Skip to main contentArrow Right
Descope Arkose Connector Spotlight Thumbnail

Table of Contents

Modern applications continue to deal with threats like account takeover (ATO), fake account creation, and automated abuse. Attackers use automation tools, proxy networks, device spoofing, and sometimes even real people to bypass standard security. They try stolen credentials in large numbers, set up fake accounts, exploit promotions, and target valuable transactions while appearing legitimate. If authentication lacks behavioral and device intelligence, organizations face a higher risk of unauthorized access, fraud, and ongoing account problems.

With the Descope Darwinium Connector, developers can add real-time device checks and behavioral risk scoring to authentication and user journey flows. By checking device integrity, user behavior, and risk at signup, login, and other key points, teams can block fraud before it starts and still give trusted users a smooth experience.

About Darwinium

Darwinium is a fraud-prevention and risk platform built to proactively detect and block both automated and human-driven attacks across the customer journey.

The platform checks device integrity, looks for spoofing signals and unusual behavior, detects automation tools and virtual environments, and flags network issues and device reuse across sessions or accounts. This helps security teams spot suspicious patterns, even if attackers change IP addresses, spread out their activity, or try to hide automation.

Darwinium helps prevent account takeover, spot fake or synthetic accounts, stop credential stuffing, reduce promotion and transaction abuse, and find slow, distributed automation. When used with Descope, these risk signals turn into real-time decisions in adaptive authentication, allowing user journeys to adjust as attack methods change.

An infographic titled Darwinium + Descope: Block signup abuse and fraud using continuous device intelligence on a dark blue gradient background. The image features two central logos, a colorful infinity loop for Darwinium and a teal bracketed icon for Descope, connected by dashed arrows. On the left, four boxes connected to the Darwinium logo highlight capabilities: Continuous Behavioral Profiling (Analyze user behavior across sessions and journeys), Device & Network Intelligence (Detect emulators, automation frameworks, and proxy abuse), Real-Time Risk Scoring (Score signup, login, and recovery events dynamically), and Signup & ATO Prevention (Identify fake accounts and account takeover attempts). On the right, four boxes connected to the Descope logo highlight outcomes: Risk-Based MFA (Step-up authentication only when fraud risk is elevated), Passwordless & Passkeys (Reduce friction for low-risk, trusted users), Bot & Session Orchestration (Block, challenge, or terminate risky sessions in real time), and Enterprise-Grade Identity (Scale securely with SSO, SCIM, and multi-tenant architecture). The logo for descope is in the bottom right corner.
Fig: An overview of the Descope Darwinium connector

Connector overview

Darwinium performs real-time behavioral risk analysis and device profiling to identify fraud across authentication and high-risk user journeys. The Descope Darwinium Connector integrates Darwinium’s risk intelligence directly into Descope Flows through two primary signal layers:

Behavioral and risk signals

Continuous behavioral analysis that detects:

  • Interaction anomalies inconsistent with legitimate users

  • Automated or scripted journey execution

  • Suspicious network and proxy usage

  • Velocity inconsistencies and low-and-slow activity

  • Signals associated with account takeover and synthetic identity abuse

Darwinium aggregates behavioral and contextual telemetry into a unified risk assessment that distinguishes trusted users from automated and human-assisted fraud attempts. Out of the box, Descope can send web-based interaction signals such as typing speed and browser behavior to Darwinium during authentication flows to help generate this risk assessment.

Device profiling

Persistent device intelligence that identifies:

  • Compromised or spoofed browsers and environments

  • Headless browsers and automation frameworks

  • Emulators and virtualized infrastructure

  • Tampered or modified client environments

  • Cross-session device reuse patterns

  • Cross-account device correlation linked to fraud rings

Darwinium generates a durable device profile that persists across sessions, enabling detection of repeat fraud infrastructure even when attackers rotate IP addresses or distribute activity over time. Device-level signals are enabled by integrating the Darwinium SDK directly in the application, allowing the device data to be evaluated alongside Descope flow signals for deeper risk analysis.

The Descope Darwinium Connector integrates directly into Descope authentication workflows and can be orchestrated alongside step-up MFA, identity verification, IP intelligence, and custom business logic to enforce adaptive, risk-based user journeys.

A screenshot of a software interface titled Flow Template Library on a white background. The interface features a search sidebar on the left and a results area on the right. In the sidebar, the keyword darwinium is entered into a search bar. Below this, a list of Methods includes checkboxes for Embedded Link, Enchanted Link, Magic Link, nOTP, One-Time Password, Passkeys, Password, and Recovery Codes. At the bottom of the sidebar is a button to Request a template. The main area displays 1 results for keyword "darwinium" and features a single template tile titled Sign up or in with Darwinium fraud detection. The tile includes a blue shield icon, a description stating Sign up or in, require fraud check using Darwinium. Prerequisites - setup Darwinium connector, and blue tags for Sign In, Sign Up, Fraud, and +1.
Fig: Descope Flow template using the Darwinium connector

Use case: Prevent account takeover through device and behavioral profiling

Account takeover attacks increasingly combine automation, residential proxy networks, and human intervention to compromise legitimate users. Attackers test stolen credentials, replay sessions from emulated environments, and pivot across accounts using shared fraud tooling. According to the Cifas Fraudscape 2025 report, account takeover cases jumped 76% in 2024, with telecom and online retail platforms hit the hardest. Because the credentials and session flows often appear valid, traditional authentication systems struggle to distinguish real users from attackers operating with breached data.

Darwinium checks device identity, unusual behavior, and links between accounts to spot takeover attempts, even if attackers change IP addresses or spread out their activity.

Here’s how a Descope Flow works with Darwinium during a login attempt:

  • The user submits credentials for authentication.

  • Descope checks the login details and starts Darwinium profiling at the same time.

  • Darwinium reviews the device’s security, looks for signs of spoofing, and compares user behavior to past patterns.

  • Darwinium sends back a risk score and suggests what to do next.

  • The Descope Flow then decides whether to allow the login, ask for extra verification, or block and record the attempt.

This approach identifies repeat fraud infrastructure and suspicious behavioral shifts while minimizing friction for legitimate users signing in from trusted devices.

A Descope Flow showing how to add Darwinium fraud detection actions within user journey and authentication workflows.
Fig: Sign in with Darwinium in Descope Flows

Get started today by using the Sign up or in with Darwinium fraud detection Flow Template, available directly in the Descope Console.

Use case: Prevent fake account creation and synthetic identity abuse

Fraud groups often make many fake or automated accounts to take advantage of promotions, abuse free trials, prepare for future account takeovers, or game platform rewards. They spread these attacks out over time and use proxy networks to avoid detection.

Darwinium finds automated signups, accounts made with emulators, device spoofing, and repeated device fingerprints across new accounts. This reveals organized fraud behind what look like separate registrations.

Here’s how a Descope Flow works with Darwinium during registration:

  • A user starts to sign up for an account.

  • Descope runs Darwinium profiling before finishing the account creation.

  • Darwinium checks the device’s security, looks for signs of automation, and reviews the device’s history across sessions.

  • Darwinium provides a risk score along with details about possible fraud.

  • The Descope Flow then decides whether to allow the registration, ask for more verification, or block and record the attempt.

This device-focused and behavioral approach stops large-scale fake account creation, while keeping onboarding easy for real users.

Conclusion

The Descope Darwinium Connector delivers production-grade fraud prevention across authentication and high-risk user journeys, enabling security teams to detect and stop account takeover, fake account creation, and distributed automation without heavy custom engineering. By embedding Darwinium’s device profiling and behavioral risk signals directly into declarative Descope Flows, developers can implement adaptive, risk-based controls that evolve alongside changing attack tactics.

If you haven’t yet started your Descope journey, sign up for a Free Forever account and set up your own Darwinium connector. To explore other connectors, visit our integrations page.