Blog IBM & Rackspace Select TruSTAR To Power Unprecedented New Cloud Fraud Exchange Partnership

IBM & Rackspace Select TruSTAR To Power Unprecedented New Cloud Fraud Exchange Partnership


TruSTAR, a leader in cyber intelligence management, has announced a new partnership with IBM and Rackspace to create the Cloud Fraud Exchange, a unique intelligence sharing initiative designed to make it harder for fraudsters to replicate attacks across different cloud service providers. Initial findings from this partnership were presented by TruSTAR, Rackspace, and IBM at the Messaging Malware Mobile Anti-Abuse Working Group's (M3AAWG) 44th general meeting in Brooklyn, New York on October 10.

The Cloud Fraud Exchange is unique because it brings together the largest cloud service providers in the country to address the growing threats of fraud and abuse attacks. Typically, an intelligence sharing partnership of this kind is only conceived via government-sanctioned Information Sharing and Analysis Centers (ISACs) or Information Sharing and Analysis Organizations (ISAOs), non-profit organizations that act as a central resource for gathering information on cyber threats and provide a two-way channel for sharing of information. It's unusual for companies that compete with each other to share fraud data in a real-time manner due to concerns about reputational risk to their brands. TruSTAR gives Cloud Fraud Exchange companies data sovereignty through the intelligence platform's Enclave architecture, which uses advanced auto-redaction, data normalization, and security controls to safely enable intelligence exchange.

The purpose of the Cloud Fraud Exchange is to prevent cyber criminals from setting up fraudulent accounts on multiple cloud platforms. Servers hosted via the cloud are the main vehicles fraudsters use to target end-user victims. Fraudsters weaponize cloud resources like infrastructure-as-a-service and AI networks to launch DDOS and phishing attacks. Compromised cloud servers also help obscure the location of bad actors.

"Rackspace and IBM have made the commitment to securely exchange fraud event data via TruSTAR because the reward of sharing outweighs the risk. This exchange is helping these giant cloud providers identify fraudsters faster and reduce response time, translating to millions of dollars saved over time," said Paul Kurtz, co-founder and CEO of TruSTAR.

"We're making it way more expensive for the bad guys to run scams. Now fraudsters have to create entirely new identities, IP addresses, and tactics when they get shut down by one major cloud provider because there's an alliance of people reporting on them," said Chris Godfrey, Fraud Intelligence Lead at TruSTAR.

The Cloud Fraud Exchange has been active since March 2018 and has already facilitated the exchange of tens of thousands of IPs, yielding significant correlations between participants and demonstrating the potential savings of several million dollars in mitigated risk. The group is making plans to expand the types of indicators being shared from just IPs to other indicators like email addresses and device fingerprints. The group expects the correlations across companies will continue to grow and translate to even more savings. Other major cloud service providers are expected to join the Cloud Fraud Exchange in the coming financial quarters.

The Cloud Fraud Exchange has been 12 months in the making and was originally conceived by Rackspace Chief Security Officer Brian Kelly through his work with the Cloud Security Alliance. Since its launch, the program has been championed by Allen Rountree, Executive of the Cloud SOC at IBM Cloud, as well as the Rackspace Fraud and Abuse Team.

About TruSTAR 
TruSTAR is an intelligence platform that helps organizations leverage multiple sources of threat intelligence and fuse it with historical event data to prioritize and enrich investigations. Built for security and fraud teams, TruSTAR uses machine learning and automation to operationalize data throughout an analyst's workflow, freeing up time for higher-priority events. The most valuable security data is often locked inside silos in and across companies. TruSTAR breaks down these silos with its Enclave knowledge management architecture. Enclaves give complex teams customization, integration, and granular access controls that enable collaboration. TruSTAR is the technology infrastructure that powers many of the U.S.'s largest ISACs and ISAOs, and has enterprise customers that span across Finance, Retail, Healthcare, Aerospace, and IT. Learn more at and follow us on Twitter at @TruSTARtech.

This press release was originally published on PRNewswire:

Learn More About TruSTAR's Fraud Solutions

Stories of Cyber Defense Collaboration: Trustworthy Accountability Group (TAG) Nicole Perloth’s new book, This is How They Tell Me the World Ends, details our past and troubling trajectory in cyberspace. It is a terrific and ... Read More
Box Automates Intelligence and Workflows While Reducing Manual Work Hours with TruSTAR “The fact that we can easily integrate with all of our data sources that we were pulling in externally by using TruSTAR, as well as any internal data ... Read More
LogMeIn Accelerates Detection Use Case and Reduces Manual Analyst Workflow By Using TruSTAR   “TruSTAR allowed me to play out my use cases for free. Seeing the value that even the free version provided, and then seeing what the paid version ... Read More
Customer Spotlight Webinar: PVH Corp. TruSTAR has a new webinar series, Customer Spotlight, where we invite security leaders and operators from across the TruSTAR community to share ... Read More