiency, but also the trade-off between the complexity of integrating and the impact of the integration on the app itself. Now let's assume that a certain business offers both SDK and API. Which one will you choose?

If you need a small set of functionalities necessary to enrich your app, you can go ahead and choose a set of appropriate APIs to integrate with your app. The complexity of integration is significantly reduced. But remember, each functionality is produced manually by integrating an individual API, making the time efficiency questionable.

On the other hand, if you need to cover a more complex set of APIs for the same service, choose an SDK. SDKs notably simplify the integration process because a single SDK can contain multiple APIs. Conclusion; SDKs reduce the complexity of integration and ultimately bring more business value.

sdk vs api

3D Secure Mobile SDK

3DS Mobile SDK offers a more secure and frictionless in-app purchasing experience. It enables fast checkout without browser redirection accompanied by data enrichment allowing for more precise Risk-Based assessment of transactions. By integrating 3DS Mobile SDK, you are providing your customers with a smooth online shopping user experience on mobile while heightening online payment security measures at the same time. To find out more, go to our recent blog post: 3D Secure 2 Mobile SDK: In-app purchasing never looked so good.

trides-download-datasheet

If you want to find out more, contact our ASEE 3D Secure Team or download the datasheet.

Payment Gateway Service Providers – Seamless Solution for 3D Secure 2 Transition

A recent announcement from MasterCard regarding the transition of customers to EMV 3DS 2.0 prior to decommissioning 3DS 1.0 calls for a proactive approach from all parties involved; including Payment Gateway Service Providers as well. This transition is causing a stir in the industry. ASEE is here to untangle some questions and make the transition process as seamless as possible.

Back in 2001 VISA introduced 3D Secure to provide issuers and merchants a way to authenticate cardholders for online payments. This standard under one name is 3D Secure 2.0 (3DS 2.0).

Initial introduction by EMVCo on 3D Secure 2.0 announces that 3D Secure 1.0 is in the phase-out stage; and will no longer have support after 31.12.2020.

eBook: Leveraging the full potential of payment data

This timeline crosses its path with the new PSD2 directive taking place and demanding further upgrades of 3D Secure. The result is 3D Secure 2.0 being fully compliant with PSD2 regulation on eCommerce and mobile payment channels.

A more detailed timeline leading to the current transition is available in our previous blog post. We cover the issuer side of the transition process.

Payment Gateway Service Providers Transition Roadmap

The prolongation of the transition period is causing headaches for payment gateways. Why? Because Payment Gateway is initiating 3D Secure transactions, but initial 3DS access points differ for 3DS1 and 3DS2 authentication. That means that Payment Gateway integrates with two APIs, but also manages the transaction logic. For example; since initially, PGW does not know if the card is enrolled in 3DS1 or 3DS2, authentication must be first initiated in 3DS2. If 3DS2 authentication cannot proceed, PGW must initiate a 3DS1 transaction.

With Asseco 3DS Server Single Access Point Facade, Payment gateway needs integration only with one API using one message protocol and initiating 3DS authentication transaction only once. In case the card is not apart of the 3DS2, the facade will initiate 3DS1 transaction to the dedicated MPI (Merchant Plug-in), and provide the final Authentication Response to the Payment Gateway. Asseco 3DS Server Single Access Point Facade is flexible for integration not only with Asseco SEE MPI and Asseco SEE 3DSS, but also with third-party MPI and 3DSS.

eBook: Leveraging the full potential of payment data

ASEE provides actionable advice on how to confront the high cart abandonment rates for mobile, as well as provides the tools that have the capacity to address other mCommerce challenges.

eBook: Leveraging the full potential of payment data

To find out more about Trides2 portfolio, contact us or visit our blog section.  

How (and why) has mobile app security become imperative?

To follow digitalization trends, you need to protect both end-users and application owners from the unauthorized use of applications. It becomes imperative to make mobile application security one of the key pillars of application development.

When thinking about mobile devices, most people do not perceive them as a real threat factor. In fact, your mobile is constantly at significant risk of being a target of hackers. Pandemic had an enormous impact on digitalization, and consequently, the number of mobile applications also experienced growth. With this growing trend, opportunities for hackers and fraudsters have never been higher. To follow digitalization trends, you need to protect both end-users and application owners from the unauthorized use of applications. It becomes imperative to make mobile application security one of the key pillars of application development.  Our product manager Mario Marić will hold a presentation about mobile application security at Technobank on September 23rd. In this article, he shares his view on this topic. 

1. As digitalization grows, there is an exponential increment in the utilization of mobile applications. What do you consider to be most important when developing a mobile app? 

Historically speaking, the first 500 mobile applications became available on Apple App Store in 2008. This was not so long ago. In 2021 Google Play Store and Apple App Store combined offer over 5.5 million applications. The numbers became fairly significant in a relatively short period. With digitalization, along with some other unexpected events such as the global pandemic, usage of mobile applications continues to grow. For example, research has shown that in 2014 average consumer spent 2.5 hours on his mobile phone daily. However, in 2021 consumer spends almost 4 hours on his mobile. Most of that time spend is on using applications. This trend, however, is also seen by cybercriminals who want to take advantage of these numbers on the rise; so in parallel with growth in usage of mobile phones and applications, growth in malicious attacks is also detected. 

eBook: The Ultimate Mobile
Application Security Checklist

When talking about mobile applications, people mostly think about user experience, ease of usage, and functionalities. Appearance is also essential for many people. The mobile application's design needs to be in line with the latest trends and requirements by the market. But one thing most people take for granted is the security of their applications. Today, people can make online purchases with their mobile applications. They can trade with their cryptocurrencies and use company applications to access company VPN when working from home or apply for their birth certificate, which contains all the personal data of an individual. Therefore, these applications need to be secure, as well as information stored in them. So, for this world we live in today, I would say that security is, at least, one of the top 3 most important topics when developing a mobile application.

2. Do you think that mobile app attacks can result in slowing down application growth? 

I don't think that mobile application attacks can result in slowing down applications' growth. The trend we are in went too far to be changed based on an increased number of mobile application attacks. Increased usage of mobile applications and mobile application development with its features brought a lot of benefits for everyone using them, and that's for sure a good thing. A much bigger potential issue is the fact that these attacks will not stop, quite the opposite.

So the solution needs to be in implementing security mechanisms that will prevent these attacks from causing real damage to application owners or the application users. Anyone building a mobile application needs to be aware of the threat and act accordingly, given the world we live in. Some solutions can make mobile applications far more secure once they are implemented. ASEE solution for this challenge is a product under the name App Protector. It's an SDK (programming code) that easily implements into any mobile application, and protects the application from the inside.

3. What are steps that one mobile app owner should implement in order to protect it against any malicious intent? 

When talking about the application owner's steps, the key thing is to understand that the threat is real and implement a mechanism that protects the application. The easiest mechanism to implement is an SDK that becomes part of the application and then protects the application in runtime without any additional human intervention. So once the app is built and published, SDK is implemented, anyone who downloads the application will be protected by this mechanism. App Protector is easy to implement, and it does not affect the application in any way; it protects it from a specific set of attacks. To be more precise, App Protector can detect if the application is running on a jailbroken device or if a device is under a hooking attack (compromised device in general); and can prevent these attacks with specific response types to each attack specifically. 

4. What can Technobank’s attendees expect from your presentation? 

In my upcoming presentation, I will try to give a few historical and statistical information on mobile development as an introduction since I think it is always important first to present the context of the subject. After the opening, I will go more in-depth to the main trends and challenges the mobile application niche faces, with an obvious emphasis on security as an essential component of mobile application development. App Protector will have a deserved slide or two, as it is a product that I believe can significantly lower the risk of using any mobile application on a compromised device. The plan is to finalize the presentation with some future considerations to better understand what consequences we might see if mobile application security is not a priority.

the ultimate mobile application security checklist

eBook: The Ultimate Mobile Application Security Checklist

Stay on the right track while building a secure mobile application with our ultimate mobile application security checklist. Follow our best practices and ensure your mobile apps and their users are well protected.

eBook: The Ultimate Mobile Application Security Checklist

To find out more about our App Protector solution, contact us or visit our blog section.  

Transitioning to 3D Secure 2 – Risks & Challenges

One of the significant turn points in the banking industry is switching from 3D Secure 1 to 3D Secure 2. To demystify potential risks and challenges regarding this transition, we in ASEE prepared a short read; listing and explaining possible concerns regarding transitioning to 3D Secure 2.

What is the best way to approach change when you are a decisionmaker in a financial institution considering the implementation of new technologies such as 3D Secure 2?

eBook: Leveraging the full potential of payment data

We summarized the main dilemmas discovered during our research regarding transitioning to 3D Secure 2 and pinpointed three key concerns:

1. An additional step in the online payment process

The revenue streams from eCommerce fees make up 15% of banks' income levels today. This is significant because the online payment process is a key component in the consumers' eCommerce journey. Both merchants and acquiring banks strive to reduce the online shopping cart abandonment rate to maximize their respective revenue streams. 3D Secure 2 is an additional measure in the transaction for safeguarding both merchants and banks. Although some stakeholders worry about 3D Secure 2 increasing payment drop-out rates; banks and merchants work on improving the consumers' overall customer experience constantly. Still, they must also continue to ensure that online payment security isn't in question. 

2. Requirement to change the broadly adopted authentication methods

A vast number of banks rely on SMS OTP authentication methods, inherited from 3D Secure 1. This method has various advances; it does not require special enrolment and a mobile application, it is simple to use and applies to non-smartphones. However, according to EBA's opinion, this method is not a Strong Customer Authentication method.

The first reason for this is that it doesn't include two out of three authentication methods, SCA (something you are – biometrics, something you have – e.g., HW/SW token, something you know – e.g., password/OTP). Anyone who possesses the buyer's phone will get access to OTP and is able to make an online purchase. Another reason is that OTP generates at the server-side and relies on a private key. The transaction data are not included – there is no Dynamic Linking as required by the PSD2 directive. That means that ''man in the middle'' attacks are a possibility. If an attacker changes a payee account and changes the payment amount,there is no way to identify fraud because of the transaction authentication.

3. Bad experiences with 3D Secure 1 card enrolment

When 3D Secure 1 was introduced, the initial adaptation did not cause a rise in eCommerce and online payments as expected but caused an increase in the transaction abandonment rate. Anywhere from 30% - 50% of transactions (depending on the country) were forfeited due to reliance on 3D Secure 1. Later analysis showed that card enrolment, which was a prerequisite to use 3D Secure-enabled cards, caused too much friction for buyers. Also, pop-up windows, which are a part of the 3D Secure authentication process, are in connection with ''man in the middle attacks'' by buyers and trigger them to terminate their online purchase process. Hence, the cart abandonment rate surge occurred. The new 3D Secure 2 protocol considers all of this fallback from the previous version and emphasizes smooth User Experience (UX) alongside a fast and frictionless flow.

eBook: Leveraging the full potential of payment data

ASEE provides actionable advice on how to confront the high cart abandonment rates for mobile, as well as provides the tools that have the capacity to address other mCommerce challenges.

eBook: Leveraging the full potential of payment data

To find out more about Trides2 portfolio, contact us or visit our blog section.  

What is ATO fraud and how to combat it?

ATO fraud (Account Takeover) is a rising threat in today's online business environment. ATO fraud has been around for decades. Despite losses that are already measured in billions of dollars, ATO fraud is yet to reach its peak. The concerning numbers pointed out in this article prove how important it is to understand what ATO fraud is and what you can do to prevent it.

ATO fraud 101

 ATO fraud happens when a fraudster gets a hold of the victim's login credentials and uses the account for their own gains. That includes activities such as making online purchases using the stolen account and saved card data, using loyalty credits, selling the account or the extracted data on the dark web, etc.

A typical ATO attack works as follows:

  1. The fraudster uses stolen credentials and logs into the victim's account.
  2. The attacker changes the account details, email, and phone number, for instance.
  3. The fraudster uses the account for making unauthorized transactions or sells the account data to someone else.

What makes ATO fraud more dangerous than card-not-present fraud is the fact that with a single combination of credentials (e.g., username and password), the fraudster is able to access multiple accounts. The truth is, we are terrible with passwords. We constantly reuse them and make a low effort regarding our online security. Take a look at some interesting stats pointed out in a recent article by DataProt:

The list goes on. This gives us a clear picture of how irresponsibly we behave when it comes to our online presence security. The username and the password have little to no value. But the information behind those credentials is what piques the fraudster's interest.

Obtaining the credentials

There are a few different methods fraudsters use in order to get a hold of the user's credentials. More sophisticated methods such as phishing and malware are used to obtain more valuable credentials. It enables the fraudster to take over a victim's bank account, for instance. Other methods use credential stuffing and brute force attacks in order to obtain an account and target eCommerce accounts.

1. Phishing attacks

A phishing scam consists of sending a link via email, text message, or even social media containing malware that collects the victim's credentials. This method usually uses well-established website interfaces that the users trust. And while the interface seems familiar and legitimate, there is a fraudster in the background that is harvesting your credentials and accessing your account in order to use it to their own advantage.

2. Credential stuffing

Another known method for conducting ATO attacks is purchasing stolen credentials of the dark web in bulk. This information is usually published after a data breach and damages both users and businesses. The most valuable information published after a data breach consists of emails and their corresponding passwords.

For how many accounts do you use your email address and the same password? Think about it. By using automated scripts and bots, the fraudster is able to quickly scan through a multitude of account-based websites. They collect further information such as saved credit card numbers, social security numbers, etc. To see whether your email or phone number is a part of a data breach, check out haveibeenpwned.com.

3. Malware

Malware, or ''malicious software'', is software specifically designed to cause harm and damage in order to gain unauthorized access. By downloading content from sketchy sites, you are at risk of unknowingly installing malware to your device. That malware is able to track everything the user types. Now the fraudster just needs to be patient and wait for you to enter your credentials.

4. Man-in-the-middle attacks

A man-in-the-middle attack is based on intercepting a message and altering it to the fraudster's advantage. By using malware, the fraudster is able to intercept, edit, and resend an altered message sent between the victim's device and the bank's server.

ATO fraud: The consequences

The consequences of an ATO fraud affect both businesses and customers. The fact that the fraudster used legitimate credentials in order to log in to an account makes it that much harder to detect whether it is an unauthorized person behind the username. The fraudsters are getting better and better at mimicking the ''usual'' user behaviour by carefully choosing the amount to be spent, time of login, time of order, and other details visible in the account history.

