Loading...

Growing Fraud Threats for Digital Marketplaces

Published: August 4, 2023 by Kim Le

Trust is the primary factor in any business building a long-lasting relationship, especially when a company operates globally and wants to build a loyal customer base. With the rapid acceleration of digital shopping and transactions comes a growing fraud landscape. And, given the continual increase of people wanting to transact online, marketplace companies – from ecommerce apps, ridesharing, to rental companies – need to have ideal strategies in place to protect themselves and their customers from fraudulent activities.

Without ideal risk mitigation or comprehensive fraud and identity proofing strategies, marketplaces may find themselves facing the following:

  • Card-not-present (CNP) Fraud: As online shopping increases, customers can’t provide a credit card directly to the merchant. That’s why fraudsters can use stolen credit card information to make unauthorized transactions. And in most cases, card owners are unaware of being compromised. Without an integrated view of risk, existing credit card authentication services used in isolation can result in high false positives, friction and a lack of card issuer support.
  • Unverified Consumer Members, Vendors, Hosts & Drivers: From digital marketplace merchants like Etsy and Amazon, to peer-to-peer sharing economies like AirBnB, Uber and Lyft, the marketplace ecosystem is prone to bad actors who use false ID techniques to exploit both the platform and consumers for monetary gain. Additionally, card transaction touchpoints across the customer lifecycle increases risks of credit card authentication. This can be at account opening, account management when changes to existing account information is necessary, or at checkout.
  • Buy Now, Pay Later (BNPL) Muling: While a convenient way for consumers to plan for their purchases, experts warn that without cautionary and security measures, BNPL can be a target for digital fraud. Fraudsters may use their own or fabricated identities or leverage account takeover to gain access to a legitimate user’s account and payment information to make purchases with no intent to repay. This leaves the BNPL provider at the risk of unrecoverable monetary losses that can impact the business’ risk tolerance.
  • Forged Listings & Fake Accounts: Unauthorized vendors that create a fake account using falsified identities, stolen credit cards and publish fake listings and product reviews are another threat faced by ecommerce marketplaces.

These types of fraud can happen without the vast data sources necessary to assess the risk of a customer and authenticate credit cards among other fraud and identity verification solutions. By not focusing on establishing trust, fraud mitigation management solutions and identity proofing strategies, businesses can often find themselves with serious monetary, reputational, and security qualms.

Interested in learning more? Download Experian’s Building Trust in Digital Marketplaces e-book and discover the strategies digital marketplaces, like the gig economy and peer-to-peer markets, can take to keep their users safe, and protected from fraudulent activity. For additional information on how Experian is helping businesses mitigate fraud, explore our comprehensive suite of identity and fraud solutions.

Related Posts

Fraud rings cause an estimated $5 trillion in financial damages every year, making them one of the most dangerous threats facing today’s businesses. They’re organized, sophisticated and only growing more powerful with the advent of Generative AI (GenAI). Armed with advanced tools and an array of tried-and-true attack strategies, fraud rings have perfected the art of flying under the radar and circumventing traditional fraud detection tools. Their ability to adapt and innovate means they can identify and exploit vulnerabilities in businesses' fraud stacks; if you don’t know how fraud rings work and the right signs to look for, you may not be able to catch a fraud ring attack until it’s too late. What is a fraud ring? A fraud ring is an organized group of cybercriminals who collaborate to execute large-scale, coordinated attacks on one or more targets. These highly sophisticated groups leverage advanced techniques and technologies to breach fraud defenses and exploit vulnerabilities. In the past, they were primarily humans working scripts at scale; but with GenAI they’re increasingly mobilizing highly sophisticated bots as part of (or the entirety of) the attack. Fraud ring attacks are rarely isolated incidents. Typically, these groups will target the same victim multiple times, leveraging insights gained from previous attack attempts to refine and enhance their strategies. This iterative approach enables them to adapt to new controls and increase their impact with each subsequent attack. The impacts of fraud ring attacks far exceed those of an individual fraudster, incurring significant financial losses, interrupting operations and compromising sensitive data. Understanding the keys to spotting fraud rings is crucial for crafting effective defenses to stop them. Uncovering fraud rings There’s no single tell-tale sign of a fraud ring. These groups are too agile and adaptive to be defined by one trait. However, all fraud rings — whether it be an identity fraud ring, coordinated scam effort, or large-scale ATO fraud scheme — share common traits that produce warning signs of imminent attacks. First and foremost, fraud rings are focused on efficiency. They work quickly, aiming to cause as much damage as possible. If the fraud ring’s goal is to open fraudulent accounts, you won’t see a fraud ring member taking their time to input stolen data on an application; instead, they’ll likely copy and paste data from a spreadsheet or rely on fraud bots to execute the task. Typically, the larger the fraud ring attack, the more complex it is. The biggest fraud rings leverage a variety of tools and strategies to keep fraud teams on their heels and bypass traditional fraud defenses. Fraud rings often test strategies before launching a full-scale attack. This can look like a small “probe” preceding a larger attack, or a mass drop-off after fraudsters have gathered the information they needed from their testing phase. Fraud ring detection with behavioral analytics Behavioral analytics in fraud detection uncovers third-party fraud, from large-scale fraud ring operations and sophisticated bot attacks to individualized scams. By analyzing user behavior, organizations can effectively detect and mitigate these threats. With behavioral analytics, businesses have a new layer of fraud ring detection that doesn’t exist elsewhere in their fraud stack. At a crowd level, behavioral analytics reveals spikes in risky behavior, including fraud ring testing probes, that may indicate a forthcoming fraud ring attack, but would typically be hidden by sheer volume or disregarded as normal traffic. Behavioral analytics also identifies the high-efficiency techniques that fraud rings use, including copy/paste or “chunking” behaviors, or the use of advanced fraud bots designed to mimic human behavior. Learn more about our behavioral analytics solutions and their fraud ring detection capabilities. Learn more

Published: February 27, 2025 by Presten Swenson

Fraud never sleeps, and neither do the experts working to stop it. That’s why we’re thrilled to introduce Meet the Maker, our new video series spotlighting the brilliant minds behind Experian’s cutting-edge fraud solutions. In our first episode, Matt Ehrlich, Senior Director of Identity and Fraud Product Management, and Andrea Nighswander, Senior Director of Global Solution Strategy, share how they use data, advanced analytics, and deep industry expertise to stay ahead of fraudsters. With 35+ years of combined experience, these fraud-fighting veterans know exactly what it takes to keep bad actors at bay. Watch now for an exclusive look at the minds shaping the future of fraud prevention.    Stay tuned for more episodes featuring the visionaries driving fraud innovation.

Published: February 21, 2025 by Julie Lee

Romance scams target individuals of all ages and backgrounds. Financial institutions need to protect their customers from these schemes.

Published: February 5, 2025 by Alex Lvoff

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe