Skip to main content

Fraud Patterns

Last Updated: 2025-02-17 Status: Complete

Understanding fraud patterns is essential for building effective detection systems. Each fraud type has distinct signatures and requires different prevention approaches.

Quick Reference

Fraud Type% of FraudDetection DifficultyPrevention
Card Testing5-10%MediumVelocity limits
Friendly FraudUp to 75% of CBsVery HardDocumentation
Account TakeoverGrowingHardBehavioral analytics
CNP Fraud65% of lossesMedium3DS, ML scoring

Card Testing

Card testing (also called "carding") is when fraudsters validate stolen card numbers by attempting small transactions before making larger fraudulent purchases.

How Card Testing Works

Detection Signals

SignalPatternRisk Level
Transaction size$0.50 - $5.00High
VelocityMultiple cards, same device/IPCritical
Success rateMany declines from same sourceCritical
Sequential BINsCards with similar numbersHigh
Time patternRapid-fire submissionsCritical

Velocity Thresholds

MetricThresholdAction
Transactions per IP/hour> 10Flag for review
Transactions per IP/hour> 25Auto-block
Failed auths per IP> 5 in 10 minBlock IP
Cards per device> 3 in 1 hourBlock device
Sub-$5 transactions> 3 per card/dayReview

Prevention Strategies

  1. Velocity Limits - Block sources exceeding thresholds
  2. CAPTCHA - Add friction for suspicious sessions
  3. Device Fingerprinting - Identify repeat offenders
  4. Minimum Transaction Amount - Set floor above testing amounts
  5. Bot Detection - Block automated traffic
  6. BIN Monitoring - Alert on sequential card attempts

Friendly Fraud (First-Party Fraud)

Friendly fraud occurs when legitimate cardholders dispute valid transactions. This is the most common chargeback source and the hardest to prevent.

Scale of the Problem

MetricValueSource Year
Share of all chargebacksUp to 75%2024-2025
First-party fraud rate36% of all fraud2024
Merchants reporting79% experience it2024
Projected growth+40% by 2026Projection
Critical Challenge

Friendly fraud is the #1 chargeback source, and 3D Secure provides NO protection against it. Liability shift only applies to third-party fraud.

Common Friendly Fraud Scenarios

Detection Signals

SignalIndicatorRisk Level
Delivery confirmedTracking shows deliveredMedium
Prior purchasesSame customer bought beforeLow
No contact attemptCustomer didn't reach out firstMedium
Digital goodsInstant delivery, hard to prove receiptHigh
SubscriptionRecurring charge after months of useMedium

Prevention Strategies

  1. Clear Billing Descriptors - Recognizable name on statements
  2. Delivery Confirmation - Signature, photos, GPS
  3. Customer Communication - Order confirmations, shipping updates
  4. Easy Refund Process - Make refunds easier than chargebacks
  5. Usage Tracking - Log product/service usage for evidence
  6. Clear Terms - Explicit return/refund policies at checkout

Representment Evidence

ScenarioKey Evidence
Physical goodsTracking, delivery confirmation, signature
Digital goodsDownload logs, access logs, IP address
ServicesUsage logs, customer communications
SubscriptionsTerms acceptance, usage history, cancellation policy

Account Takeover (ATO)

Account takeover occurs when fraudsters gain access to legitimate customer accounts through credential theft or compromise.

2026 ATO Landscape

MetricValue
Stolen accounts for sale2.5 million (early 2026)
Cyber incidents from phishing90%
Loyalty fraud from ATO52%

Attack Methods

Detection Signals

SignalPatternAction
New device + locationLogin from unknown device/locationChallenge/MFA
Profile changesEmail, address, phone changedAlert + verify
Password resetFollowed by payment method addHigh risk
Unusual timeLogin at abnormal hoursMonitor closely
VelocityMultiple login attemptsRate limit

Prevention Strategies

  1. Multi-Factor Authentication - Require MFA for sensitive actions
  2. Behavioral Analytics - Detect deviations from baseline behavior
  3. Device Recognition - Track trusted devices
  4. Step-Up Authentication - Challenge for unusual activity
  5. Account Change Notifications - Alert on profile updates
  6. Credential Monitoring - Check against breach databases

Behavioral Analytics Approach

CNP Fraud

Card-Not-Present fraud occurs in transactions where the card is not physically presented—primarily e-commerce, phone orders, and mail orders.

CNP vs. Card-Present Fraud

MetricCard-PresentCard-Not-Present
Fraud rate0.06%0.93%
MultiplierBaseline15.5x higher
Share of fraud losses35%65%
Processing fees1.50-2.50%1.80-3.50%

Why CNP Is Higher Risk

FactorImpact
No physical cardCan't verify EMV chip
No cardholder presenceCan't check ID
Easy to scaleAutomated attacks possible
Global reachCross-border fraud easier
Stolen data availabilityBillions of compromised cards

CNP Fraud Methods

Prevention Layers

LayerToolEffectiveness
Authentication3D Secure70-80% + liability shift
VerificationAVS + CVV20-30%
IntelligenceDevice fingerprinting40-50%
ScoringML fraud models70-90%
RulesVelocity, geo-blocking20-40%

High-Risk Product Categories

CategoryRisk FactorWhy
Gift cardsVery HighCash equivalent, untraceable
ElectronicsHighHigh resale value
Digital goodsHighInstant delivery, no shipping address
Luxury itemsHighHigh value, resale market
Travel/ticketsHighImmediate use, transferable

Triangulation Fraud

Triangulation fraud involves a fraudster acting as a middleman between a legitimate buyer and merchant.

How It Works

Why It's Hard to Detect

ChallengeDescription
Legitimate buyerReal customer with valid payment
Valid shippingGoes to real address
No red flagsTransaction looks normal
Delayed discoveryChargeback comes later

Detection Signals

SignalPattern
Shipping address mismatchCard billing ≠ shipping
First-time customerNo purchase history
Unusual product selectionMatches common resale items
Multiple ordersSame item, different cards

AI-Powered Fraud

ThreatDescription
Deepfake verificationBypassing identity verification
AI-generated contentFake documents, communications
Automated attacksMore sophisticated bot networks
Synthetic identitiesAI-created fake personas

Counter-Measures

DefenseApplication
AI fraud detectionFight AI with AI
Behavioral biometricsDetect non-human patterns
Real-time risk scoringInstant assessment
Multi-layer authenticationDefense in depth

References

Share: