SlideShare a Scribd company logo
1 of 22
I’M NINA, A NERD
WHEN IT COMES
TO FRAUD
Use fraud tools aka
superpowers to
fight fraud and
build trust.
AVS AND CVV CHECKS
CVV in particular is a shared secret between the card
holder and the issuing bank. We ask buyer to provide their
credit card billing address and card verification value/CVV
and verify the same with the issuing bank. Given that e-
commerce merchants CAN NOT store CVV (a PCI
requirement), a fraudster will not have access to it even if
they have card number, expiration date and billing address
information. (Fraudsters typically buy stolen cards pm the
dark web).
MAINTAIN LISTS
Verified traveler, block traveler, watchlists (suspicious) :
Over 10% of all orders are from repeat travelers that have
proved themselves to be legitimate card holders A.K.A. as
verified. Similarly, you can track email IDs amongst other
uniquely identifying attributes from orders that resulted in
fraud chargeback to block them from gaming the system
subsequently.
MACHINE LEARNING & BEHAVIORAL ANALYSIS
Statistical models that learn complex patterns in data.
Behavioral analysis: We know the typical behavior of a
traveler making a $1000 booking. They looks at a few
options, spend, say 15 minutes before they make a booking.
We compare the behavior of traveler with the “expected
behavior” and do all this without introducing any friction to
the process. This also spots bot activity.
DEVICE FINGERPRINTING
It is quite important to uniquely identify the device
(browser) that the booker is making the transaction from.
It is easy to buy multiple emails but much harder to use one
device per order. Similarly, if we know where the device is
located you can determine its proximity from the card
holder’s billing (generally their residential address)
VELOCITY CONTROL
Given that fraudsters are organized crime units, you want
to watch out for “repeat bookings” from the same person:
be it the same email or device and effectively stop them for
perpetuating fraud on your platform
Did you know?
Fraudsters are
organized and very
resourceful in
converting stolen
cards to cash
Fraudster
Real Cardholder
Did you know?
They buy stolen
cards on dark net
that other
fraudsters added
from a data
breach
Steals Card
details
1
Fraudster
Completes stay
3
Vacation Rental
website
Books an
immediate stay2
Approve
2
Payment
Processor/
Gateway
Calls bank with anxiety5
Credits the money back to the real card holder and debits the merchant6
Receives credit card statement and recognizes a purchase he didn’t make4
2 2 2
Issuing
Bank
BUYER FRAUD
You, the vacation rental, lose money ($1000)
every time you let a fraudster book your
property . To make this worse, you also get
dinged a chargeback fee and have to work
hard to fight it.
7 7 7
Travel merchants lose
an average of 0.44% of
annual revenues to
online fraud.
AVS AND CVV CHECKS
CVV in particular is a shared secret between the card
holder and the issuing bank. We ask buyer to provide their
credit card billing address and card verification value/CVV
and verify the same with the issuing bank. Given that e-
commerce merchants CAN NOT store CVV (a PCI
requirement), a fraudster will not have access to it even if
they have card number, expiration date and billing address
information. (Fraudsters typically buy stolen cards pm the
dark web).
MAINTAIN LISTS
Verified traveler, block traveler, watchlists (suspicious) :
Over 10% of all orders are from repeat travelers that have
proved themselves to be legitimate card holders A.K.A. as
verified. Similarly, you can track email IDs amongst other
uniquely identifying attributes from orders that resulted in
fraud chargeback to block them from gaming the system
subsequently.
MACHINE LEARNING & BEHAVIORAL ANALYSIS
Statistical models that learn complex patterns in data.
Behavioral analysis: We know the typical behavior of a
traveler making a $1000 booking. They looks at a few
options, spend, say 15 minutes before they make a booking.
We compare the behavior of traveler with the “expected
behavior” and do all this without introducing any friction to
the process. This also spots bot activity.
DEVICE FINGERPRINTING
It is quite important to uniquely identify the device
(browser) that the booker is making the transaction from.
It is easy to buy multiple emails but much harder to use one
device per order. Similarly, if we know where the device is
located you can determine its proximity from the card
holder’s billing (generally their residential address)
VELOCITY CONTROL
Given that fraudsters are organized crime units, you want
to watch out for “repeat bookings” from the same person:
be it the same email or device and effectively stop them for
perpetuating fraud on your platform
AVS fails
CVV fails
CVV pass
Address Verification Service (AVS) / Card Verification Value (CVV)
Fraudster
Payment
Processor/Gateway
Can’t provide
CVV
Booking declined
Provides correct
CVV/zip
Booking successful
Dark
Web
Obtains a
stolen card
Real Cardholder
Issuing
Bank
Cardholder
Profile
Issue a Credit card2
Registers / creates an account1
3
4
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
VacationRental.com
Known Good and Bad Buyers (Maintain Blocklist/Whitelist/Watchlist)
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Booking declined
Booking successful
Dark
Web
Obtains a
stolen card
Traveler List
Green (Approve)
Orange (Refer)
Red (Decline)
Did you know?
More than 10% of the traffic is
from repeat or known customers
 Check if you know the buyer
(use verified elements like
email or phone )
 STRONG match on buyer
fuzzy match on card, run
rules by checking against
traveler lists.
1
2
Cardholder
Profile
Issuing Bank
Velocity Control (frequency of seeing a buyer)
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Issuing
Bank
Cardholder
Profile
Dark
Web
Obtains
stolen cards
Counters
IP Address
Email id
Card Number
 Multiple bookings from the
same card (Orange/ Risky)
 Multiple bookings from
different cards but same
device (Orange/Risky)
 The above from a device
proxying itself (red/
decline)
2
TOOL #3
Bookings
declined
Booking
successful
Booking from a
real cardholder
Booking 1
Booking 2
Booking 3
1
3
Device Fingerprinting ( IP, Geo location etc.)
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Issuing
Bank
Cardholder
Profile
Dark
Web
Obtains a
stolen card
TOOL #4
Location:
RUSSIA
Location:
CALIFORNIA
Detect where
the device is
using IP and
geolocation
2
Detect the
device uniquely
using device
fingerprinting
1
Detect the real
device even if
proxy is used
3
* RED FLAG
- Zip verified in California but device is in Russia
- CVV failed
- Multiple bookings
- Immediate stay
- E-mail can’t co-relate to CA either
*
Modern Tools – Machine Learning, Behavioral Analysis
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Issuing
Bank
Cardholder
Profile
Dark
Web
Obtains a
stolen card
TOOL #5
MACHINE LEARNING
- Statistical models can’t handle
more than 2 dimensions well
- Pair Machine learning with Rules to
define Policies such as avoiding
business with sanctioned countries
&/or quick fixes
Machine Learning
Behavioral Analysis - Behavior of a
fraudster is different from that of a
real cardholder. For instance, they use
bots to fill card information and spend
much lesser time reviewing properties
20
Yapstone proprietary and confidential 21
TPV by Billing City
Yapstone proprietary and confidential 22
Fraud and Attempted Fraud by Billing City

More Related Content

What's hot

All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safetyBISWAJITGHORAI2
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer AccountsAbbie Olson
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 

What's hot (20)

Banking servics
Banking servicsBanking servics
Banking servics
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 

Similar to Trust and safety in the vacation rental industry

Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxFTx Identity
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks- Mark - Fullbright
 
Credit card scams
Credit card scamsCredit card scams
Credit card scamsscamtools
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudNoam Inbar
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Forter
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingTim McAlpine
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
5 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 20215 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 2021Luis Gallegos
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxSunnyRajak12
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfGiuliaAiolo
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfSimnMarnMartn
 

Similar to Trust and safety in the vacation rental industry (20)

Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Skimming is a Scam
Skimming is a ScamSkimming is a Scam
Skimming is a Scam
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Payment Frauds in India
Payment Frauds in India Payment Frauds in India
Payment Frauds in India
 
Id Theft
Id TheftId Theft
Id Theft
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money Thing
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
5 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 20215 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 2021
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 

Recently uploaded

Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 

Trust and safety in the vacation rental industry

  • 1.
  • 2. I’M NINA, A NERD WHEN IT COMES TO FRAUD
  • 3.
  • 4. Use fraud tools aka superpowers to fight fraud and build trust.
  • 5. AVS AND CVV CHECKS CVV in particular is a shared secret between the card holder and the issuing bank. We ask buyer to provide their credit card billing address and card verification value/CVV and verify the same with the issuing bank. Given that e- commerce merchants CAN NOT store CVV (a PCI requirement), a fraudster will not have access to it even if they have card number, expiration date and billing address information. (Fraudsters typically buy stolen cards pm the dark web). MAINTAIN LISTS Verified traveler, block traveler, watchlists (suspicious) : Over 10% of all orders are from repeat travelers that have proved themselves to be legitimate card holders A.K.A. as verified. Similarly, you can track email IDs amongst other uniquely identifying attributes from orders that resulted in fraud chargeback to block them from gaming the system subsequently. MACHINE LEARNING & BEHAVIORAL ANALYSIS Statistical models that learn complex patterns in data. Behavioral analysis: We know the typical behavior of a traveler making a $1000 booking. They looks at a few options, spend, say 15 minutes before they make a booking. We compare the behavior of traveler with the “expected behavior” and do all this without introducing any friction to the process. This also spots bot activity. DEVICE FINGERPRINTING It is quite important to uniquely identify the device (browser) that the booker is making the transaction from. It is easy to buy multiple emails but much harder to use one device per order. Similarly, if we know where the device is located you can determine its proximity from the card holder’s billing (generally their residential address) VELOCITY CONTROL Given that fraudsters are organized crime units, you want to watch out for “repeat bookings” from the same person: be it the same email or device and effectively stop them for perpetuating fraud on your platform
  • 6.
  • 7. Did you know? Fraudsters are organized and very resourceful in converting stolen cards to cash Fraudster Real Cardholder Did you know? They buy stolen cards on dark net that other fraudsters added from a data breach Steals Card details 1 Fraudster Completes stay 3 Vacation Rental website Books an immediate stay2 Approve 2 Payment Processor/ Gateway Calls bank with anxiety5 Credits the money back to the real card holder and debits the merchant6 Receives credit card statement and recognizes a purchase he didn’t make4 2 2 2 Issuing Bank BUYER FRAUD You, the vacation rental, lose money ($1000) every time you let a fraudster book your property . To make this worse, you also get dinged a chargeback fee and have to work hard to fight it. 7 7 7
