Skip to main content

Fraud Types

On this page
No Prerequisites Needed

This is a good starting point. You don't need to understand detection tools or prevention strategies before learning what fraud looks like. After reading this section, move to Prevention and Detection.

TL;DR

A taxonomy of fraud patterns for merchants.


Which Fraud Type Is YOUR Problem?

If you see...Start here
Chargebacks on legitimate ordersFriendly Fraud
Many small transactions, then fraudCard Testing
Good customer suddenly acting strangeAccount Takeover
New account, immediate high spendingThird-Party Fraud or Account Fraud
Coordinated attack across accountsFraud Rings
Return/refund abuseRefund Fraud
Promotion/coupon exploitationPromo Abuse
ACH returns or unauthorized bank debitsACH Fraud

How to Find Out What Fraud Type You Have

Before buying tools or reading every page in this section, figure out what you're actually dealing with:

  1. Pull your last 30 chargebacks (or however many you have from the last 6 months)
  2. Tag each one into one of four buckets:
    • Third-party fraud - Stolen card, customer says "I didn't do this" and they're telling the truth
    • Friendly fraud - Customer made the purchase but disputes it anyway
    • Billing confusion - Customer didn't recognize the charge on their statement
    • Service issue - Customer had a real problem with the product or delivery
  3. Count. Your biggest bucket is your problem.
What Most SMBs Find

Most SMBs under $1M are over 70% friendly fraud and billing confusion. If that's you, your solution is operational (better descriptors, easier refunds, clearer communication) - not technical (fraud scoring, device fingerprinting). Start with Friendly Fraud and Descriptors and Comms before investing in any fraud tools.


Classification Framework

Fraud can be classified by who commits it:

TypeActorKey Characteristic
First-PartyYour customerUses own identity to defraud you
Third-PartyExternal fraudsterUses stolen card at your store
Fake IdentityUnknownFabricated persona, not a real person

Quick Reference

By Method

Fraud TypeDescriptionWhen You See It
Account FraudFake account signupsBot attacks, promo farming
Account TakeoverHijacked customer accountsPassword breaches, phishing
ACH FraudUnauthorized bank debits, BECACH returns, payment redirects
Card TestingValidating stolen cardsSmall transaction bursts
Fraud RingsOrganized multi-account attacksCoordinated patterns
TriangulationThree-party resale schemeMarketplace fraud
BEC & PhishingAttacks on your operationsFake invoices, credential theft

First-Party Fraud Subtypes

These are all forms of first-party fraud. The customer is the fraudster:

Fraud TypeDescriptionYour Defense
Friendly FraudDispute legitimate purchaseEvidence collection, CE 3.0
Refund FraudExploit return policiesPolicy enforcement
Promo AbuseGame promotions/discountsDevice linking, limits

Comparison at a Glance

TypeWho LosesDetection DifficultyCan You Fight Chargebacks?Primary Defense
Third-PartyYou (without 3DS)MediumRarely (unless 3DS)3D Secure
First-PartyYouHighYes (with evidence)Policy enforcement, evidence collection
Friendly FraudYouHighYes (CE 3.0)Descriptors, evidence, easy refunds
Refund FraudYouMediumN/APolicy enforcement, pattern tracking
Promo AbuseYouMediumN/ADevice linking, limits
Fake IdentityYouHighSometimesIdentity verification
ATOCustomer + YouMediumYesMFA, behavioral analytics
Card TestingYouLowN/AVelocity rules, CAPTCHA
Fraud RingsYouHighSometimesDevice fingerprinting

Prevention Priority

For most merchants, focus resources in this order:

1. High Impact, Easier to Prevent

TypeAction
Third-Party FraudEnable 3D Secure for liability shift
Card TestingAdd velocity rules and CAPTCHA
Account FraudRequire email/phone verification

2. High Impact, Harder to Prevent

TypeAction
Friendly FraudCollect evidence, implement CE 3.0
Refund FraudTighten policies, track patterns
Account TakeoverRequire MFA, monitor logins

3. Specialized Threats

TypeAction
Fraud RingsDevice fingerprinting, consortium data
Promo AbuseDevice linking, redemption limits
TriangulationShipping address analysis