Contents
Categories
What is a velocity attack?
In the world of market research and insights, the term ‘velocity attack’ is applied to situations where fraudulent actors simulate high volumes of ‘completes’ on surveys as part of coordinated attacks.
Rather than attempting one-off fraudulent attempts, attacks of this kind are predicated on speed and volume, with numerous survey entries being ‘completed’ rapidly.
Velocity attacks are intentionally designed to replicate legitimate survey-completion behavior as a means of collecting rewards.

Why are velocity attacks a problem?
When fraudsters deploy velocity attacks in an attempt to skew survey data or gain access to rewards offered upon completion of surveys, the result is unreliable and inaccurate insights, all of which can hamper the overall quality of research.
Velocity attacks also have the potential to lead to higher operational costs for suppliers & buyers of sample as a result of heightened fraud detection efforts. Trust is damaged which can lead to client loss due to concerns over the accuracy and authenticity of data and insights.
How do velocity attacks happen?
Fraudulent actors looking to deploy velocity attacks often use bots or poorly-paid individuals to blitz through surveys at high speed.
Any weak point during a respondent’s journey into a survey will be exploited by fraudsters as they build out their velocity attacks. For suppliers, this could be insufficient verification measures when panelists register and access surveys in their panel. For buyers, this could be a predictable survey design with no security checks and insecure redirects.

How are velocity attacks combated?
Cint is committed to preventing velocity attacks by ensuring a continued investment in fraud detection and prevention by focusing on:
1. Continued Innovation
Cint is consistently looking to the future by planning the next phase of releases and developments in all its quality efforts. Check out Cint’s Quality webpage to learn more about our approach to quality.
2. Product-Based Protection
Home-grown tech like Trust Score predicts fraud before it happens, and Cint Secure Survey prevents redirect fraud. We also partner with third-party vendors to enhance protections against other tools that may be used during a velocity attack, such as bots and fraudsters.
3. Operational-Based Protection
Collaboration is at the heart of operational fraud-fighting efforts. Dedicated Trust and safety Operations Specialists run programs that monitor for abnormal reconciliation activity and work with buyers and suppliers to make the necessary improvements.
What is the Cint stance on velocity attacks?
“Fraudsters never stop trying to innovate, and neither should the market research industry. Cint’s focus on leveling up both our products and operational programs underpins Cint’s mission to connect real people to surveys.” — Shelby Downes, Senior Program Manager