By the time the rightful owner of the account notices any strange activity, they are probably already locked out of their account because the fraudster rushed to change the vital account recovery details as soon as they gained control of the account. Even if victims manage to retrieve their accounts, their personal information is most probably already compromised.

When talking about businesses whose customers' are victims of an account takeover attack, we need to mention great financial and reputational losses. The financial loss is due to incoming chargeback costs accompanied by inventory costs. The data breach itself ruins the company's reputation with clients, while higher chargeback rates cause problems with issuers and card schemes. Customers lose trust in such businesses and tend to turn to the competition, which means that customer loyalty is also at stake. The overall reputation of the business suffers, and the options for damage-control are scarce when overturning such an unfortunate course of events.

Try TriDES2 DEMO

Concerning Numbers around ATO fraud

A report from Sift on Digital Trust & Safety Index reveals how ATO fraud progressed and caused losses amounting up to $16.9 billion in 2019. The pandemic-ridden year boosted eCommerce, and users turned to shop online. The increased online presence meant prolific ground for fraudsters to operate on. The report states that ATO attacks surged by 282% between Q2 2019 and Q2 2020.

The impact on businesses is detrimental. Customers who are victims of an ATO attack describe their behaviour and next steps. 40% of users continued using the site but decided to change their credentials. 20% of users continued using the service and contacted the support team in order to solve the issue. Nearly one-third of surveyed customers stated that they abandoned the site where an attack took place and turned to a direct competitor. But losing 28% of your customers is not the only issue. If you consider the average customer's lifetime value and customer acquisition costs, the cost of an ATO attack grows even higher.

The research also reveals that the fraudsters are getting better and more efficient with their time. The period between Q2 2019 and Q2 2020 recorded thought-out waves of ATO fraud. This means that the fraudsters are now using automation and bots. This way they take over as many accounts as possible while burying security teams with alerts and stressed-out customers.

Preventing ATO Fraud: Issuers and Merchants

Static passwords proved to be insufficient regarding online payment security. In order to heighten the security measures, implementing MFA (multi-factor authentication) enables your customers to protect their accounts using authentication methods such as biometrics (fingerprint, face-scan). Even if the fraudster gets a hold of the cardholder's pin or password, multi-factor authentication involving biometrics makes it hard, if not impossible, for the perpetrator to fake a fingerprint scan in order to process a fraudulent payment. Strong Customer Authentication (SCA) enabled through 3D Secure 2 solves this issue and provides both security and convenience to the end-user.

The next line of defense is the continuous monitoring of account activity supported by machine learning. ATO fraud requires detection in the earliest stages of the fraud lifecycle. To detect any anomalies in user behaviour, monitoring is a necessity that needs to be present from the moment a user starts their banking session. By tracking customer behaviour and how they interact with the device , monitoring allows the detection of ''normal'' customer behaviour. If monitoring identifies that customer behaviour has certain anomalies and deviations in regard to the ''normal'' behaviour, this might indicate an ATO attack.

Another means of prevention is Dynamic Linking required by the latest PSD2 directive. Dynamic Linking is successful at preventing social engineering attacks because it links each transaction to its amount and its recipient. The authentication code generated for a particular transaction is generated based on the transaction amount, account number, and other predefined details about the transaction. This means that in case of altering any transaction data during the interception (e.g., man-in-the-middle attack), the authentication code will change as well, and the authorization would be unsuccessful.

Final Thoughts

Fraud prevention in real-time is essential. Determining if requesting a change of email, or phone number is a possible ATO attack is a challenge. The above-mentioned techniques, accompanied by real-time fraud detection, allow for a better risk assessment. It provides a higher level of security, protecting your business and your customers.

trides-download-datasheet

To get more insight into how to protect your business and customers, contact our team to get a free, zero-obligation consultation or try our DEMO to see 3D Secure in action.

ASEE achieved EMV® 3D Secure certificate for Android and iOS mobile 3DS SDK

ASEE successfully completed the EMVCo testing and received the EMVCo Letter of Approval for the TriDES2 3D Secure Server mobile SDK for Android and iOS SDK. The TriDES2 Secure mobile SDK facilitates cardholder authentication embedded in a merchant’s mobile application. This removes 3DS complexity from mobile application checkout and payment flow.

By certifying 3DS mobile SDK, ASEE completed the full 3D Secure product portfolio for supporting all segments of payment and 3D Secure stakeholders; issuers, acquirers, payment gateway providers, and merchants.

eCommerce Apps Guide: Striking a Balance
Between Security and User Experience

The usage of 3DS Mobile SDK in mobile purchase applications improves user experience checkout in the 3D Secure authentication process. Instead of opening a web browser to proceed with the authentication, all steps are within the mobile purchase application. This ensures the same User Interface, along with a smooth flow. Additionally, with utilizing 3DS Mobile SDK, more device data is available to the issuing bank. By using such data, the issuing bank is able to provide a more reliable risk scoring. This is used for identifying potential fraud and grant more frictionless transactions, which will additionally improve User Experience.

A more detailed overview of 3DS Mobile SDK capabilities are available on our recent blog post - 3D Secure 2 Mobile SDK: In-app purchasing never looked so good.

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

As a dedicated guide for eCommerce app owners and merchants this eBook covers m-commerce security best practices and provides turnkey solution for in-app payments security. 

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

To find out more about Trides2 portfolio, contact us or visit our blog section.  

ASEE SxS New Release

ASEE continuously delivers new versions of our Security Access Server known as SxS. Now we are introducing you to the latest technological and functional features in the field of authentication. See what's within SxS new release.

SxS new release (v6.35) was released in the end of October 2020.

With this release, most eye-catching features are:

Full support for Huawei Mobile Services (HMS) push users

As Google services are no longer supported on new Huawei devices all the applications must work within HMS. With this feature we support our end-users by SxS and mToken, and they are able to receive push notifications on their latest Huawei devices. They are now routed through Firebase or Huawei Mobile Services.

Detection of authentication method (PIN or biometry)

This feature detects which authentication method for automatic transaction confirmation was used by mobile end-user (how did the end user confirm the transaction); by using PIN or biometry. This is an EMV requirement for 3D Secure ACS use case. Using this feature, it is now possible to propagate way of authentication end-user performed on mobile application to client backend services and use this information where appropriate in other applications like Risk based authentication.

Try SxS DEMO

Support for multiple SxS instance connections to Entrust DataCard nCipher HSM device with CodeSafe application

With this feature it is possible to share single HSM device for multiple SxS instances.  Benefit from this feature can have cloud operators or in-house clients who use complex architecture where multiple SxS nodes are connected with HSM devices, either in single or cluster mode.

Technology update: Java Enterprise Edition 8

This version supports Java EE8 and newer application servers are supported as well. List of application server include: JBoss 7.2 and WildFly 19.

To find out more contact our ASEE experts. Zero obligation - we're happy to hear you out!

Accessing sensitive data with a VPN connection?

Nowadays, working from home has suddenly become the new normal, which also requires a new level of security.

In business, as usual, VPN is a convenient feature to enable employees to occasionally work away from the office, but these days it’s the key connection to the company’s data, making it as important as, for instance, securing your financial transactions.

And attacks by hackers don’t stop even in times of a pandemic crisis. There are sophisticated ways to steal identity and data, which can cost companies dearly. 

So, what can be done to protect our personal and business data?

Upgrade your existing VPN security with reliable and secure multi-factor authentication for connecting to your VPN – i.e., ASEE SxS authentication

SxS, an authentication server uses advanced cryptography algorithms and the highest industry standards to provide security without adding friction and, consequently, sacrificing user experience. To ensure full protection for your users during authentication or when carrying out online transactions, SxS makes sure they are validated using highly available authentication servers. 

Strong authentication is, among other methods, ensured with the use of dynamic passwords, meaning that multi-factor authentication is used. Dynamic passwords which are validated by SxS can be generated from a variety of sources; from a hardware token, a QR code reader device, to a mobile token.

The ASEE authentication server, SxS, can be deployed on the client’s premises or hosted in the cloud. No matter which option you choose, the solution ensures that the right people are accessing your sensitive data.

Stay safe and secure by using SxS as a service anytime, anywhere, and contact us to learn more about our offer.

Why is using IAM always a good option?

IDENTITY AND ACCESS MANAGEMENT BY ASEE

The growing number of applications in modern companies creates challenges for administrating single users in various databases. IT managers are struggling with maintaining the consistency of user identity between different applications. And as businesses evolve, the number of applications will continue to grow. Therefore, companies will feel increased pressure to find a solution that allows them to control and manage access to network resources effectively and effortlessly.

If identity access management processes are not controlled and monitored appropriately, this could result in regulatory non-compliance for the company. That could lead to a situation in which, during the audit process, responsible persons may not be able to prove that company data is not at risk of being misused.

In large organizations, applications are developed and implemented without common user repository information. Each application is usually deployed with its own provisioning and identity- management interfaces, and with its own security systems. Identity information and security policies are distributed across many applications, and repositories are controlled by many internal and external groups. The evolution of client/server applications and the internet has dramatically increased the number of identities that users must remember.

Having all this in mind, it is necessary to consolidate various data, user information, access rights, privacy policies, and user authentication in one system with smooth and seamless administration.

The solution is – IAM by ASEE

Identity and access management is a concept (a framework) that allows for the management of digital identities and access control. Using this technology, IT managers can manage and control user access on different systems and applications in a simple way, based on user roles and their respective rights. Roles can be defined based on responsibility, job title, ownership, and other information related to the organization. This way, it becomes easy to control access to sensitive data.

How does this work?

Identity management manages the identity lifecycle through a combination of processes, organizational structure and technologies. Access Management focuses primarily on authentication –determining who has access, and authorization – determining whether the respective user is authorized to have access. User authentication is covered with a multi-factor authentication solution. The user has to identify himself with the following parameters:

Multi-factor authentication as described above adds an additional layer of security to prevent various cyber-attacks like MitM or Phishing (https://sxs.asseco.com/).

In order to complete a request using IAM, the user must be authorized for it. The permissions for each user’s cluster are written in policies. Depending on predefined permissions, IAM will “decide” whether the respective user’s request will be allowed or denied.

Key components of the ASEE Solution

USER MANAGEMENT containing functions of user account provisioning/de-provisioning

USER REPOSITORY in which all user account identity information is stored

AUTHENTICATION bringing together all of the functions of authentication and session management

AUTHORIZATION for archive/repository of authorization attributes, rules or roles

Business benefits

1.       Saves time and money

IAM will improve the efficiency of IT resources because it offers a single place to manage user identity and access rights, which saves valuable time for IT managers that is currently spent on user management.

2.       Higher security

The user can be authenticated and authorized from a single point. IAM controls a person's access to multiple applications in one place. Since the security for all applications is administered through a single point, IAM eliminates the concern of having different security standards implemented in different applications, which lowers the security level of a system in total.

3.       Universal monitoring and auditing

Authentication monitoring and auditing is now done through only one system. Single point management decreases the possibility of errors versus management in several different places. Using IAM makes it easy to change, modify, update and process requests and approvals for various users.

4.       Improved user experience

Nowadays, users are struggling to remember multiple user accounts and passwords just to log into business applications. With single sign-on (SSO) and unified user identity, users, customers and partners will be able to have access to different applications with only one account.

IAM is not just made for internal use, it can also be used for logging in users outside the organization, e.g., customers, partners, and suppliers, providing access to its network across mobile applications, on-premises apps and software-as-a-service apps without compromising security. This enables better collaboration, enhanced productivity, increased efficiency and reduced operating costs.

All in all, IAM will decrease costs, improve system management and the efficiency of application development by reducing costs across the entire organization. ASEE Identity and Access Management solution combines all the elements to enable seamless integration with all applications and unified user management.  

Security & Fraud prevention in a smarter way!

To be successful, organizations must provide an excellent user experience at each juncture of the customer's journey to gain a competitive advantage.

End-users always have a choice to leave for a different solution, if their experience isn’t up to expectations. To optimize user experience, organizations have to rely on data analytics in order to identify user patterns, trends, and behavior, qualify leads as well as attract and retain more users.

Back in the 90s, we used to develop applications that comprised many different features we thought the user would consider helpful. Did you know that today, according to some researches, if an average user spends more than 5 seconds trying to find anything in the app, s/he is likely not to use the app any longer? This brings us to the conclusion that we have to develop apps that serve our users' needs, not the other way around.

Some of us can look back to those times when we used to wait in long lines at the bank just to pay our bills. Thanks to the Internet and hardware tokens, those days are ancient history for most of us. Suddenly, a hardware token became just one of the devices users tend to lose or misplace. Mobile banking and millennials aimed to prove that every hardware item can be replaced with software. We are living in the times when our apps can identify us by our fingerprints, face, or voice, which enables us to complete transactions with only one click.

Following those trends in order to reduce the time spent at the bank, the users can now manage their tokens within the application by using ASEE Mobile Token. By means of giving the end-users an option to activate their tokens by themselves, and reactivate them when they change their mobile phones, we relieved branch offices and customer service departments. User experience has been improved by allowing users to manage various tokens and reset them in case of crash or improper work practices.

5 features that end-users will appreciate in new banking era

However, we did all that not only with our end-users in mind, but also considering the needs of our customers. For any organization it is hard to manage different roles, access rights and authorizations in many different applications. Identity and Access Management is a centralized solution developed by ASEE, which manages user identity and also protects applications and user identities against insider threats from one single place. IAM reduces administration time, allows IT to analyze user behavior, and spot fraud attempts better and faster if they occur. Better customer experience and administration time reduction are hereby achieved through one single point of interaction, and, importantly, the customer doesn't have to memorize so many usernames and passwords. IAM supports frameworks such as OAuth 2, OpenID, SAML, in order to make your system PSD2-compliant.

More about IAM

The bottom line is, user experience is neither less nor more important than security. When developing solutions and services, it is important to give equal attention to both customer experience (because we want our services to be used) and to security (because we want to provide our customers with the highest level of security).

5 features that end-users will appreciate in new banking era

During the non-smartphone era, we used hardware tokens to finish online transactions. We still use them, but nowadays SW tokens are being replaced by mobile tokens completely. Both the use case and idea are perfect. You download it to your smartphone which is always beside you, and, in case you want to make an online purchase, you can do it right from your phone. When Cloud technology arrived, the token remained stored on the phone, it didn’t move to the cloud. No one could predict that changing a mobile phone every couple of years would become standard practice.

Mobile phone manufacturers release new features every year, in order to create demand for customers who then switch to newer phone versions. New releases of Android and iOS are moving forward exactly as manufacturers dictate. In this new era of quick and frequent changes as well as
emerging new trends, we are faced with users who have an incredible ability to adopt new technologies fast.

Communication with banks is becoming more vital than ever, so IT experts and banks are trying to find new ways to speed up the communication between them and customers. Customers don't want to visit their banks, talk to anyone, wait in long lines just to get something done in 3 minutes. Going mobile is the train we need to catch.

An average customer expects every transaction to be finished in just a few minutes, so that is why we invented mobile tokens in the first place. An SW or a mobile token is the best option for your online transactions because a mobile phone is literally the one thing that is always with you. The only problem with providing seamless user experience through this technology is that the user must visit the bank every time they change the phone, in order to receive new tokens for making transactions.

Asseco has come up with a solution that doesn’t require a visit to the bank every time the bank’s customer has a problem with the mobile token, or simply changes their phone. Asseco has gone one step further to enable customers’ seamless migration when switching to a new phone, changing one’s password, or migrating tokens and accounts. Asseco has found a solution that lets customers easily migrate all their data using the self-automated mobile token SDK.

This solution provides the following:

PIN change

The PIN is an important sequence of numbers your user needs to set up and remember, in order to sign their transactions using mobile token. In case your customer have a feeling that someone abused his token and tried to make a transaction, a customer can change his PIN into new one. Application settings allow you to change your PIN. You can simply enter your old PIN, and then set a new one without contacting your bank. Therefore you will block abuse of your token for transaction signing.

Reset Token

Nowadays, even with strong Internet security, there will be intruders who will try to steal your token credentials to make transactions on the Internet. If you have faced this problem already, or you think this could happen to your users, you can advise them to reset their existing tokens. A token can be deactivated easily in the app settings. The user will then be redirected to the main screen where they need to enter their activation code, which has been issued by their bank.

Migration

With constant phone changes, token migration can be extremely effective, if users can do it in a few steps. Mobile users, who are accustomed to getting everything done in just a few steps, will want all applications used on their old phones to be auto-migrated to their new phones.

With this feature implemented in the mobile token application, a user can migrate their token in just a few steps. The only thing you need to do is to generate a new code on the old device to activate the same old token on the new mobile device. Having installed the application on a new mobile device, the user can easily activate the new code received from their old mobile phone’s application.

Enrolment

Can I download the app and do everything by myself? The answer is YES, FINALLY! The end user can generate a brand-new token, which can be activated with codes already received from the issuer or the bank.

A download link together with an activation code must be delivered to the new mobile device. The download link and the activation code are first acquired by the “old” mobile token application, and then they can be forwarded to the new device using various mechanisms.

Recover token

The user has options to view the list of all assigned tokens and to block or enable other mobile tokens on the server side. A blocked token can be unblocked. An archived token cannot be used anymore. Therefore, a user can initiate token redistribution for other mobile token devices. This is useful in case the user has forgotten their PIN, or if for some reason they have had to reset the mobile phone to factory settings or delete the token application.

If the token has been locked, the end-user can recover their token anytime.

Using any of the abovementioned solutions in this complete self-management tool can bring additional benefits to the user, such as enabling them to be less involved in long banking processes, and have more time for activities they enjoy. The user is more independent and does not need to rely on anyone’s assistance. A renewed or recovered token can be used later with no fears that the token will not be protected. End user experience will thus be improved and all processes accelerated to the new level.

ASEE SxS Solution Uses State-of-the-art Authentication Features Based on Biometry for Advanced User Identity Assurance

The ASEE SxS Solution uses biometric two-factor authentication like TouchID, FaceID and Fingerprint Scan for advanced user identity assurance and seamless customer experience.

Smartphone users increasingly adapt to biometric features of their mobile phones and expect the same seamless authentication experience in the payment approval process. ASEE implemented advanced biometric technologies in its own authentication products – SxS and Mobile Token, which are used for payment authorization in more than 120 banks and financial institutions worldwide. With increased security levels biometric authentication brings stronger identity assurance, improved user experience, keeping fraud at zero level.

The ASEE SxS Solution empowers companies to apply strong two-factor authentication in any digital channel to achieve Strong User Identity Assurance. The Solution comes with own Mobile Token Authenticator, which provides exceptional user experience and supports a wide range of existing hardware authentication devices. It addresses all PSD2 regulatory requirements and is very cost effective. More detailed explanation about the solution’s compliance with the regulatory requirements is available in an on-demand webinar at How to Meet New Strong Customer Authentication Requirements under PSD2?

SxS smoothly integrates in any enterprise infrastructure and with various applications and systems: Banking applications, Network services, Computer logon screens, Business applications, online B2B/B2C portals and any mobile, desktop or web application.

For more ASEE related news https://see.asseco.com/news-events/news/

Merchant Whitelisting (MWL) Best Practices pt.1: User Experience

SCA exemptions include a neat feature, merchant whitelisting. Enabling the cardholders to pick and choose merchants whom they trust provides them with control over their online payments user experience. To get more insight into cardholder UX along with best practices regarding managing the merchant whitelist, keep reading.

This article is a part of our Merchant Whitelisting Best Practices series. To round up the story take a look at our post regarding MWL industry best practices, Risk Considerations edition.

MWL Best Practices pt.2: Risk Considerations

What is Merchant Whitelisting?

PSD2 & RTS enable cardholders to exempt certain merchants from SCA by adding them to their merchant whitelist. 3D Secure 2.2 brought us merchant whitelisting, also known and trusted beneficiaries, a part of the SCA exemptions. MWL allows cardholders to whitelist trusted beneficiaries in order to avoid an additional authentication step during online payment processing.

This approach leads to a truly frictionless user experience, regardless of the transaction amount or merchant fraud rate. MWL is applicable for one-click payments, including both card-on-file and recurring payments with variable amounts. It is important to mention that not all merchants are eligible for whitelisting. The selection of MWL eligible candidates is under the issuing bank's control. Depending on the merchant industry type, level of risk, and cardholder transaction history, the issuer compiles a list of merchants eligible for merchant whitelisting.

A Guide for m-commerce Merchants and App Owners

Specific conditions under which merchant whitelisting is applicable includes the following requirements:

MWL User Experience: Best Practices

The following paragraphs bring a summary of best practices suggested by VISA and MasterCard regarding the UX when it comes to merchant whitelisting.

Adding a merchant to a whitelist

There are two flows for adding a merchant to a whitelist.

This approach involves issuing bank's ACS and has less impact on issuers. Merchants would be whitelisted one at a time.

Suggested best practices include the following:

  1. Upon deeming a merchant eligible for whitelisting, the payer is offered one out of two options to add the merchant to the whitelist:
  2. Checkbox visible on the payment authentication screen. The downside of this approach is the possibility that the cardholder will overlook the checkbox, while the benefit lies in fewer clicks and using a single page.
  3. Using a separate page after the payment authentication process. This approach decreases abandonment but requires an additional click from the cardholder.
  4. Use user-friendly language and make sure that the cardholder understands what stands behind merchant whitelisting.
  5. Recommendations suggest that merchant whitelisting is available only in cases where SCA is necessary.
  6. Since both payment and whitelisting are happening simultaneously, a single SCA is sufficient according to PSD2 RTS.
Try TriDES2 DEMO

This would require issuers to make changes within their online banking service; the cardholder would be able to whitelist merchants in bulk, making the user experience much more friendly.

Suggested best practices include the following:

  1. Recommendations suggest that issuing banks add an MWL management functionality to their online banking service.
  2. A good practice would include offering cardholders their most frequent merchants (e.g. top 10), under the pre assumption that the mentioned merchants are eligible candidates according to the issuer's risk assessment. Recognizing cardholder's card-on-file and recurring payment agreements serves as a quality filter for determining their favorite merchants.
  3. Each individual adding of a merchant, or any change within the whitelist, requires SCA.

Editing and preview of a merchant whitelist

Cardholders need to be able to view, add and remove merchants from the whitelist using their online banking service. Each attempt to modify or view MWL should require SCA. This is due to having access to sensitive payment data.

Promoting merchant whitelisting

Relevant stakeholders, issuers and ACSs, are the primary promoters of the new functionality. They should therefore communicate the benefits of merchant whitelisting to the cardholders.

Use the following ''selling-points'' when educating cardholders:

Multiple cards enrollment

It is recommended that whitelisting is applied for one card at a time; the card being used for processing the payment. In case whitelisting is enabled for multiple cards, each card should require a separate SCA.

trides-download-datasheet

If you want to find out more, contact our ASEE 3D Secure Team or download the datasheet.

Secondary Site Explained - Proactive Data Recovery

We are excited to announce that ASEE set up a state-of-the-art Secondary Site. A component used for recovering critical systems and data with ACS and SxS hosting service. Having business continuity in mind as a top priority, Asseco provided a top-notch alternative when things go south.

What is a Secondary Site?

To improve our 3D Secure and authentication service we've set up a state-of-the-art secondary site in a Tier 3 Datacenter with an active-active data flow.

This means that the data from the primary site replicates to the secondary site in real-time. It activates automatically in case the primary site is not available. Meaning, this is not a classic disaster recovery waiting to be activated manually once the primary system goes down.

The new version of ACS brings notable features and mechanisms which can additionally:

Why do you need it if you're already satisfied with availability of service?

Online payment has become even more important as it continues to grow rapidly.

Ensuring business continuity in banking has become a key element in providing a good service in the payment industry so issuers need to take proactive measures that protect and recover critical systems and data. Although our high availability setup has proven itself over time, it's clear that additional security in offering of such a critical service is a must feature.

Features:

•The secondary site is on a different tectonic plate which ensures safety during earthquakes

•Internet failure is not a problem because the secondary site assures an alternative internet link. Measuring downtime is no longer a problem.

•In case of any other natural disasters like floods, lightning, or fire - risk is mitigates with a secondary site

•Also, if any HW components on the primary site go down, it takes over without the need for a technician to go to the location and change the HW manually

Key Benefits:

•Business continuity procedure and disaster recovery in a matter of minutes

•Recovery Time Objective and Recovery Point Objective reduced to the minimum

•Improved availability by up to 99,85%

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

How 3DS Mobile SDK Enhances In-App Purchase User Experience

Thinking Mobile-first with 3DS Mobile SDK

The projected retail mCommerce sales figures for 2021  are 3.56 Trillion USD, which is 22.3% growth compared to 2020. Also, in the same year, 72.9% of total eCommerce sales worldwide were registered as mobile retail eCommerce sales. The mobile payments market is expected to reach 12.06 Trillion USD in 2027, at a CAGR (compound annual growth rate) of 30.01% between 2020 and 2027.

eCommerce Apps Guide: Striking a Balance
Between Security and User Experience

These numbers point out that optimizing for mobile is imperative. Ignoring the Mobile-first economy trends will prove to be a critical mistake in terms of future business decisions. Enabling mobile access to payments in the banking sector is standard practice. eCommerce merchants are the ones who need to follow up on this trend. Investing in the development of mCommerce apps is a key element for success. Here are the stats for 2020 to back up these statements regarding user behavior:

Despite the obvious need to provide access and easy checkout within mCommerce, it is still not delivering the desired user experience compared to the desktop variant. This is where 3DS Mobile SDK comes into play. This piece of software embedded in a merchant app does wonders for the in-app user experience by enabling less friction and a seamless checkout process.

State of In-App User Experience: Authentication

AS-IS In-App UX: without 3DS Mobile SDK

As of today, most mCommerce apps still rely on browser redirection during the checkout process. You are likely to stumble upon a great deal on a retailer app. You attempt to purchase the item, but the checkout process is all over the place. This ultimately leads to abandoning the purchase altogether. Online payment flows involving browser redirection disturb the checkout user experience and consequently cause higher cart abandonment rates. Switching between the merchant app and your internet browser; redirection to suspicious screens in a fraud-filled environment; not knowing the next steps. These are all common scenarios that the user is experiencing during a purchase that can be final in a matter of seconds.

To-BE In-App UX: with 3DS Mobile SDK

3DS Mobile SDK resolves these issues by eliminating browser redirection and unnecessary friction. It brings frictionless authentication supported by richer data gathered from mobile devices. This data is a valuable source of information that is more contextual than the one gathered for online desktop payments. You are able to observe a whole new batch of data useful for additional risk parameters setup. Information such as device type, OS version, geolocation, and timezone are only a few examples.

Also, mobile enables the use of advanced authentication methods. Biometrics, fingerprint and face recognition included, enable security and convenience at the same time. Push notifications are also a form of advanced authentication that is easy to use.

The result of implementing 3DS Mobile SDK is a fast and easy checkout process. All within the merchant app. There is no need for browser redirection. Both authentication and payment processing are within a single screen. This naturally has a positive impact on user experience, as well as on the cart abandonment rates, which also decrease. 

What about security?

Also, the security aspect is heightened as well. By integrating 3DS Mobile SDK into your merchant app, you are able to collect data that is far more contextual compared to online desktop payments. By implementing gathered information about the device being used for mPayments (and the user using the device)  to your risk analysis, you are opening doors for detecting new fraud patterns. In simple terms, you are generating data that yields a much more precise Risk-based analysis.

For a detailed description of 3DS Mobile SDK benefits go to our recent blog post and get first-hand info from our expert.

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

As a dedicated guide for eCommerce app owners and merchants this eBook covers m-commerce security best practices and provides turnkey solution for in-app payments security. 

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

To find out more about Trides2 portfolio, contact us or visit our blog section.  

My Actions - My Password

Is it good that my phone knows me better than my wife?

All experts engaged in developing applications will tell you one thing – we are all human, and most of us will take convenience over security, even when dealing with banking or shopping mobile apps. So, as long as it is easy, we will not think about the danger.

However, in business we do care about security, and we do care about our customers, so we are always searching for ways to combine the two.

And that is where biometry and behavior analysis come into play.

Biometric authentication, such as fingerprint scanning, retina scanning, voice recognition and face recognition are considered the most effective user identification methods currently available because it is very difficult to actually imitate or copy somebody's biological characteristics.

Biometrics are easy to use because most smartphones have built-in biometric features. Biometric Authentication provides a completely frictionless purchase process as the user does not have to remember any username or passwords to prove their identity.

Can it get even better? Apparently, yes.

In the vast sea of mobile application functionalities, one is emerging that will prove to be very useful, albeit a little unbelievable at first sight. It is the ability of the application to memorize your behavior in the app.

Top Online Payments Security Trends

People use their mobile phones for over 50% of their waking hours. Swiping from left to right, how fast we switch through screens in different apps, how hard we press the screen with our fingers, all of this is rather unique and identifies us much more reliably than traditional passwords. Being so smooth and unique, it is no wonder that user behavior analysis has recently become one of the most popular concepts for proving user identity, which also offers the ability to automatically detect potential fraud in the app through collecting thousands of pieces of unique data after each iteration.

Financial institutions

For an online banking system, it is very important to secure user accounts and protect their assets and personal information from malicious hands due to the high sensitivity of the data held inside. There are many existing authentication methods. In general, they are categorized into knowledge-based methods, possession-based methods and biometric-based methods. All of the methods definitely have their own uniqueness (strengths and weaknesses); however, the environment determines which authentication approach is best suited.

The most important key for the authentication process is the uniqueness of security measures, which in general can be categorized into something the user knows (password/PIN), something the user has (token/smart card) or something the user is (biometrics).

Most popular biometric methods “recognize” people by their face, voice or fingerprint, but alternative and less invasive biometrics have emerged recently.

Behavioral biometric authentication goes a step further by identifying a person based on unique behavior they exhibit when they interact with a device. It allows for truly frictionless authentication that is non-invasive and uses existing hardware capabilities avoiding additional sensor costs. Platforms today use one or multiple types of behavioral patterns.

We are more predictable than we think - and that's a good thing

Humans are creatures of habit. The way we walk, the way we type, how we move our cursors around a website’s login or checkout page—these are deeply ingrained rituals that, although we don’t necessarily realize it consciously, are unique to us. Not only can we be identified by the physical details of our various body parts, but we are also defined by how we perform our daily tasks. This is the world of behavioral biometrics, where what you are is verified by what you do.

Behavioral biometrics is an emerging modality in the biometric landscape, with clear applications in enterprise security, online banking, and mobile commerce. In general, a behavioral biometric system will create a profile of a user’s quotidian habits and run in the background of an application—invisible to the user—silently matching the nuances of their actions for verification. When enough of a discrepancy is found between the user and the profile, access can be denied, or an additional verification method can enter into play. For instance: if a user fails to pass the behavioral check for some reason, a request for facial recognition can be triggered.

Benefits of using behavioral authentication

How does this work in practice?

For example, take a person using a shopping app frequently to purchase new products that usually cost under $20. They usually shop during the evening and are left-handed. These are all useful pieces of information that the system memorizes and stores as a unique identification for that person. Each time the user interacts with this app, the system will memorize their behavior and learn from iteration to iteration. With each iteration the system becomes “smarter” and the process of user authentication is much shorter.

If the system is not sure about this user and their behavior, it can additionally ask the user to enter the password or pin to authenticate additionally. Again, the system will memorize this kind of intervention as inherent to the user behavior.

To conclude, in order to keep modern customers and meet their expectations while keeping your business safe, behavioral authentication is definitely the route of future online services development. 

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

How do you benefit as a 3D Secure 2 participant?

3D Secure 2.0 provides fraud protection and online payment security to all of its stakeholders. These participants involve issuing banks, acquiring banks, merchants, and cardholders - buyers. Implementation of 3D Secure ensures additional authentication, which reduces potential fraud, including friendly fraud, lost-and-stolen card fraud, and middleman fraud. Let’s find out who is involved and how do they benefit from the 3D Secure solution.

Fear of fraud is one of the top reasons many Internet users prefer not to shop online, according to ResearchAndMarkets.com. Similar results are shown in Baymard's research: 17% of individuals said they worry about online card data security, which stops many of them to shop online. This particular buyers’ pain point should encourage banks to implement technology that provides online payment security without disrupting user experience while shopping online. An additional layer of security provided by 3D Secure makes buyers more confident when deciding to purchase and pay by card online. Please keep reading and get more insights into the 3D Secure ecosystem and its participants.

3D Secure 2 Participants

To get a bird's-eye view of the 3D Secure 2 ecosystem ASEE prepared an infographic showcasing all of its participants and their respective roles.

3d secure participants infographic

Now that you understand the roles in the 3D Secure process, we want to point out benefits for each of the stakeholders. Let’s see how you profit from the 3D Secure solution.

3D Secure 2 Participant Benefits

By implementing 3D Secure solution, all parties benefit. So take a closer look and see how each 3D Secure 2 participant gets a piece of their cake.

Cardholders:

  • Increased confidence in online payment when purchasing on the web or by mobile applications
  • Easy to use – simple and intuitive, frictionless process and redefined user experience
  • Own control of payment risk parameters
  • Uniformed 2FA authentication and user experience across all digital channels

Merchants and Acquirers:

  • Increase of sales
  • Granted liability shift for fraud and disputed transactions
  • Fast and easy integration
  • Progressive security
  • High conversion rate

Issuers:

  • More value to existing products and offerings
  • A decrease in online card fraud and disputed transactions
  • Deep risk analysis of online merchants, clients, and transactions
  • Progressive security

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Out of Band Authentication: Practical use cases for online payments within 3DS2

Out of Band authentication is, by definition, an alternative authentication method that applies a communication path that is not in direct association with the path for the initial login to the merchant app/web browser. It relies on two completely separate communication channels instead of one. This makes for a sophisticated authentication solution proven to be successful in ensuring heightened security measures. Continue reading to get a detailed overview of OOB authentication flows and practical use cases.  

What is OOB Authentication?

Out of band authentication (OOBA) is a type of two-factor authentication (2FA) that uses two different channels in order to deliver successful and secure authorization of online payments. The first channel is for making the transaction/purchase, and the second channel is the authentication channel, used for verifying the identity of the cardholder. By separating the process into two channels, using both the cardholder's internet and mobile wireless connection, the chances of compromising the transaction/account are greatly reduced. It is not likely that an attacker would be able to compromise both channels in the short timespan necessary for an online transaction to take place.

OOB authentication is widely used by financial institutions as well as organizations demanding sophisticated security requirements. It is an effective way to improve cybersecurity and known hacking methods such as ''man-in-the-middle'' attacks.

OOB Authentication General Workflow Overview

As mentioned, OOB authentication assumes two completely separate channels for conducting the successful processing of a transaction. Since it is a form of 2FA, necessary authentication components are something the user knows (password/PIN/OTP), something the user owns (smartphone/HW or SW token) or something the user is (biometry, fingerprint, face recognition).

Top Online Payments Security Trends

A common example for implementing OOBA is for making an internet banking transaction. The cardholder logs in to their internet banking account on their laptop. Upon entering the transaction details, the cardholder is recevies an SMS OTP on their mobile phone to verify the transaction. And there it is - two completely separate channels, internet and wireless network, participating in achieving heightened online payment security.

OOB Authentication and Fraud Prevention

Typically, additional authentication is necessary when an Issuing bank's risk scoring engine detects a transaction that results in a score higher than the set threshold for frictionless transactions. Depending on the risk level, the cardholder needs to apply a more sophisticated means of authentication. This is when out of band authentication comes into play, assuming two different security elements obtained through different channels.

The possession element is the smartphone registered for receiving authentication request notifications. Following are the knowledge (OTP, PIN, etc.)  or inherence (biometry) security elements. Depending on the cardholder's selection, they are required to complete the chosen authentication challenge.

OOB authentication can be done using a single device (different apps running on the same device simultaneously), multiple devices (e.g., smartphone and tablet), or in case of the absence of authentication apps, by entering an SMS OTP into a designated field within the merchant's app.

OOB Authentication Flow within 3D Secure 2

Out of band authentication is a part of the EMVCo 3D Secure protocol and is proving to effectively combat malicious attacks directed towards online payments. What makes this approach successful is the combination of active components necessary for the functioning of 3D Secure environment. Those components are, namely, 3DS Requestor, 3DS Server, ACS (Access Control Server), and the Directory server.

To better understand the authentication flow, let's review three possible use case scenarios when it comes to OOBA.

     Out of Band authentication - Single Device Flow

OOBA enables authentication outside the merchant's shopping app, using an authentication application installed on the cardholder's device. Out of band checkout flow is triggered when an authentication app installed on the cardholder's device is identified as a second authentication channel. The mentioned application can be any of the following:

Within this flow, the cardholder is switching between the 3DS merchant app to the authentication app and finally back to the 3DS merchant app displaying the transaction/payment confirmation screen.

Let's review the entire checkout flow for a single device out of band authentication. This example includes push notification and fingerprint recognition as a means of authenticating the cardholder.

  1. This can be due to Trusted Merchant Listing or card-on-file transactions.
  2. By selecting the ''Confirm order'' option, the 3DS2 flow is triggered.
  3. The 3DS Requestor communicates with the 3DS Server in order to initiate the authentication process. The sent message is received by the ACS, which determines the risk of the transaction based on the received data.
  4. ACS evaluates the transaction as a non low-risk transaction and challenges the cardholder. The 3DS requestor communicates with SDK in order to trigger the authentication flow.
  5. The cardholder receives a push notification on the registered device. Push notification is considered a first authentication factor, i.e. possession of a device.
  6. By taping on the push notification, the cardholder is redirected to the Issuer app presenting the authentication screen.
  7. Upon checking the transaction details, the cardholder either declines or confirms the authentication request.
  8. By selecting confirm, the Issuer app will trigger the fingerprint recognition process. In case the fingerprint is not recognized, a fallback method must be included.
  9. If the second security element (fingerprint) is confirmed, the cardholder is automatically redirected back to the merchant's app to complete the checkout process. By selecting ''Continue'', the cardholder is displayed a checkout confirmation screen indicating a successful transaction.

    Out of Band authentication – Multiple device flow

Numerous studies state that the vast majority of online transactions within Europe are initiated from a laptop, PC, or tablet. Research also suggests that this pattern is going to be relevant for the next two to three years. OOB authentication enables cardholders to conduct their online shopping using a laptop, while authentication can be controlled by using their mobile device.

The following flow covers an example of a cardholder purchasing items online on a merchant website (HTML flow). We will review the cardholder activity both on the laptop and on the registered user device.

  1. The cardholder is shopping from within a browser using their laptop. As in the previous example, we will assume that the cardholder is familiar with the merchant and that necessary credentials are automatically filled out.
  2. Upon adding the items to the shopping cart and selecting the ''Confirm order'' option, the 3DS checkout flow is initiated.
  3. The 3DS Server communicates with the 3DS Server in order to initiate the authentication flow. The cardholder is presented with a loading screen indicating backend activity on their desktop browser.
  4. The ACS challenges the cardholder and pushes the 3DS challenge screen for multiple device OOB flow.
  5. The 3DS Requestor initiates the challenge flow as the ACS contacts the OOB backend to initiate the authentication flow.
  6. ACS sends a push notification to the cardholder's registered device. This is considered the first factor of authentication.
  7. By selecting the push notification on the device, the cardholder is presented with the app's authentication screen. Upon transaction review, the cardholder selects either decline or confirm option presented on the screen.
  8. By confirming the transaction on the registered device, a second authentication factor needs to apply. In this case, we will again use fingerprint recognition. In case the fingerprint is not recognized, a fallback method must be included.
  9. If the fingerprint is recognized, a confirmation screen will be displayed within the authentication app.
  10. After completing authentication using the registered device, transaction confirmation within the browser displays.

     One Time Passcode via SMS

In the case where the cardholder does not have access to an authentication app, the alternative authentication method is OTP via SMS. We consider OTP (One Time Passcode) as a possession element indicating ownership of a registered device.

The following flow assumes a single device OOB authentication, including a merchant app and an OTP sent via SMS to the cardholder's registered device.

  1. The cardholder adds wanted items to the online shopping cart and proceeds to the checkout page. We will assume that the merchant is familiar with the cardholder from previous purchases. Necessary credentials such as payment card, billing address, and shipping address are already filled out.
  2. Cardholder selects the ''Confirm order'' option.
  3. The 3DS Requestor communicates with the 3DS Server and triggers the authentication flow.
  4. ACS challenges the cardholder with an additional authentication step and pushes the 3DS challenge screen. The screen is specific for OTP via SMS flow, including a field for OTP entry.
  5. The 3DS Requestor communicates with the SDK to initiate the challenge flow.
  6. ACS sends an SMS to the cardholder's registered device containing an OTP.
  7. The cardholder enters the delivered OTP in the designated OTP field.
  8. By selecting the ''Submit'' option, OTP goes to ACS for validation.
  9. SDK validates the entry with ACS, and ACS communicates the authentication result to the 3DS Requestor.
  10. A confirmation page indicating a successful transaction displays to the cardholder.

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

What is 3D Secure 2?

The release of 3D Secure 2 was motivated by reducing fraud in card-not-present transactions as well as improving the user experience during cardholder's online checkout process. Find out how 3D Secure 2 improved effectiveness both by introducing new features and bringing the security standards to a higher level without tampering with customer experience.

3D Secure 2

3D Secure 2 is an improved version of the 3D Secure authentication protocol from 2001 by VISA as an interoperable three-domain solution for online card authentication. As opposed to card transactions that occur in brick-and-mortar retail, which use chips and PIN authentication methods, there was no presented solution for eCommerce until 3D Secure stepped in.

3D Secure is an additional process that occurs before a transaction becomes authorized. The three domains are namely:

1.   Merchant: The seller that requires payment.

2.   Customer: The Card owner and purchaser of goods.

3.  Interoperability: Card scheme (Visa, MC, Amex, Diners, JCB, etc.)

eCommerce figures to consider

For a number of years, eCommerce and other online payment systems have proven to be lucrative and presented constantly growing business opportunities, accompanied by an ever-present and rising threat regarding online fraud and theft.

Below are some figures (via eMarketer) to consider comparing the annual percentages of total sales conducted online when compared to all sales that also include brick and mortar retailers, as well as the comparison of change annually within this sector and the growth that occurred from the year 2017 until the projected year 2023.

3D secure ecommerce sales worldwide

The data shows that the global eCommerce market had sales reaching $3.5 trillion by the end of 2019 and represented 14% of the global sales figures. Projections show that eCommerce sales will reach 22% of global retail figures by 2023, with total sales reaching around $6.5 trillion.

Why the upgrade?

Considering the ever-growing trend in eCommerce, security issues need to be taken care of, and significant changes regarding the authentication process are being implemented. Static passwords are untrustworthy and should be replaced by dynamic passwords and biometrics. This resulted in an improved user experience for both merchants and cardholders as well as more secure online payment processes.

Main changes included the following:

Stronger authentication 

Strong Customer Authentication (SCA) came into play as a PSD2 requirement. Its main goal is to reduce fraud and bring online payment security to a higher standard. Static passwords caused a variety of inconveniences for online shoppers, thus resulting in high cart abandonment rates. On the other hand, biometric authentication (e.g., face or voice recognition) is not only more secure than conventional static passwords. It contributes to a smooth user experience during online checkout, which cuts down cart abandonment rates. Another method within 3D Secure 2 is risk-based authentication, a setting stone for frictionless transactions. This means that transactions that are ''low-risk transactions'' do not require further authentication. This method is based on data from previous transactions and cardholder behavior information.

Improved User Experience

Bringing the security standards to a higher level without tampering with user experience presented a real challenge when it comes to 3D Secure 2. Alongside introducing new authentication methods such as biometrics, this upgrade eliminated pop-up windows and redirects which occurred during online payment, making cardholders more confident in the security of their purchase and consequently causing cart abandonment rates to drop.

Multi-device support

3D secure 2 enables authentication on a wide variety of devices. 3D Secure transactions are now available in application and browser-based solutions.

What after 3D Secure 2?

EMVCo continues to enhance 3D Secure protocol aligning it with eCommerce trends. This also refers to the buyer and stakeholder's needs to ensure the best UX and ultimate security. 3D Secure v2.1 brought frictionless authentication which resulted in a faster and more convenient checkout process. At this moment, there is actual 3DS v2.2, which brought new authentication methods; like decoupled authentication, and Trusted Merchant Listing to give additional control to buyers in managing transaction security.

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

In-App authentication shouldn't be an option, it's a must-have: 3D Secure 2 Expert Interview

3D Secure 2 is a fully PSD2 compliant solution for ensuring online payment security. It has made quite a leap in regards to the previous version of the protocol. The most notable changes are concerning mobile and In App purchasing. We sat down with our product manager for Trides2 portfolio, Dubravko Kovačić, and had a talk concerning the latest 3D Secure version and In-App authentication.

3D Secure 1 was first launched in 2001 by VISA, motivated by achieving payment security in the online ecosystem. The idea was good, but the execution not so much. Since it was not mandated by card schemes and due to poor user experience, the whole project resulted in very low adoption by card issuers and acquirers. Moreover, merchants who were willing to adopt 3DS1 suffered losses caused by increased cart abandonment rates. The reason being, again, bad user experience during online checkout.

In-App Payment Authentication

It was evident that a change was much needed. And that change happened in 2017 when the 3DS2 protocol was published. The primary motivation was to improve the previous version's performance and adapt to the fast-growing mobile commerce market.

1. Hello Dubravko! To kick off our interview, could you share more details on the most notable improvements regarding the shift from 3DS1 to 3DS2? 

Sure. 3D Secure 2 brings us the so-called ''frictionless transactions''. This means that the cardholder is no longer required to go through all of the authentication steps present in the previous version of 3D Secure technology. Thanks to Risk-Based Authentication, additional authentication steps are eliminated if a transaction is assessed as low-risk. A prerequisite for conducting such risk analysis includes collecting both transaction and cardholder data.

eCommerce Apps Guide: Striking a Balance
Between Security and User Experience

Nowadays, consumers are proficient at online shopping, and there is significant growth when it comes to the use of mobile. Smartphones are a big part of the online shopping ecosystem and demand high levels of online payments security. 3D Secure 2 enables support for full In-App authentication experience during an online purchase. By implementing 3DS Mobile SDK, the cardholder is no longer bothered with suspicious web browser redirects and is able to experience a seamless checkout experience.

2. To my understanding, merchants are also greatly benefiting from the new version of 3D Secure. Can you give us a comparison of the previous mobile authentication flow in regards to the upgraded version?

In fact, the first version of 3D Secure did not support mobile applications at all. When 3DS1 was launched, no such thing as a smartphone app existed. We are talking about 2001. Nowadays, the backdoor is redirection to web browsers at the payment step, followed by another redirection at the 3DS authentication step within the checkout.

Such authentication flow, containing multiple redirects, disturbs the cardholder for a number of reasons. Firstly, the end-user needs to maneuver between multiple pop-ups, which tends to make the authentication process confusing, difficult to follow, to say the least. Secondly, with the growing online payment fraud awareness, consumers find such flows suspicious and are likely to abandon the purchase altogether.

With 3D Secure 2 and 3DS Mobile SDK built-in merchant application, the cardholder is able to pass through all of the mentioned authentication steps without leaving the app. This makes for a streamlined In-App authentication process and contributes to an impeccable user experience compared to the first version of the protocol.

3. Sounds like quite a leap, in a good direction ofcourse. Which components are responsible for enabling such frictionless payments?

There are two main benefits for cardholders and merchants when using 3DS Mobile SDK. As mentioned, the first benefit is a smooth and fast checkout process within the mobile application. Tedious redirects between web browser screens are history. Also, when checkout and In-App authentication are initiated, mobile SDK participates in the collection of various transaction, device, and application data (IP address, device ID, geolocation, etc.). This is necessary for conducting a more precise risk analysis mentioned earlier. All of the mentioned factors participate in assessing the risk of a particular transaction. More data means more accuracy. Therefore, issuing banks, who are responsible for risk scoring, can be more confident in granting frictionless authentication.

4. Talk us through the implementation and onboarding process of 3DS2 Mobile SDK. Is the mobile app able to do business as usual, or are there any delays caused during the integration process?

3DS Mobile SDK is in the hands of mobile app developers. Integration of SDK in their mobile applications is their ''business as usual''. Also, they are able to test the 3DS process using our 3DS test server available to third-party developers and 3DS integrators.

5. Got it. In your opinion, what are the most notable benefits mobile SDK brings, business-wise?

3DS SDK enables a better checkout user experience, which is top of the list when it comes to purchase abandonment reasons. Also, it contributes to a more accurate risk assessment due to the wider set of acquired transaction and device data. More confident risk analysis results in a higher rate of frictionless transactions, again providing a better user experience.

In addition, it is important to mention that 3DS2 generally brought us more advanced authentication methods, including biometrics.

6. SDK sounds like a bundle of perks for both merchants and cardholders. How does Trides2 portfolio fit into this 3D Secure 2 story?

Trides2 portfolio covers all 3D Secure software components needed for all online payments stakeholders. This includes Access Control Server with risk scoring for card issuers, 3DS Server for acquirers and payment service providers, and 3DS SDK for mobile app merchants. We also provide 3DS Test Tool for each of the mentioned components, regardless of independent testing or end-to-end 3D Secure transactions.

ASEE is a pioneer in 3D Secure, dating back to 2004 with 3DS1. This means 17+ years of experience in this area. In the past two years, we have supported 50+ banks, payments processors, and payment gateway providers in migration from 3DS1 to 3DS2, upgrading the authentication methods from signature and SMS OTP to PSD2 compliant methods such as mobile OTP, push notification, and biometrics.

7. I see, Trides2 is truly a one-stop-shop for 3D Secure 2. To finish off, we would like to hear how do you view the future of online payments and how does 3DS2 fits into that future?

All merchants, especially online merchants, are aware that today's buyers are very demanding. Fast and smooth service is the top of their priorities. Keep in mind that online buyers are mostly millennials and gen z, who are notorious for impatience and wanting everything to be over in just a few clicks. Having this said, In-App authentication will have to rely on efficient risk scoring in order to minimize the buyer's effort. When authentication is truly necessary, it will be based on behavioral authentication and AI analytics, enabling, again, authorization without the buyer's action.

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

As a dedicated guide for eCommerce app owners and merchants this eBook covers m-commerce security best practices and provides turnkey solution for in-app payments security. 

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

To find out more about Trides2 portfolio, contact us or visit our blog section.  

What is Friendly Fraud and how to prevent it?

How can something that sounds so innocent cause so much trouble for merchants and issuers? After all, how can fraud be described as friendly? The name comes from the simple virtue of convincing the merchant that the actual fraudster is the victim of fraud by making plausible and honest-like claims. Imagine the backlash you, as an issuer or merchant, would get if you neglected a legitimate dispute under the claim that you're suspecting it is an attempt of friendly fraud. Now that you understand the complexity of the problem, let's start from the beginning.

Friendly Fraud 101

The first distinction between friendly fraud and conventional fraud in online payments is the fact that the fraudster is not using a stolen credit card or credentials, but their own (or from a friend, family member, etc.). The initial intent of the ''friendly fraudster'' is to receive and retain goods and services while asking for chargeback under the claim they did not make the purchase nor receive goods or services.

eCommerce Apps Guide: Striking a Balance
Between Security and User Experience

A common scenario is the following; a cardholder purchases goods from a merchant and claims they did not make the purchase, did not receive the goods, or received a partial order. This gives the cardholder enough ground to file a chargeback, demanding a full refund.

It is evident that there is a common denominator when it comes to friendly fraud - chargebacks. That is why friendly fraud is often referred to as chargeback fraud. The cardholders with ''unfriendly'' intentions have figured out how to game the chargeback process. In order to benefit from it, they claim legitimate purchases to be fraudulent.

Chargeback: Returning funds to the cardholder by revoking funds from the merchant based on a reported fraudulent activity.

Friendly Fraud: Any scenario where a cardholder wrongly files a suspicious charge, either by mistake or with malicious intentions.

Now that we cleared up the difference, it is good to know that 86% of all chargebacks (Paymentsource) are likely to be friendly fraud. A  mechanism used for protecting the customer is being abused, and merchants' hands are tied.

Types of Friendly Fraud

The truth is, not all friendly fraud is malicious. There are cases where an honest misunderstanding took place. But that makes things even more complex when it comes to detecting and preventing such fraudulent activities. Let's go through our list and distinguish the ones which are malicious from unintentional ones.

1. Chargeback vs. Refund

An average cardholder does not understand nor cares about the difference between chargebacks and refunds. Instead of contacting the merchant to file for a refund, they go to their issuing bank to reverse the charges. This results in a chargeback, which harms the merchant.

2. Auto-Pilot Mode

Good memory or bad memory, living in today's fast-paced world often results in unintentional fraud reports. Recurring payments and transactions made in a rush tend to fade out from our memory, causing confusion when we take a look at our transaction history. What do we do? File a chargeback dispute.

3. Unfamiliar Descriptors

There are cases where the cardholder is not able to recognize the company name on the billing statement. This can be due to rebranding or the business simply being registered under a name different from its legal business name because of branding. Red flags are automatically raised in the cardholder's head, and the only logical option is to open a dispute.

4. Bad Communicators

In some cases, people share, even borrow credit cards from their family, partners, coworkers, etc. Despite there are no ill intentions, we fail to inform one another about particular purchases. This results in confusion, suspected fraud, and finally, a chargeback.  

5. Malicious Intentions

This one is for the cardholders who tend to abuse the chargeback process. They game the system by falsely reporting transactions made by themselves. Typical claims involve unsuccessful delivery, unapproved authorization, partial delivery of the purchase, all resulting in chargeback processes harming the merchant. 

Who is to blame?

Given all the facts, friendly fraud resulting in chargebacks damages the merchant, leaving the fraudster without consequences and with full pockets. The question of the day is: Why do we tolerate this behaviour?

Banks and card associations have created an environment that puts customers first. If an issuer wants to issue or receive payments from a particular card scheme, they need to comply with the card scheme's rules and regulations. Since the end goal for card schemes is to increase the number of cards used by cardholders, they encourage consumer-first policy and guarantee rights regarding transaction disputes.

By association, issuers are adopting the consumer first policy, favoring customer rights over merchant rights. Unless the merchant has solid proof that the cardholder disputed a chargeback with ill intentions, the chances of coming out victorious are slim to none.

How to Find a Way Around Friendly Fraud?

Fraud can't be terminated, but it can be influenced. Friendly fraud is a specific genre of online fraudulent activity. No matter the circumstances, if a cardholder with malicious intentions is determined to game the system through the chargeback process, the chances are, he will execute it. But keep in mind, only one out of five mentioned types of friendly fraud involves intentional fraud.

By undertaking some specific fraud-prevention actions, you can reduce the likelyhood of friendly fraud. Here are a few tips on how to approach this issue:

The Future is Looking Bright

Friendly fraud as such is not in the primary scope of 3D Secure. However, 3D Secure 2 is very much focused on transaction risk scoring. It provides a frictionless user experience by identifying low-risk transactions. Risk scoring services in 3D Secure evolve through the year by deploying machine learning, behavior analytics, and artificial intelligence algorithms in risk scoring.

So the answer lies in gaining in-depth data about customers,enabling quality prediction and a better understanding of where threats are coming from.

AI-powered analytics are able to provide insight into unusual behaviour patterns. It is useful for detecting suspicious activities involving friendly fraud as well. More data will provide more knowledge about frequent chargeback and refund abusers, making them blacklisted.

Merchants should be able to set certain parameters such as refund limit per customer or prevent customers from demanding a refund for a specific period.

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

As a dedicated guide for eCommerce app owners and merchants this eBook covers m-commerce security best practices and provides turnkey solution for in-app payments security. 

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

To find out more about Trides2 portfolio, contact us or visit our blog section.  

False declines and why you want to avoid them

False declines are frustrating. Whether you're a cardholder, merchant, or issuer, false declines are never pleasant and you should avoid them at all costs. They result in a missed opportunity for a pinned sale, reduce revenue for both merchants and issuers, and most notably, send customers packing right in the hands of the competition.

False declines are legitimate transaction attempts that are declined because of suspected fraud. They are the so-called ''false positives'', fully valid transactions classified as invalid, and rejected by the Access Control Server (ACS).

eBook: How to choose the right 3D Secure software

Picture this - you're about to purchase something online, let's say a new smartwatch. You spend some time researching all of the functionalities. You find the best deals offered to you from various merchants. That's it! After hours, maybe even days of researching online, you are finally ready to make a purchase. You enter all of the required details necessary to finalize your purchase, and – your order declines. Frustrating would be an understatement for this situation.

