Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceBanking/Finance/InsuranceRetail/Restaurants/Convenience

6 e-commerce cyber fraud challenges in 2022

By Mike Gross
ecommerce
April 7, 2022

Financial technology, cryptocurrency and embedded finance options from alternative lenders are changing financial services. As organizations keep up with user digital demands, they are also dealing with an evolving fraud landscape, with online payment fraud losses set to exceed $206 billion between 2021 and 2025, according to Juniper Research. As criminals become more sophisticated and adopt these technologies, companies and chief security officers (CSOs) must also adapt and anticipate these developments.

These six fraud and cybersecurity predictions can help security leaders prepare for the evolving threat landscape.

1) A new wave of deepfake synthetic identity fraud

2021 saw a surge in deepfake identity fraud, which will continue in 2022. The development of artificial intelligence (AI) to impersonate user voices and faces is becoming more prevalent, making it challenging for businesses to authenticate identities.

With recent advances in deepfake technology, fraudsters can leverage compromised identity data to bypass verification controls, and create new profiles with documents, facial images, and voice cloning to bypass identity authentication requirements for secure exchanges like government benefits sign ups, particularly during enrollment and authentication.

Detection and prevention of deepfake identity fraud involves applying a layered strategy of technical defenses. Requiring identity data or documents in isolation is insufficient; organizations need to capture digital and behavioral data, then use AI and machine learning to analyze interactions and spot fraud.

2) Fraud as a Service is just a click away

Fraudsters are increasingly using automated bots to impersonate businesses and socially engineer their users. As fraud controls become more effective at thwarting traditional cyberattacks, fraudsters see opportunities to capitalize on advances in voice bots.

In 2022, a large portion of fraudulent transactions will be submitted by legitimate users who are being socially engineered to provide data and use their own devices to submit what they believe are legitimate transactions. Globally, banks are witnessing this trend as fraudsters can purchase bots to contact users, impersonate their banks, retrieve passwords and forward those codes to fraudsters. Fraudsters will likely expand operations to impersonate other businesses, including retailers and government organizations.

3) Real-time payments = faster fraud

Faster money can mean faster fraud. Juniper Research stated real-time payments (RTP) increased by 41% between 2019 and 2020 and will rise by 23% between 2020 and 2025. From mobile payments to Buy Now, Pay Later practices, RTPs have provided ample opportunity for fraudsters to quickly monetize and cash-out — converting money to other currency like crypto and then laundering funds through multiple fake accounts.

Crypto’s lack of regulation makes it attractive for fraudulent activity because attackers remain anonymous and can funnel funds in seconds. RTP’s speed presents unique challenges to businesses because they often can’t be revoked or easily traced. Demand for RTP is growing, so regulations need to be set and organizations must authenticate identities and transactions across channels in seconds with these faster payment methods.

4) Buy Now, Pay Never

Buy Now, Pay Later practices have exploded, with alternative lenders across retail. But businesses offering tailored financial products based on user data can leave the door open to criminals. According to Aite-Novarica Group, financial technologies have an average fraud rate of around 0.30%, which is double that of credit cards.

Without the right identity and fraud protections across their websites and apps, financial technology organizations not only risk fraud losses, but a damaged brand and reputation. And without quick, comprehensive fraud reporting back to the businesses they serve, they also risk enabling more downstream fraud attacks.

5) Supply chain issues expand marketplace scams

Security leaders expect to see more issues with marketplace fraud as supply chain issues and inflation persist through 2022. Where supply gaps exist, fraudsters will meet the pent-up demand with non-existent products, scamming users to part with money for nothing in return.

It’s easy to set up a fake business with positive reviews. And because consumers cannot verify the business’ authenticity, they lose money and then try to recoup funds from their financial provider. This is another area where Buy Now, Pay Later providers will bear responsibility for considerable retail fraud in 2022.

6) Digital identity’s convergence of identity verification and fraud detection

Password-free experiences led by smartphones and real-time payments have resulted in a seamless, uninterrupted user journey. But central to this is identity authentication. As identity verification and fraud detection converge, how can a secure approach to digital identity be adopted?

The European Digital Identity scheme shows governments are beginning to move in this direction, but these are first steps. As fraudsters continue to target authentication and onboarding, the bid to create secure, reusable digital identities to enable seamless commerce and mitigate criminal activity becomes critical. This is a concept that may play a big role in fraud prevention in 2022 and beyond.

KEYWORDS: deepfakes e-commerce fraud finance cybersecurity fraud detection fraud prevention monitoring

Share This Story

Screenshot (186)

Mike Gross is VP, Applied Fraud Research & Analytics for Experian Global Identity & Fraud, with responsibility for anticipating how future changes in technology, user engagement, fraud behaviors and digital transformation will create new threats and drive disruptive customer experiences around the world. Prior to this role, he served in Product Innovation Director and Global Fraud Risk Director roles for the Identity & Fraud group.

Gross joined 41st Parameter in August 2011 and has undertaken multiple product and risk leadership roles since the Experian acquisition in 2013, facilitating collaboration across global and regional business units and partnering with Experian Data Labs. He has 20 years of experience in financial services fraud prevention and risk management, sparking innovation opportunities, pinpointing emerging threats, facilitating market expansion, establishing strategic partnerships, and driving revenue growth. Prior to joining Experian, he led Digital Product Strategy at Early Warning Services.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!