SlideShare a Scribd company logo
Prepaid & Digital
Goods Fraud
The Misuse of Fraud
Prevention Tools
Irene Brime
Head of B2B Communications
irene.brime@cashrun.com
CashRun Pte Ltd
Hillel Krajzman
VP of Operations
hillel@openbucks.com
Openbucks Corp.
Prepaid & Digital
Goods Fraud
The Misuse of Fraud
Prevention Tools
Gain a Competitive Advantage
through
Fraud Prevention
Merchant A Merchant B
Fraud Sales Fraud Sales
Who has an advantage?
Lesson 1
Hard Limits vs Dynamic Limits
Relying on hard limits stops fraud
Misconception
Hard Limits
3
Amount Based Time Based
Merchant only allows
customers to buy
3 times/week or no more
than $150/month
Merchants freeze
customers account for a
period of time
Easy for fraudsters to
find out threshold &
exploit
Risk losing genuine
customers,
Fraudsters can create
multiple accounts
Same limits on
all customers
Hard Limits
Prone to exploitation
by fraudsters
Lose genuine
customers
X
X
Dynamic Limits
Complex for
fraudsters to exploit
Capitalise on high-
spending customers
Tailored limits for
each & every customer
Lesson 2
The Misuse of Manual
Verification & Additional Tests
Eyeballing
Lack of
Standardisation
Non-Instant
Unacceptable
standards for Digital
Products
Manual Verification
Additional Tests
SMS or OTPs
Calling customers
Requesting personal ID
Frustrated Customers
Test customers’ patience
Lose genuine customers
Scalability
Fraud teams require
more time & resources$
Bottleneck
Large volume to manually verify
Fraud teams overwhelmed
Negative Impacts
Merchant A
Fully automated verification
Delivers instantly
No extra tests
Merchant B
Manual verification
Calls customers
Extra tests
Manual Verification
Harms conversion
rates
X
Non ScalableX
100% Automation
Retain customers
Scalable
BackwardX Increasingly relevant
Summary
Fingerprint ModuleLesson 3
The Misuse of Device Fingerprint
Modify fingerprintFraudsters
Bots &
Softwares
Unsophisticated
Fingerprint Detection
Module
Accepted
Deploy
Multilayered Fingerprint
to detect these micro-changes
The trend is to move towards simplicity
Info from devices reduced
Plugins through NPAPI gone
Google removed NPAPI
support from Chrome
Future of Device Fingerprint: Browsers
Future of Device Fingerprint: Mobile
Same screen size
Shared operating systems
Increasingly hard to return the
plugins to the verification module
Increase in false positives
Simplification
Limited info returned
Summary
Combine results across
multiple verification areas
Comprehensive verification
Identity Mapping
Lesson 4
The Misuse of Identity Mapping
Systems tend to score negatively when a
customer has multiple information
Fail to recognise returning customers
3 examples
Same Customer, Multiple Email Addresses
irene@gmail.com
irene@yahoo.com
irene@cashrun.com
irene@hotmail.com
Same Customer
Positive Risk
Points
January
2014
Same Customer, Multiple Payment Methods
X
September
2014
Order #1
Name: Mr. Paul John Smith
Order #2
Name: Dr. Paul J Smith
Same Customer, Multiple Names
X
What should systems do instead?
Identify customers who use different information
Find out connections between customers
Avoid scoring negative points for such customers
Misuse of IP Blocking Rules
Lesson 5
Cyber Criminals
Fraud teams
panic
Blanket ban
all orders from
specific IP
address
Genuine
customers
blocked
FRAUD!
When Fraud Happens…
Proxies
Evade
Verification
Corporate
IP Disguise “Genuine Customer”
Genuine
Customers
MERCHANT
Fraudster
Genuine
Customers
118.200.222.33127.570.232.11
FRAUD!
X
X
X X X
MERCHANT
Examples
X X X X
Misuse of Information
Fraud
Verification
Tools
Summary of Problem
What’s the Solution?
Avoid Over Reliance
on IP information:
Detrimental to Sales
IP Abnormalities are Common
IP Penetrating Technology
to detect:
VMwares Fake Corporate IPs
Proxies Hosting IPs
Detrimental to sales
Over reliance on a certain area
Lesson 6
Web of Securities
vs.
Wall of Isolation
IP Address
Blacklist
Whitelist
Device
Fingerprint
Velocity
Checks
3DS
Etc.
Fraudsters Merchant
Wall of Protection Fraud Rate
MISCONCEPTION!
Fraud can be predicted with a
Multi-Layered Security System
Fraud and chargeback
happen in waves
Peak Periods of Fraud
Calmer Periods
What happens
when the wave is
higher than your
wall of protection?
The wall blocks out
genuine customers
Solution?
Web of Securities
Accepted transactions
buying limit imposed
Accepted transactions
Dynamic limit imposed
Accepted transactions
It’s not about
How many fraud tools you have
but
How you use them
Optimization is the key
Thank you!
Questions?
Find us at booth 41
WE WANT YOUR FEEDBACK!
Please complete your session evaluation within the MRC mobile app or return a paper
evaluation on your way out.
Prepaid & Digital Goods Fraud: Misuse of Fraud Prevention Tools
Speakers:
Irene Brime, CashRun Pte Ltd
Hillel Krajzman, Openbucks Corp.
Key Takeaways
1) Takeaway 1
2) Takeaway 2
3) Takeaway 3
4) Takeaway 4