Now let's examine the next steps. The cardholder will most likely turn to the competition or use a different credit card in order to process their order successfully. Either way, there will be a loser at the end of this story. The cardholder will keep this unpleasant situation in their mind. The chances of them using the same declined credit card or returning to the ''problematic'' merchant are slim to none.

And there it is; a missed sale, reduced revenue, and an unhappy customer - the three horsemen of false declines.

Why do false declines happen?

The occurrence of false declines is closely connected to the anti-fraud solution used by the merchant, issuer, or acquirer. The cardholder is usually presented with a generic message such as ''transaction refused''. This offers no additional information that explains the decline or guides the cardholder to take the next step.

Common reasons for false declines involve the following:

  1. Merchant side issue – anti-fraud solution rejected a valid transaction.
  2. Acquirer side issue – anti-fraud solution rejected a valid transaction, e.g., false positive in address verification.
  3. The Risk-management solution configuration is too strict.
  4. The issuing bank is suspecting fraudulent activity.

Also, anti-fraud solutions based on behavioral analysis might classify a transaction as fraudulent, while it is, in fact, a valid one. Let's say that the cardholder has a pattern of purchasing low-value items online, not more than 10 EUR per transaction. All of a sudden, that same cardholder decides to book an all-inclusive trip online. Regardless of sufficient funds and correct card information during checkout, the transaction might be blocked because the pattern is unusual, and the system flags it as suspicious or fraudulent activity.

Balancing between false positives and false negatives

There is a fine line when it comes to configuring the ACS solution in order to identify suspicious transactions correctly. False negatives represent transactions that are fraudulent but are valid according to the system. On the other hand, we have false positives, which represent valid, honest transactions that end up as false ones. Configure the system ''too loosely'', you're going to end up with false negatives. Set it up ''too strictly'', you are risking a high number of false positives, i.e., false declines.

False declines vs. Fraudulent transactions

If we examine the end impact of fraudulent transactions, we need to keep in mind that the loss is not equal to the amount of the processed fraudulent transaction. It can be anywhere from 100% (gold) to 0% (digital goods) of the amount displayed in the web store. If we take sneakers as an example, the total cost of loss will be equal to the manufacturing cost. It is usually as low as 5% of the displayed price.

When talking about false declines, the end impact is much more significant. After receiving a notification about an invalid transaction, the cardholder doesn't have any guidance on the next steps. They will most likely use a different credit card or look for the same product/service in the neighbor's yard, the competition. Either way, they are leaving with an unpleasant experience with the overall service, and it is not likely that they will use the same rejected credit card or revisit the same merchant.

Riskified surveyed 5000 US-based consumers in order to find out more about their online shopping experiences and fraud. Regarding our topic, the survey discovers that almost one-third of shoppers in every segment are wrongfully rejected during a purchase, resulting in a false decline. After being rejected, 42% of shoppers abandon their cart immediately and move on to the next best thing. If we look at the big picture, that means that all acquisition costs and efforts went through the window because of a ''single'' false decline.

False positives are extremely expensive. The Global Fraud Survey published by the Merchant Risk Council states that the average online store rejects 2.6% of all transactions under the claim they might be fraudulent. The pricing pattern says that the higher the price, the higher the percentage of declines (e.g., merchants decline around 3.1% of orders over 100$).

3D Secure 2 and False Declines

3D Secure 2 enables issuers to access ten times more transaction data than before, which results in more precise risk analysis and profile creation of the cardholder. The end result? Less false declines, among other benefits, of course. Both merchants and issuers are able to increase profits and keep their customers satisfied and returning to use their service.

the ultimate mobile application security checklist

eBook: How to choose the right 3D Secure software

This eBook contains all the critical elements you need to consider while making intelligent, well-informed decisions regarding implementing 3D Secure technology.

eBook: How to choose the right 3D Secure software

To find out more about Trides2 portfolio, contact us or visit our blog section.  

PSD2: An Overview of the Second Payment Services Directive

Although there is a lot of talk about PSD2, we understand that the information contained in the directive can be, and indeed is, overwhelming. To understand the primary motivation behind the PSD2 regulation, we covered key points relevant to you and your business on a single page. 

What is PSD2?

As stated by the official summary of the PDS2 directive, the main goal of the regulation is to provide a legal foundation for the further development of electronic payments within the EU. It is a comprehensive set of rules aiming to make payments within the EU simple, efficient, and secure. Motivated by offering a broader set of choices and better prices for consumers, PSD2 advocates opening up payment markets to new participants, to create more competition, leading to greater efficiency and strengthening consumer's trust.

eBook: How to choose the right 3D Secure software

The directive strives to enhance the existing set of EU rules regarding electronic payments. It emphasizes innovative and emerging payment services, such as internet and mobile payments. Rules stated in the directive concern security requirements, i.e., safeguarding consumer's financial data, promising secure authentication, and reduction of online payment fraud rates. Transparency is another key point that PSD2 advocates in order to provide accurate and timely information about requirements regarding the payments services. PSD2 establishes the rights and obligations of participants involved in the online payment environment. The users, as well as providers of payment services.

Several notable suggestions regarding leveling the payments playing field are pointed out, and those are the following:

  1. Expanding the EU payments market – PSD2 advocates opening the payment market to new participants in an effort to decrease the monopoly banks have over the customer's accounts and payments services, promising increased efficiency without compromising the security of online payments,
  2. Empowering consumers – consumers have reduced liability for non-authorized payments, unconditional refund rights for a predefined period of time (8 weeks), eliminated surcharges for the use of a consumer credit/debit card,
  3. Restricted interchange fees – PSD2 limits interchange fees between banks for card-based transactions in an effort to reduce merchant costs for accepting credit/debit cards as a means of payment.

What happened to PSD?

The first payment services directive dates from 2007. While it set out good practices and regulated guidance on rules regarding payment services, as of today, it is obsolete. With the rapid evolution of ''all things digital'', new e-commerce trends, authentication methods, and the overall innovative approach to payment markets, PSD was outdated and needed an upgrade. Now that we had a brief history lesson let's get back to our main topic.

PSD2 participants

With new regulation came new terminology, and below are the ones concerning PSD2:

AISPs (Account Information Service Providers) – Providers that can ask for permission to connect to a bank account using an API. They use that bank account information in order to provide a service. Having access to such data implies a ''read-only'' approach, i.e., they can't move the fund from the account.

ASPSPs (Account Servicing Payment Service Providers) – A customer's issuing bank that provides and maintains payment accounts. They publish APIs so that the customers are able to share their account data with TPPs in case they want them to initiate payments on their behalf.

PISPs (Payment Initiation Service Providers) – Authorised PISPs are able to move funds on the customer's behalf upon connecting to the bank account. An example of a practical use case is the automatic transfer of funds to a customer's savings account.

TPPs (Third-Party Providers) – Third-Party Providers are either/both Payment Initiation Service Providers (PISPs) and/or Account Information Service Providers (AISPs).

PSUs (Payment Service Users) – Users of any of the above mentioned service providers.

What changes PSD2 brings?

PSD couldn't foresee trends in the payment industry ten years in advance, and that is why PSD2 steps in. It brings a fresh set of rules in an effort to enable modern, innovative payment services to users. PSD2 provides them with the highest level of security in terms of online payment fraud, which is constantly present. A comprehensive list of the most important payment threats published by the Europen Payments Council makes you think twice before entering your card data to process an online payment, and it should. Take a look.

The 2019 Payment Threats and Fraud Trends Report provides an overview of the most important threats in the payments landscape, including:

  1. social engineering,
  2. malware,
  3. advanced persistent threats (i.e. sophisticated targeted malicious attacks aimed at a specific individual, company, system, or software),
  4. mobile device-related attacks,
  5. denial of service attacks,
  6. botnets (i.e. a network of private computers infected with malicious software and controlled as a group),
  7. threats related to cloud services and big data, IoT, virtual currencies

Strong Customer Authentication

In order to combat fraud, PSD2 introduced Strong Customer Authentication (SCA). PSD2's weapon of choice protects customers by demanding them to authenticate with two out of three authentication elements, namely:

  1. Knowledge - something the user knows (PINs and passwords, for instance)
  2. Possession- something the user owns (a token or a mobile phone)
  3. Inherence - something the user is (biometric authentication including fingerprint, face recognition, voice scan)

Initially, this put pressure on issuers and merchants. They were wary of the effects it will have on the overall traffic. The added authentication steps could potentially drive away the customer from their purchase. But there is a cure for this disease, and it comes in the form of SCA exemptions within the scope of the SCA mandate.

SCA exemptions

SCA exemptions include various scenarios where SCA is not necessary. The customer is not asked for an additional authentication step during the processing of a payment. SCA exemptions are the following:

  1. Low-risk transactions – within other innovative approaches in the payments industry, shared information about customer's account data-enabled risk scoring or the so-called Risk-Based Authentication. It enables risk assessment of an individual transaction, deeming a transaction either high, medium, or low risk. In case a transaction is classified as low risk based on predefined parameters, additional authentication is not needed.
  2. LVP (Low-Value Payment) – transactions less than or equal to 30EUR are considered low-value transactions and do not require additional authentication. This rule is applicable for up to five consecutive payments equal to or less than 30EUR and in cases when the cumulative value since the previous SCA is equal to or less than 100EUR.
  3. Trusted Merchant Listing – The cardholder is able to trust list a merchant (if they are eligible for whitelisting, this is managed by the issuing bank) and avoid additional authentication because they believe that the merchant is known and can be trusted.
  4. Corporate payments – processing payments with a card that belongs to an entity rather than an individual.
  5. Recurring payments – Subscriptions, loans, and similar payments with a fixed amount require SCA only for the first payment. In cases where the amount changes, SCA is mandatory for each individual change.

Out of scope - SCA

There are other scenarios that are out of the scope of the SCA requirement but are not classified as SCA exemptions.

  1. Merchant-initiated transactions – payments initiated by the merchant on the customer's behalf based on an agreement.
  2. Mail order/Telephone order – commonly known as MOTO transactions, they are out of the scope of the SCA requirement.
  3. One leg out transactions – Cases where either the card issuer or acquirer (or both) are outside the EEA.
  4. Anonymous transaction – Cases where a gift card is issued to a customer without identifiable cardholder credentials.

3D Secure 2.0

3D Secure is a protocol that enables Strong Customer Authentication and protects online payments by adding an additional layer of security. It is the main determinant for PSD2 compliance and enables both payment service providers and merchants to achieve alignment. You can get more insight on the latest version of the 3D Secure protocol in our blog post. 

How to achieve PSD2 compliance?

If you're a merchant or a PSP, main question of the day is: Am I PSD2 compliant? If not, how do i become PSD2 compliant?

Merchants need to decide between two options. One option suggests that they pick a PSD2 compliant PSP. This relieves them from all the administrative aspects of compliance and enables them to focus on their primary business. The second option advises merchants to integrate authentication into their checkout process. This requires more effort financially but enables them to be PSD2 compliant and in charge of the customer's checkout experience.

If you're an issuing or an account-holding institution, you want to follow the following steps: create APIs in order to enable transactional payment data access, provide access to accounts to TPPs, make sure you have a Consumer Identity and Access Management solution set up in place, and finally implement the network and API security infrastructure.

Lastly, Third-Party Providers must take care of their PISP or AISP license. They need to establish a trust framework with banks and financial institutions. Next, they need to develop secure apps including user consent and fraud monitoring. Lastly, TPPs need to implement a consumer IAM solution.

Key takeaways

Although PSD2 is causing a stir in the online payments industry by demanding fast onboarding and regulatory compliance, it brings an array of new opportunities for new players in the payments environment. Increased competition most definitely increases efficiency and boosts customer trust. By introducing innovative approaches in regards to online payment security, it reduces payment card fraud, as well as opens doors for further improvement in the risk assessment department enabled by extensive data sharing. Even though PSD2 enforces strict rules and binds the participants to comply, it is done in an effort to assure more quality services that do not compromise on security.

the ultimate mobile application security checklist

eBook: How to choose the right 3D Secure software

This eBook contains all the critical elements you need to consider while making intelligent, well-informed decisions regarding implementing 3D Secure technology.

eBook: How to choose the right 3D Secure software

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Feature Overview: 3D Secure 2.1 vs. 2.2

Since the first 3D Secure protocol was launched in 2001 by VISA, the online payments ecosystem changed substantially regarding regulation and channels used for conducting online payments demanding improvements regarding the user experience of the solution and a more flexible approach. The new versions of the protocol enable SCA on mobile apps, support biometric authentication, and allow exemptions. All in order to provide the stakeholders with a solution that brings benefits to all parties.

Importance of 3D Secure

Online payments have been around for quite a while. However, last year marked with the Covid-19 pandemic, caused a big spike in the number of stakeholders who went online. For reference, Office for National Statistics states that online sales in the UK accounted for 35,2% of all retail in January 2021.

A 2021 report from Retail Economics and Natwest reports that 46% of UK consumers bought goods and services online that they, prior to the pandemic, only ever purchased online. What makes this a new trend is the following fact; 32% of consumers state that they plan to continue with their new shopping habits in the future.

eBook: How to choose the right 3D Secure software

Such numbers pose new opportunities as well as threats. As more and more people turn online to purchase goods and services, those with ill intentions do not waste time. Security questions regarding online payments have popped up, and that is where 3D Secure steps in. In order to provide ultimate security in the online payments ecosystem, EMVCo's specification reflected on current and future market trends to support security, performance, and user experience.

Issuers are still on the fence when it comes to adopting new 3D Secure versions. But there is no doubt about the benefits they bring to the table. From security matters to user experience improvements, 3D Secure ties it all together. Key benefits the protocol provides are the following:

3DS v2.1 Overview

Since the previous 3D Secure v1.0, there had been a lot of changes in the online payments industry. One of those major changes was extending to mobile apps and securing mobile payments, impacting both security and user experience positively. Secondly, since mobile emerged as one of the alternative online payment channels, alternative authentication methods, which are becoming today's standard, were introduced. We're talking about supported biometric authentication, which provides a high level of security without tampering with user experience during the checkout process.

Following, 3D Secure v2.1 collects ten times more data than the previous version, allowing issuers to conduct a more precise risk analysis, resulting in fewer step-ups and false declines. A new feature introduced in this version enables Merchant-Initiated Transactions, such as subscriptions. The first payment requires SCA, but the following identical payments do not. One of the essential upgrades revolves around the PSD2 SCA requirement, making the 3D Secure v2.1 a fully compliant solution.

3DS v2.2 Overview

3D Secure v2.2 includes all features provided in the v2.1 upgrade, plus some extra benefits. Supported SCA exemption flags allow for a more flexible approach. This is thanks to enhanced risk analysis which resulted in low-value payment exemptions as well as merchant whitelisting. The cardholder is in control when it comes to choosing the authentication method they want to apply during checkout. It makes the solution more user-friendly and the authentication process straightforward. Moreover, decoupled authentication introduced in this version allows authenticating the transaction at a time different from when the transaction occurred, which comes in handy in scenarios such as recurring payments or split shipments. Another feature included in the v2.2 is delegated authentication, which means that issuers can enable third parties (merchants, acquirers, etc.) to conduct the authentication on their end. This method eliminates unnecessary friction and provides a better customer experience.

To sum up

A considerable leap happened between 3D Secure 1 and 3D Secure 2, influenced by the fast-moving global digitalization, demanding more security and less friction. New versions of the 3D Secure protocol successfully overcame all of the obstacles 3D Secure 1 encountered. They are compliant, flexible, secure, and user-friendly.

eBook: How to choose the right 3D Secure software

This eBook contains all the critical elements you need to consider while making intelligent, well-informed decisions regarding implementing 3D Secure technology.

eBook: How to choose the right 3D Secure software

To find out more about Trides2 portfolio, contact us or visit our blog section.  

ASEE certified EMV® 3D Secure Server upgraded to EMV3DS v2.2

Asseco SEE successfully completed the EMVCo testing and received the EMVCo Letter of Approval for the TriDES2 3D Secure Server aligned with the EMV® 3D Secure v2.2 standard. The TriDES2 Secure Server enables merchants and acquiring banks to protect online payments from fraudsters at their web and mobile shops via interoperable 3D Secure authentication.

EMVCo continues the 3D Secure strategy set with EMV3DS v2.0 – having a strong focus on adopting current trends in e-commerce and online payment, fast and smooth transactions, minimal friction and disturbance for the Payee, great User Experience, and ultimate level of transaction security.

Check out most notable 3DS v2.1 and 3DS v2.2 improvements in our recent blog post.

3D Secure Server v2.2. improvements

In 3DS v2.2 there were additional protocol improvements in this direction. These improvements include the following:

Both VISA and MC, have different 3DS 2.2 adoption roadmaps. As one of the main card schemes, VISA has defined a milestone for issuers and acquirers to adapt to EMV3DS 2.2; until the end of Q1 this year (2021). However, Mastercard has not set such a milestone; since MC has adopted some of the features from EMV3DS 2.2 through its MC 2.1+ extensions.

In addition, ASEE provided a comprehensive overview of the extended transition period. Learn more about the efficient management of the extended transition period in our recent blog post.

eBook: How to choose the right 3D Secure software

This eBook contains all the critical elements you need to consider while making intelligent, well-informed decisions regarding implementing 3D Secure technology.

eBook: How to choose the right 3D Secure software

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Holiday Season Fraud: Predicting (un)fortunate events for 2021

This year's holiday shopping season came early. Merchants are not wasting any time and are heavily promoting Black Friday deals and seasonal discounts. All in an effort to attract customers. Naturally, cardholders are rushing to get a good deal and making sure that all of their goodies arrive on time. This results in heightened online shopping activity across both desktop and mobile channels. What makes these jolly moments less enjoyable are fraudsters waiting around the corner to take advantage of the holiday season shopping frenzy.

2021 Holiday season stats to consider

A recent survey by PowerReviews reveals how and when consumers will approach holidays and what influences their purchasing decisions. Nearly 8000 customers provided insight into their shopping habits and intentions for this holiday season. We focused on stats relevant to the online shopping side of the story and filtered the most important findings.

Fraud related findings state the following:

  • Desktop online shopping orders are more likely to be an attempt of fraud compared to mobile orders.
  • More than half of overall orders recorded on peak online shopping activity dates such as Black Friday and Cyber Monday are done through mobile.
  • Merchants state that over 10% of their chargebacks from the previous year are a result of ATO attacks.

Fraud expectations and prevention during holidays

These stats tell us that the shopping season started particularly early in 2021, as early as September. This gives the fraudsters more time to operate on busy grounds and take advantage of overlooked billing statements. Although the percentage of consumers who plan on shopping online this year (41%) is lower than the one in 2020 (64%), it still indicates a consistent growth of consumers turning to online shopping. Keep in mind, in 2020, Covid-19 restrictions prevented consumers from shopping in brick-and-mortar stores. It is expected that a portion of that 64% from 2020 will return back to their old habits and enjoy holiday shopping in-store.

eBook: Leveraging the full potential of payment data

Also, data referring to the importance of returns and refund policies indicates that the cardholders are more aware of how to protect their purchases. On the other hand, there is a number of bad guys who use these policies for their own gain and abuse the refund and chargeback system. Merchants need to prepare for increased numbers of chargeback disputes and develop efficient workflows on how to filter cases that are worth fighting for.

Predicting (un)fortunate events

The holiday shopping season is in full force, and so is the fraud that comes with it. We can't talk about exact stats yet, but some things are sure. Following is what financial institutions, merchants, and cardholders can expect in the upcoming days:

  1. The card-not-present channel is targeted by fraudsters more than ever before. That is due to heightened online shopping activity, which leaves them more ground to work on. Overlooked security issues within eCommerce will most certainly arise.
  2. As 3DS1 end of life is around the corner, 3D Secure 2.0 will be in full force. The new version of the protocol promises increased online payment security and liability shift in cases of online payment fraud.  
  3. Merchants are becoming skilled with fraud control. They are now aware that they can adjust the security levels according to their own preferences and needs. That being said, during peak transaction activity season, merchants are ready to compromise security in order to provide a better user experience to their existing, and more importantly, new customers.
  4. Our inboxes will be swamped with deals that you just can't say no to. eCommerce marketing teams will be working hard, but fraudsters will be working harder. If you receive an offer in your inbox that sounds too good to be true, it probably is. Think twice before clicking any links on such deals yourself and warn customers about bogus email deals.
  5. Typical for the holiday season is the increase in chargeback fraud - a malicious trend in the online payments environment. This type of fraud is particularly difficult to detect since the fraudster is the actual cardholder who is abusing the chargeback system. It is also referred to as friendly fraud. A nail-biting statistic for merchants is that 86% of chargebacks are considered to be friendly/chargebacks fraud.

Holiday season fraud prevention best practices

Here are the tips on how to handle the holiday shopping season by mitigating risk and following best practices:

Fraud history review and systematic approach

Review historical data from previous years and find common patterns for fraudulent/damaging transactions. Document these findings, design workflows for approving/declining orders, point out key criteria for determining suspicious orders, and define the next steps after a transaction is flagged as suspicious. Ensure that your teams are up to date with mentioned processes by providing additional education regarding fraud prevention during the holiday season.

Chargeback process flow

An increased number of incoming chargeback disputes is inevitable. This is due to the higher volume of online shopping, which sometimes causes confusion when a cardholder takes a peek at their billing statement. Oftentimes they don't recognize transactions because of bad billing descriptors and merchants at whom they shopped for the first time. Set yourself up for success, take a look at our blog post Merchant Guide: How to win a chargeback dispute? 

Review your returns policy

As mentioned, returns and refunds will be flowing in at a higher rate than usual. Adjust your return and refunds policy for the time being. Limit the return date for high-value items, set cutoff dates during the holiday season. While you're at it, take a closer look at your policy and search for potential loopholes that the fraudster might take advantage of.

Watch out for ATO attacks

Account takeover attacks are also common to make an appearance at a higher velocity during holidays. A swarm of new accounts makes it even more difficult to determine if a legitimate owner of the account is making a purchase. To minimize risk, enable two-factor authentication to your users, watch out for spoofed versions of your website related to stealing user login credentials, and put effort into detecting data breaches.

Shift liablity

By implementing 3D Secure 2, merchants are shifting the liability for fraud to the issuing bank. That means that all losses caused by a proven fraudulent transaction will have to be covered by the cardholder's issuing bank.

eBook: Leveraging the full potential of payment data

ASEE provides actionable advice on how to confront the high cart abandonment rates for mobile, as well as provides the tools that have the capacity to address other mCommerce challenges.

eBook: Leveraging the full potential of payment data

To find out more about Trides2 portfolio, contact us or visit our blog section.  

Buy Now, Pay Later (BNPL) option opening new fraud opportunities

Digital transformation led to innovative financial solutions, one of them being the ''Buy Now, Pay Later'' option commonly abbreviated as BNPL. It enables consumers to relieve the financial pressure and acts as a layaway plan enabling them to redistribute the amount in a predefined number of payment installments. Despite being favored by the general public and gaining more popularity over time, the average consumer is not the only one showing interest in BNPL options. Fraudsters got themself another greenfield for their operations. Let's go through everything you need to know about BNPL, advantages, and risks included.

How does BNPL work?

The general idea of a BNPL service is to allow consumers to split a purchase into a fixed amount of payment installments. Buy now, pay later; quite literally. As a financial instrument that commonly does not charge interest; i.e. if payments meet the deadline; it is an attractive way of making both online and traditional point of sale purchases for many consumers. Some of the most popular BNPL services include Affirm, Afterpay, and Splitit.

Top Online Payments Security Trends

It is a favored payment method in underdeveloped markets where consumers do not have access to a great variety of credit options. Another segment that is fond of BNPLs are Millennials and Gen-Z. Using such a service, they avoid potentially high interest rates and are not required to pass credit checks to apply for a credit card.

Buy Now, Pay Later (BNPL) flow

By subscribing to a BNPL service, merchants enable their customers to split their purchase into equal payment installments over a predefined period of time. The payment option is triggered at point-of-sale, regardless if a purchase is made in a physical store or online. In the case of an online store, after adding items to the cart, the customer is able to choose BNPL option at checkout. They are then redirected to a BNPL service provider, where they authenticate themselves and select the number of wanted payment installments. 

Specific for BNPL payments is the liability issue. Regarding that the BNPL service provider pays the amount of the purchase to the merchant as a whole, and the customer makes periodic payments to the BNPL; liability lies with the service provider. In simpler terms, any form of chargeback won't concern the merchant. This is an additional reason for merchants to offer their customers the Buy Now, Pay Later option.

Stats to consider

As more people turned to online shopping caused by the ongoing Covid-19 pandemic, BNPL services bloomed and are continuing to grow. As demand grows, the market responds. Affirm now offers a virtual credit card enabling consumers to shop at thousands of online and point-of-sale merchants that have Affirm integrated into their checkout.

A study by The Ascent regarding BNPL services showcased insightful stats about consumer's Buy Now, Pay Later habits. Here are some interesting ones to consider:

Types of BNPL fraud

In order to process a BNPL payment, the user must create an account with a particular BNPL payment service provider. The account in question is vulnerable and exposed to various types of fraud already present.

Account Takeover Fraud

Since having an account is one of the main prerequisites for the consumer to process a BNPL payment, ATO fraud is a potential threat. Moreover, regarding that the payment is delayed, the rightful owner might not notice strange activity happening on their account up to several weeks.

New Account Abuse

It is fairly easy to set up a BNPL account; in some cases, one might need only a driver's license or current address as proof of identity. Generally, such information is easily accessed after data breaches or obtained through phishing. After setting up the account using fake information, the fraudster has access to the default line of credit offered to all new accounts.

Synthetic Fraud

Following the above mentioned account abuse, another popular way of creating an account for fraudsters is synthetic fraud. The bad guy literally invents a new persona and uses it to create legitimate looking accounts for their own personal profits.

Friendly Fraud

Another way of making unauthorized BNPL payments is friendly fraud. A family member; e.g. child; might gain access to the device and process a BNPL payment without the parent knowing about it.

Fraudulent Chargebacks

There are two main types of fraudulent chargebacks. The first one involves a rightful owner who detected an unauthorized purchase on their billing statement and demands chargeback. The second one stages an opportunistic owner who claims that they never made a particular transaction and demands funds to be returned to their account.

Signs of BNPL Fraud

Customer behavior is the main indicator when it comes to detecting suspicious activity. Pay attention to the following tell-tale signs of potential fraud.

Shipping Address

If the shipping address does not match the one in the account information, you might be shipping goods to a fraudster. Keep an eye on this one.

Unfamiliar Devices

Customers tend to stick to the same devices when online shopping. An unfamiliar device is a good sign to dig a little deeper and look out for other suspicious activity tied to the particular account.

Newbies

Be careful with new accounts. If a customer is making their first purchase, make sure that there are no other signs of suspected fraud.

Purchasing Behaviour

Looking back at the user's history record, does this particular purchase fit the profile? Are there any unusual shopping patterns that are not typical for that particular customer?

Transaction Velocity

If you notice that an account is making multiple purchases in a short period of time, it might be a fraudster on the other end who is trying to profit as much as possible before getting discovered.

When looking for threats and potential signs of fraud, make sure to think critically. Don't raise alarm bells if only one out of mentioned indicators is present. False positives can alienate customers from using your service.

How to fight BNPL fraud?

Validate information

Make sure that the information provided during account setup is valid. Simple checks like validating the entered email address, as well as the actual existence of a home address goes a long way. To validate info such as email or phone number, the standard practice includes sending an OTP.

3D Secure

3D Secure technology is efficient when it comes to reducing chargeback fraud and detecting high-risk transactions. Chargeback liability shifts to the issuing bank, and BNPL service providers can better focus on other, less damaging types of fraud.

Rule-based risk assessment

Using historical data in order to set the ground for determining chargeback fraud patterns. The crucial part of successful rules is using the right information in order to distinguish fraudulent transactions from legitimate ones. Use our list for signs of BNPL fraud as a starting point. Quality data for assembling rules would be transaction amount, transaction velocity, new/returning user, shipping match/mismatch, etc.

Machine learning

Same as with rule-based risk assessment, the key to a quality machine learning model is the appropriate data. Types of data to consider include identity data, behavioral biometrics, and device data.

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.  

3D Secure 1 vs. 3D Secure 2 – How is it different?

At first glance, one might think that 3D Secure 2.0 is a simple upgrade of 3D Secure 1.0. However, nothing could be further from the truth. Those two protocols are not even backward compatible. Outside of the main hub, everything is different. This includes message flow, message format, and what's the most important end-user look and feel.

Our research shows that within the MEA region, the majority of transactions occur through the 3DS1 protocol; with SMS OTP authentication methods, which does not protect buyers to the same extent as the new authentication methods that support 3D Secure 2. We found out that more than 60% of issuing banks have not yet migrated their cards to 3DS2.

Enhanced Data Analysis that Allows Banks to Understand Customers

3DS protocol is able to acquire ten times more data during the message flow, cca 300 information. This data is primarily obtained from the merchant's site and buyer's devices. It is further used to evaluate the risk level of the transaction taking place. Based on this risk evaluation, Strong Customer Authentication is necessary, or a Frictionless Transaction will take place. This data enables the financial institution, bank, or card issuer to get to know their customers and potentially release them of additional authentication steps through the frictionless transaction process.

Frictionless Transactions Improve the Overall Checkout User Experience (UX)

Frictionless Transaction is the second big deal when it comes to 3DS2 over the original 3DS protocol. It is aligned with the PSD2 requirement and exempts SCA when the transaction is low risk. 

eBook: How to choose the right 3D Secure software

As mentioned above, to evaluate the risk, banks will make behavioral analysis from acquired transaction data of their customer. Then, banks will identify deviations from regular transactions and buyer behavior. Another way a frictionless transaction takes place is when payments of a low amount (below 30 EUR) take place. They are also exempt from greater evaluations and made frictionless.

In-App Purchase Support without an HTTP Redirect

3DS2 supports technology to smoothly integrate 3D Secure flow with mobile in-app payment services and avoid HTTP redirections for authentication on mobile devices. One of the reasons many card issuers or banks had for abandoning 3DS transactions on mobile devices was HTTP redirection.

Static Passwords vs. Strong Customer Authentication

Static passwords are very weak in assuring authentication and not particularly user-friendly. Also, we tend to forget passwords. In this case, additional friction for the transaction process is necessary. Strong Customer Authentication (SCA) requires that two out of three secure elements – inherence, possession, and knowledge, are a part of the authentication process.

Inherence elements are something that a payee gives onto, say, a mobile device; i.e. fingerprint scan, face or voice recognition, or other biometric or behavioral data. Possession elements are what the buyer owns; such as s HW token, mobile phone containing a mobile token for generating a One Time Password. Note that the card also counts as a possession element, but only if it has been verified by a card reader, not by readable data printed on the card itself. Finally, the knowledge element is something that the user knows by heart, i.e. a PIN, password, or a secure question.

3D Secure 2 Authentication Methods

3DS2 relies on Strong Customer Authentication methods (SCA). The most acceptable method is bush with biometry, which contains both a top-notch user experience alongside the highest level of security using strong authentication methods. The push method exchanges transaction data from an eCommerce website to the buyer's mobile phone as well as the banking authentication application. This ensures the so-called Dynamic Linking and prevents man-in-the-middle attacks as well as potential changes done on the payee's account and/or charge amount by signing of critical data. Biometry associates the buyer with ''something that they are'', on a device they use, which is ''something they own''.

QR codes with biometry provide a similar user experience to push with biometry and work well with either biometry, fingerprint, or face recognition. However, face recognition is not as widely accepted as the fingerprint method.

For buyers who don't have mobile devices with fingerprint readers, PIN numbers or passwords can be used for buyer authentication, but to ensure SCA, it must be combined with OTP.

One of the widespread old authentication methods is HW and SW tokens used for generating OTP transaction signatures. However, nowadays, boyers demand a smooth, fast and frictionless user experience. This method requires manual transaction data entry into an HW/SW token and to retype the calculated OTP onto the webshop. This may cause prolonged checkout time and possible errors during the re-typing stages. Thus, this method should only be used as a fallback method when push/QRcode/biometry cannot be completed due to technical restrictions.

eBook: How to choose the right 3D Secure software

This eBook contains all the critical elements you need to consider while making intelligent, well-informed decisions regarding implementing 3D Secure technology.

eBook: How to choose the right 3D Secure software

To find out more about Trides2 portfolio, contact us or visit our blog section.  

3D Secure testing environments – a cure to 3DS product and service providers

Testing complex solutions built from several different software components has always been a challenge. It demands a deep understanding of the solution, its business and process flows, as well as the appropriate testing solutions.

3D Secure solution

3D Secure is an example of such a solution. The overall 3D Secure environment consists of at least four components (ACS, Directory server, 3DS server, Payment Gateway). This number amounts up to seven components if Authentication and Risk Scoring services are separate from the ACS. By introducing a core banking system integrated with ACS, the complexity of the solution becomes relatively high. Things can get even messier when In-app purchase and mobile SDK enter the conversation.

Luckily, 3D Secure software components need to be tested and approved by the 3DS protocol owner; i.e., EMVCo, but also by card schemes when deployed at the issuer and acquirer side. Still, even upon certification, after implementation and integration testing, it is common that certain issues occur.

eCommerce Apps Guide: Striking a Balance
Between Security and User Experience

From our experience, one of the main challenges when it comes to successfully testing the 3DS solution is covering all the possible scenarios to confirm the functionality of the solution. By introducing new features, the configuration needs to be in line with various protocols and regulations. Not to mention the specific client change requests that open more possibilities for errors. Additional issues occur by providing more flexibility in message and data formats. In the two examples below, we describe two problematic scenarios which you can face and where production issues occurred.

The missing element in 3DS message

Problems might happen with rejected transactions identified after the solution has been deployed in production. In some cases, a missing element in the challenge response sent by the authentication service of a specific bank is identified. This message generates by a proprietary authentication interface module adapted to the issuing bank.

Such test case appears in the EMVCo certification regression testing. It is a part of the ACS2 upgrade to 3DS v2.2. The test passed the EMVCo certification, although each bank has the possibility to configure the text contained in the module. During the EMVCo certification testing, a dummy authentication module is in use, which sends sufficient data to pass the test. But the bank had its own customized authentication module containing text that they defined by themselves. This is not tested with mobile devices as a part of an internal regression testing on the test environment. The result? The issue is unnoticed during the testing phase and spotted only when it is already in production.

Unexpected value(s) of the message parameter(s)

Another issue causing transaction rejection by issuing or acquiring domain (ACS or 3DSS) is due to the incorrect or unexpected values in the message flow.

3D Secure environment and stakeholders are aligning these days. Card schemes issue 3DS announcements and updates regularly. Newly introduced values that were not updated correctly or not supported at all on one domain might create unexpected behavior of the other domain. This is common for flows that do not pass through the card scheme directory server, such as the challenge flow. 

In order to ensure such a robust solution for any of the domains (ACS, 3DS Server), the testing process should involve behavioral analysis in case of such unregulated boundary scenarios, as soon as the card scheme announces new fields.

Even proper adoption of newly introduced values might cause issues for non-robust 3DS solutions because other parties might introduce them prior to you. 

Targeted 3D Secure testing environments

3D Secure service providers continuously work with testing environments in order to conduct SW update testing, interoperability testing, testing new business processes, user experience flows, etc. For each of those cases, one or more components are changed in the configuration matter, or the SW upgrade matter and impact the overall process and the environment.

The best way of testing the 3DS environment includes independent testing of each 3DS component first. However, the end-to-end testing should be done prior to migrating the upgrade to production.

End-to-end testing poses a particular challenge as use cases and test cases exponentially rise with new and proprietary business processes. Such test cases should be defined in detail and configured in test tools, which also need to be upgraded in order to support certain test cases.

Banks or 3D Secure service providers usually use commercially available test tools for testing separate 3DS components. However, when it comes to end-to-end testing, they typically develop their own solutions and test environments. Having separate testing solutions in play requires additional (re)configuration when moving from single application testing to environment testing. This demands additional effort and opens new chances for error in (re)configuration.

3D Secure testing wrap up

When it comes to 3D Secure, that means that the test solution needs to be able to simulate other components aside from the device under testing. Let’s put it this way; when ACS is being tested, the test tool simulates both 3DS server, Directory server, and sometimes even Payment gateway. For end-to-end testing, simulators are replaced by configuring other 3DS components, URLs, and necessary keys, as well as other parameters. All of those parameters are stored in the so-called testing profiles for fast switching between testing modules.

In conclusion, test solutions should be easily applied for testing single 3DS components, as well as easily configured for environment testing, end-to-end testing, and UX testing. Such a solution will reduce costs in 3DS regular maintenance and upgrades, as well as minimize possibilities for errors.

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

As a dedicated guide for eCommerce app owners and merchants this eBook covers m-commerce security best practices and provides turnkey solution for in-app payments security. 

eCommerce Apps Guide: Striking a Balance Between Security and User Experience

To find out more about Trides2 portfolio, contact us or visit our blog section.  

How to deliver smooth UX through SCA exemptions

By introducing SCA exemptions, PSD2 did not only relieve issuers and merchants from the fear of soaring cart abandonment rates; it also enabled customers to enjoy a user experience that is truly frictionless and straightforward. Let's see how to achieve the ultimate user experience while making sure your online transactions are secure.

PSD2 introducing SCA exemptions

The latest PSD2 directive includes SCA exemptions which are available in the 3D Secure v 2.2 upgrade. Exemptions enable cardholders to process particular types of online transactions without the need for an additional authentication step. The initial introduction of Strong Customer Authentication (SCA) requirement was turning heads. Merchants and issuers feared that added friction caused by demanding the cardholder to authenticate using two out of three security elements; knowledge, possession, inherence; would cause friction, ending up with a spike in cart abandonment rates. PSD2 approached this issue by defining particular types of online payments which do not require SCA, i.e., SCA exemptions.

SCA exemptions

  1. Low-risk transactions – data sharing in the payments industry enables transaction evaluation (low, medium, or high risk). If the transaction's score upon risk assessment result as low risk, that transaction does not require additional authentication.
  2. Low-value payment (LVP) ­– All online transactions amounting up to or equal to 30EUR are low-value payments and do not require SCA.
  3. Trusted Merchant Listing – Another convenient feature available in our 3D Secure v2.2 upgrade that enables the cardholder to trust list a merchant as a trusted party. By doing so, they only need to process the first payment upon enrolling the merchant to their trust list using SCA; every future payment will be frictionless.
  4. Corporate payments – In cases where online payments are paid using a card belonging to an entity rather than an individual, there is no need for an additional authentication step for convenience reasons; often, the payments card is shared between multiple colleagues, etc.
  5. Recurring payments – Payments with a fixed amount (e.g., loans, subscriptions) only require SCA for the initial payment authentication. Every future transaction is frictionless unless the transaction amount changes. In such cases, SCA is mandatory for each individual change.

User Experience vs. User Expectations

In 2020 nearly a quarter of the world population shopped online. To be exact, 2.05 billion consumers purchased at least one item online and contributed to the overall eCommerce growth. Let's put things into perspective; this means that roughly every fourth person you see passing by has purchased at least one item online in 2020. Cardholders are active participants of the eCommerce ecosystem. They have high standards when it comes to their online shopping experience.

Top Online Payments Security Trends

The main motivator behind such a shift in customer behaviour is convenience. Purchasing online provides them with a broad offering, as well as the alternatives, backed up with easy access to information about the product/service. But what happens when there is a hiccup during the checkout process? It is naive to assume that the cardholder goes through a lengthy trial-and-repeat process. They simply move on to the next best thing. What follows is a missed opportunity for sale, cart abandonment rates soar, and customer loyalty is at stake.

Concerning numbers

A Baymard research states that too long/complicated checkout process is within the top five reasons why customers abandon their purchase and do their business elsewhere. 18% out of the 4329 survey participants expressed their reason for abandoning a purchase to be an issue during the checkout process. That means nearly 780 missed opportunities for a pinned sale; 780 customers lost during the last stage of the buyer's journey.

Until recently, eCommerce merchants had little to no influence on how the checkout experience would look like from the cardholder's perspective. They had to rely on UX designed by the cardholder's issuing bank, which often involved numerous pop-up screens and redirects. Although friction generally means more security, it raises alarm bells in customers' heads or simply annoys the end user.  

By implementing the latest 3D Secure technology, including features such as Strong Customer Authentication (SCA) exemptions, cardholders enjoy a smooth checkout experience that is straightforward and demands only the necessary amount of friction, if any.

Leveraging SCA exemptions

A part of the latest PSD2 directive are SCA exemptions, online transactions that do not demand an additional authentication step because they meet the predefined criteria. Being aware of the cardholders' low tolerance for friction, PSD2 introduced SCA exemptions in order to relieve merchants and issuers from having to demand SCA for each and every online transaction made. By defining such exemptions, the end-users encounter a checkout experience that is genuinely frictionless.

In order to enable the above-mentioned exemptions, a certain type of data-driven evaluation is necessary. Each exemption type demands an individual risk assessment approach, and therefore, particular data is necessary to evaluate if a transaction meets any of the exemption criteria. This demands a cautious setup of the parameters, regardless if the risk scoring engine is rule-based or relies on machine learning.

Enhanced data collection enabled by the new 3D Secure 2 protocol allows the issuer to conduct a more precise risk analysis. Fraud monitoring is necessary on both exempted and SCA-required transactions. Also, in case of merchant whitelisting, risk scoring is necessary on both the transaction risk level as well as the merchant risk level. Real-time fraud monitoring enhances the level of security and does not impact the execution of the transaction. In cases where criteria for exempted transactions are met, the cardholder will place their order instantly. However, if the transaction is flagged, an alternative authentication flow will be applied in order to prevent a possible fraudulent activity.

Conclusion

Although PSD2 puts pressure on merchants and issuers to apply 2FA in the form of Strong customer authentication; SCA exemptions are a convenient way of avoiding additional authentication. If the setup of the parameters is correct, honest cardholders will enjoy a fully frictionless experience. By implementing 3D Secure 2 technology, issuers and merchants are granting flexible and straightforward online payment authentication to their customers.

Top Online Payments Security Trends

Learn about the latest approaches when it comes to assessing security risks, and find out more about the latest authentication trends in the online payments industry.

Top Online Payments Security Trends

To find out more about Trides2 portfolio, contact us or visit our blog section.