Tools of the Trade Part 1: A Fraudster Shares How They Bypass Device and IP Analysis

Tools of the Trade Part 1: A Fraudster Shares How They Bypass Device and IP Analysis

Looking at some of the software and hardware used to spoof IP addresses and browser configuration.

Our new webinar series has a very special guest in the form of Anonymous X, a fraudster that we contacted on the dark web.

In this first episode, the professional fraudster shares some of the tools and techniques their fellow cybercriminals use to target companies, with a special focus on bypassing IP analysis and device identification.

Anonymous X explained a few interesting points, such as:

  • Why Safari and iOS are favoured by fraudsters?
  • What kind of settings and extensions do they use to write their own browser data?
  • How do they spoof IP addresses and what is their strategy?
  • And much more…

You can watch the full episode above.

You might also be interested in reading about:

Learn more about:

Data Enrichment | Browser Fingerprinting | Device Fingerprinting | Fraud Detection API

Share on social media

Speak with a fraud fighter.

Click here


Sign up for our newsletter

The top stories of the month delivered straight to your inbox