  • 8.
  • 9. Travel merchants lose an average of 0.44% of annual revenues to online fraud.
  • 10.
  • 11.
  • 12. AVS AND CVV CHECKS CVV in particular is a shared secret between the card holder and the issuing bank. We ask buyer to provide their credit card billing address and card verification value/CVV and verify the same with the issuing bank. Given that e- commerce merchants CAN NOT store CVV (a PCI requirement), a fraudster will not have access to it even if they have card number, expiration date and billing address information. (Fraudsters typically buy stolen cards pm the dark web). MAINTAIN LISTS Verified traveler, block traveler, watchlists (suspicious) : Over 10% of all orders are from repeat travelers that have proved themselves to be legitimate card holders A.K.A. as verified. Similarly, you can track email IDs amongst other uniquely identifying attributes from orders that resulted in fraud chargeback to block them from gaming the system subsequently. MACHINE LEARNING & BEHAVIORAL ANALYSIS Statistical models that learn complex patterns in data. Behavioral analysis: We know the typical behavior of a traveler making a $1000 booking. They looks at a few options, spend, say 15 minutes before they make a booking. We compare the behavior of traveler with the “expected behavior” and do all this without introducing any friction to the process. This also spots bot activity. DEVICE FINGERPRINTING It is quite important to uniquely identify the device (browser) that the booker is making the transaction from. It is easy to buy multiple emails but much harder to use one device per order. Similarly, if we know where the device is located you can determine its proximity from the card holder’s billing (generally their residential address) VELOCITY CONTROL Given that fraudsters are organized crime units, you want to watch out for “repeat bookings” from the same person: be it the same email or device and effectively stop them for perpetuating fraud on your platform
  • 13. AVS fails CVV fails CVV pass Address Verification Service (AVS) / Card Verification Value (CVV) Fraudster Payment Processor/Gateway Can’t provide CVV Booking declined Provides correct CVV/zip Booking successful Dark Web Obtains a stolen card Real Cardholder Issuing Bank Cardholder Profile Issue a Credit card2 Registers / creates an account1 3 4 VacationRental.com Name Card # Exp Date Zip Code CVV Submit VacationRental.com
  • 14. Known Good and Bad Buyers (Maintain Blocklist/Whitelist/Watchlist) Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Booking declined Booking successful Dark Web Obtains a stolen card Traveler List Green (Approve) Orange (Refer) Red (Decline) Did you know? More than 10% of the traffic is from repeat or known customers  Check if you know the buyer (use verified elements like email or phone )  STRONG match on buyer fuzzy match on card, run rules by checking against traveler lists. 1 2 Cardholder Profile Issuing Bank
  • 15. Velocity Control (frequency of seeing a buyer) Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Issuing Bank Cardholder Profile Dark Web Obtains stolen cards Counters IP Address Email id Card Number  Multiple bookings from the same card (Orange/ Risky)  Multiple bookings from different cards but same device (Orange/Risky)  The above from a device proxying itself (red/ decline) 2 TOOL #3 Bookings declined Booking successful Booking from a real cardholder Booking 1 Booking 2 Booking 3 1 3
  • 16. Device Fingerprinting ( IP, Geo location etc.) Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Issuing Bank Cardholder Profile Dark Web Obtains a stolen card TOOL #4 Location: RUSSIA Location: CALIFORNIA Detect where the device is using IP and geolocation 2 Detect the device uniquely using device fingerprinting 1 Detect the real device even if proxy is used 3 * RED FLAG - Zip verified in California but device is in Russia - CVV failed - Multiple bookings - Immediate stay - E-mail can’t co-relate to CA either *
  • 17. Modern Tools – Machine Learning, Behavioral Analysis Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Issuing Bank Cardholder Profile Dark Web Obtains a stolen card TOOL #5 MACHINE LEARNING - Statistical models can’t handle more than 2 dimensions well - Pair Machine learning with Rules to define Policies such as avoiding business with sanctioned countries &/or quick fixes Machine Learning Behavioral Analysis - Behavior of a fraudster is different from that of a real cardholder. For instance, they use bots to fill card information and spend much lesser time reviewing properties
  • 18.
  • 19.
  • 20. 20
  • 21. Yapstone proprietary and confidential 21 TPV by Billing City
  • 22. Yapstone proprietary and confidential 22 Fraud and Attempted Fraud by Billing City