More Related Content

Similar to Prepaid and Digital Goods Fraud

Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023
Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023
Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023
eCommerce Institute
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
The ID Co.
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
Shred Station
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
ssuserb73103
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
Bhekumuzi Xaba
 
Preventing Credit Card Chargebacks
Preventing Credit Card ChargebacksPreventing Credit Card Chargebacks
Preventing Credit Card Chargebacks
High Risk Merchant Account LLC
 
Preventing Chargebacks
Preventing ChargebacksPreventing Chargebacks
Preventing Chargebacks
HRMA-LLC
 
Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014
360insights
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
bcanawakadalcollege
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Dealing with the Fraudulent Customer
Dealing with the Fraudulent CustomerDealing with the Fraudulent Customer
Dealing with the Fraudulent Customer
Credit Management Association
 
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
FTx Identity
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
Tri-State Better Business Bureau
 
Chargeback Fraud
Chargeback FraudChargeback Fraud
Chargeback Fraud
Chargeback FraudChargeback Fraud
Chargeback Fraud
HRMA-LLC
 
Biz Practices And Scams
Biz Practices And ScamsBiz Practices And Scams
Biz Practices And Scamsvuongminhchi
 
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
DataScienceConferenc1
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
David Atkinson
 
Consumer Awareness
Consumer AwarenessConsumer Awareness
Consumer Awareness
Kristina Flores
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 

Similar to Prepaid and Digital Goods Fraud (20)

Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023
Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023
Grace Gikonyo - eCommerce Day Africa Blended [Professional] Experience 2023
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
 
Preventing Credit Card Chargebacks
Preventing Credit Card ChargebacksPreventing Credit Card Chargebacks
Preventing Credit Card Chargebacks
 
Preventing Chargebacks
Preventing ChargebacksPreventing Chargebacks
Preventing Chargebacks
 
Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Dealing with the Fraudulent Customer
Dealing with the Fraudulent CustomerDealing with the Fraudulent Customer
Dealing with the Fraudulent Customer
 
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Chargeback Fraud
Chargeback FraudChargeback Fraud
Chargeback Fraud
 
Chargeback Fraud
Chargeback FraudChargeback Fraud
Chargeback Fraud
 
Biz Practices And Scams
Biz Practices And ScamsBiz Practices And Scams
Biz Practices And Scams
 
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
[DSC Europe 23][Cryptica] Ana_Maria_Anic_-_Navigating_Scams_Social_Engineerin...
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Consumer Awareness
Consumer AwarenessConsumer Awareness
Consumer Awareness
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Prepaid and Digital Goods Fraud