SlideShare a Scribd company logo
I’M NINA, A NERD
WHEN IT COMES
TO FRAUD
Use fraud tools aka
superpowers to
fight fraud and
build trust.
AVS AND CVV CHECKS
CVV in particular is a shared secret between the card
holder and the issuing bank. We ask buyer to provide their
credit card billing address and card verification value/CVV
and verify the same with the issuing bank. Given that e-
commerce merchants CAN NOT store CVV (a PCI
requirement), a fraudster will not have access to it even if
they have card number, expiration date and billing address
information. (Fraudsters typically buy stolen cards pm the
dark web).
MAINTAIN LISTS
Verified traveler, block traveler, watchlists (suspicious) :
Over 10% of all orders are from repeat travelers that have
proved themselves to be legitimate card holders A.K.A. as
verified. Similarly, you can track email IDs amongst other
uniquely identifying attributes from orders that resulted in
fraud chargeback to block them from gaming the system
subsequently.
MACHINE LEARNING & BEHAVIORAL ANALYSIS
Statistical models that learn complex patterns in data.
Behavioral analysis: We know the typical behavior of a
traveler making a $1000 booking. They looks at a few
options, spend, say 15 minutes before they make a booking.
We compare the behavior of traveler with the “expected
behavior” and do all this without introducing any friction to
the process. This also spots bot activity.
DEVICE FINGERPRINTING
It is quite important to uniquely identify the device
(browser) that the booker is making the transaction from.
It is easy to buy multiple emails but much harder to use one
device per order. Similarly, if we know where the device is
located you can determine its proximity from the card
holder’s billing (generally their residential address)
VELOCITY CONTROL
Given that fraudsters are organized crime units, you want
to watch out for “repeat bookings” from the same person:
be it the same email or device and effectively stop them for
perpetuating fraud on your platform
Did you know?
Fraudsters are
organized and very
resourceful in
converting stolen
cards to cash
Fraudster
Real Cardholder
Did you know?
They buy stolen
cards on dark net
that other
fraudsters added
from a data
breach
Steals Card
details
1
Fraudster
Completes stay
3
Vacation Rental
website
Books an
immediate stay2
Approve
2
Payment
Processor/
Gateway
Calls bank with anxiety5
Credits the money back to the real card holder and debits the merchant6
Receives credit card statement and recognizes a purchase he didn’t make4
2 2 2
Issuing
Bank
BUYER FRAUD
You, the vacation rental, lose money ($1000)
every time you let a fraudster book your
property . To make this worse, you also get
dinged a chargeback fee and have to work
hard to fight it.
7 7 7
Travel merchants lose
an average of 0.44% of
annual revenues to
online fraud.
AVS AND CVV CHECKS
CVV in particular is a shared secret between the card
holder and the issuing bank. We ask buyer to provide their
credit card billing address and card verification value/CVV
and verify the same with the issuing bank. Given that e-
commerce merchants CAN NOT store CVV (a PCI
requirement), a fraudster will not have access to it even if
they have card number, expiration date and billing address
information. (Fraudsters typically buy stolen cards pm the
dark web).
MAINTAIN LISTS
Verified traveler, block traveler, watchlists (suspicious) :
Over 10% of all orders are from repeat travelers that have
proved themselves to be legitimate card holders A.K.A. as
verified. Similarly, you can track email IDs amongst other
uniquely identifying attributes from orders that resulted in
fraud chargeback to block them from gaming the system
subsequently.
MACHINE LEARNING & BEHAVIORAL ANALYSIS
Statistical models that learn complex patterns in data.
Behavioral analysis: We know the typical behavior of a
traveler making a $1000 booking. They looks at a few
options, spend, say 15 minutes before they make a booking.
We compare the behavior of traveler with the “expected
behavior” and do all this without introducing any friction to
the process. This also spots bot activity.
DEVICE FINGERPRINTING
It is quite important to uniquely identify the device
(browser) that the booker is making the transaction from.
It is easy to buy multiple emails but much harder to use one
device per order. Similarly, if we know where the device is
located you can determine its proximity from the card
holder’s billing (generally their residential address)
VELOCITY CONTROL
Given that fraudsters are organized crime units, you want
to watch out for “repeat bookings” from the same person:
be it the same email or device and effectively stop them for
perpetuating fraud on your platform
AVS fails
CVV fails
CVV pass
Address Verification Service (AVS) / Card Verification Value (CVV)
Fraudster
Payment
Processor/Gateway
Can’t provide
CVV
Booking declined
Provides correct
CVV/zip
Booking successful
Dark
Web
Obtains a
stolen card
Real Cardholder
Issuing
Bank
Cardholder
Profile
Issue a Credit card2
Registers / creates an account1
3
4
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
VacationRental.com
Known Good and Bad Buyers (Maintain Blocklist/Whitelist/Watchlist)
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Booking declined
Booking successful
Dark
Web
Obtains a
stolen card
Traveler List
Green (Approve)
Orange (Refer)
Red (Decline)
Did you know?
More than 10% of the traffic is
from repeat or known customers
 Check if you know the buyer
(use verified elements like
email or phone )
 STRONG match on buyer
fuzzy match on card, run
rules by checking against
traveler lists.
1
2
Cardholder
Profile
Issuing Bank
Velocity Control (frequency of seeing a buyer)
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Issuing
Bank
Cardholder
Profile
Dark
Web
Obtains
stolen cards
Counters
IP Address
Email id
Card Number
 Multiple bookings from the
same card (Orange/ Risky)
 Multiple bookings from
different cards but same
device (Orange/Risky)
 The above from a device
proxying itself (red/
decline)
2
TOOL #3
Bookings
declined
Booking
successful
Booking from a
real cardholder
Booking 1
Booking 2
Booking 3
1
3
Device Fingerprinting ( IP, Geo location etc.)
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Issuing
Bank
Cardholder
Profile
Dark
Web
Obtains a
stolen card
TOOL #4
Location:
RUSSIA
Location:
CALIFORNIA
Detect where
the device is
using IP and
geolocation
2
Detect the
device uniquely
using device
fingerprinting
1
Detect the real
device even if
proxy is used
3
* RED FLAG
- Zip verified in California but device is in Russia
- CVV failed
- Multiple bookings
- Immediate stay
- E-mail can’t co-relate to CA either
*
Modern Tools – Machine Learning, Behavioral Analysis
Fraudster
Real Cardholder
Payment
Processor/Gateway
VacationRental.com
Name
Card #
Exp Date
Zip Code
CVV
Submit
Issuing
Bank
Cardholder
Profile
Dark
Web
Obtains a
stolen card
TOOL #5
MACHINE LEARNING
- Statistical models can’t handle
more than 2 dimensions well
- Pair Machine learning with Rules to
define Policies such as avoiding
business with sanctioned countries
&/or quick fixes
Machine Learning
Behavioral Analysis - Behavior of a
fraudster is different from that of a
real cardholder. For instance, they use
bots to fill card information and spend
much lesser time reviewing properties
20
Yapstone proprietary and confidential 21
TPV by Billing City
Yapstone proprietary and confidential 22
Fraud and Attempted Fraud by Billing City

More Related Content

What's hot

Banking servics
Banking servicsBanking servics
Banking servics
jagannath ojha
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
Tri-State Better Business Bureau
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
Mrwilson6
 
Identity Theft
Identity TheftIdentity Theft
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
Flora Runyenje
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
BISWAJITGHORAI2
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
jagruti anjankar
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
Rastislav Turek
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
Rushikesh Maddalwar
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
- Mark - Fullbright
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
Abbie Olson
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
Digital EYE Media
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
Jeetendra Khilnani
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
Mikael Wagner
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
 

What's hot (20)

Banking servics
Banking servicsBanking servics
Banking servics
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 

Similar to Trust and safety in the vacation rental industry

Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
FTx Identity
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
- Mark - Fullbright
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
scamtools
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
PawanKumarJha7
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
ClubHack
 
Skimming is a Scam
Skimming is a ScamSkimming is a Scam
Skimming is a Scam
- Mark - Fullbright
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Noam Inbar
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Forter
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
FinancialCenter
 
Payment Frauds in India
Payment Frauds in India Payment Frauds in India
Payment Frauds in India
AGS Transact Technologies
 
Id Theft
Id TheftId Theft
Id Theft
mojo_5
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money Thing
Tim McAlpine
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
Alireza Ghahrood
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Merchants
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
DudleyDoright
 
5 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 20215 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 2021
Luis Gallegos
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
SunnyRajak12
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
GiuliaAiolo
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
SimnMarnMartn
 

Similar to Trust and safety in the vacation rental industry (20)

Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Skimming is a Scam
Skimming is a ScamSkimming is a Scam
Skimming is a Scam
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Payment Frauds in India
Payment Frauds in India Payment Frauds in India
Payment Frauds in India
 
Id Theft
Id TheftId Theft
Id Theft
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money Thing
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
5 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 20215 scary travel scams to watch out for in 2021
5 scary travel scams to watch out for in 2021
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 

Recently uploaded

一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
zsjl4mimo
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 

Recently uploaded (20)

一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(Harvard毕业证书)哈佛大学毕业证如何办理
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 

Trust and safety in the vacation rental industry

  • 1.
  • 2. I’M NINA, A NERD WHEN IT COMES TO FRAUD
  • 3.
  • 4. Use fraud tools aka superpowers to fight fraud and build trust.
  • 5. AVS AND CVV CHECKS CVV in particular is a shared secret between the card holder and the issuing bank. We ask buyer to provide their credit card billing address and card verification value/CVV and verify the same with the issuing bank. Given that e- commerce merchants CAN NOT store CVV (a PCI requirement), a fraudster will not have access to it even if they have card number, expiration date and billing address information. (Fraudsters typically buy stolen cards pm the dark web). MAINTAIN LISTS Verified traveler, block traveler, watchlists (suspicious) : Over 10% of all orders are from repeat travelers that have proved themselves to be legitimate card holders A.K.A. as verified. Similarly, you can track email IDs amongst other uniquely identifying attributes from orders that resulted in fraud chargeback to block them from gaming the system subsequently. MACHINE LEARNING & BEHAVIORAL ANALYSIS Statistical models that learn complex patterns in data. Behavioral analysis: We know the typical behavior of a traveler making a $1000 booking. They looks at a few options, spend, say 15 minutes before they make a booking. We compare the behavior of traveler with the “expected behavior” and do all this without introducing any friction to the process. This also spots bot activity. DEVICE FINGERPRINTING It is quite important to uniquely identify the device (browser) that the booker is making the transaction from. It is easy to buy multiple emails but much harder to use one device per order. Similarly, if we know where the device is located you can determine its proximity from the card holder’s billing (generally their residential address) VELOCITY CONTROL Given that fraudsters are organized crime units, you want to watch out for “repeat bookings” from the same person: be it the same email or device and effectively stop them for perpetuating fraud on your platform
  • 6.
  • 7. Did you know? Fraudsters are organized and very resourceful in converting stolen cards to cash Fraudster Real Cardholder Did you know? They buy stolen cards on dark net that other fraudsters added from a data breach Steals Card details 1 Fraudster Completes stay 3 Vacation Rental website Books an immediate stay2 Approve 2 Payment Processor/ Gateway Calls bank with anxiety5 Credits the money back to the real card holder and debits the merchant6 Receives credit card statement and recognizes a purchase he didn’t make4 2 2 2 Issuing Bank BUYER FRAUD You, the vacation rental, lose money ($1000) every time you let a fraudster book your property . To make this worse, you also get dinged a chargeback fee and have to work hard to fight it. 7 7 7
  • 8.
  • 9. Travel merchants lose an average of 0.44% of annual revenues to online fraud.
  • 10.
  • 11.
  • 12. AVS AND CVV CHECKS CVV in particular is a shared secret between the card holder and the issuing bank. We ask buyer to provide their credit card billing address and card verification value/CVV and verify the same with the issuing bank. Given that e- commerce merchants CAN NOT store CVV (a PCI requirement), a fraudster will not have access to it even if they have card number, expiration date and billing address information. (Fraudsters typically buy stolen cards pm the dark web). MAINTAIN LISTS Verified traveler, block traveler, watchlists (suspicious) : Over 10% of all orders are from repeat travelers that have proved themselves to be legitimate card holders A.K.A. as verified. Similarly, you can track email IDs amongst other uniquely identifying attributes from orders that resulted in fraud chargeback to block them from gaming the system subsequently. MACHINE LEARNING & BEHAVIORAL ANALYSIS Statistical models that learn complex patterns in data. Behavioral analysis: We know the typical behavior of a traveler making a $1000 booking. They looks at a few options, spend, say 15 minutes before they make a booking. We compare the behavior of traveler with the “expected behavior” and do all this without introducing any friction to the process. This also spots bot activity. DEVICE FINGERPRINTING It is quite important to uniquely identify the device (browser) that the booker is making the transaction from. It is easy to buy multiple emails but much harder to use one device per order. Similarly, if we know where the device is located you can determine its proximity from the card holder’s billing (generally their residential address) VELOCITY CONTROL Given that fraudsters are organized crime units, you want to watch out for “repeat bookings” from the same person: be it the same email or device and effectively stop them for perpetuating fraud on your platform
  • 13. AVS fails CVV fails CVV pass Address Verification Service (AVS) / Card Verification Value (CVV) Fraudster Payment Processor/Gateway Can’t provide CVV Booking declined Provides correct CVV/zip Booking successful Dark Web Obtains a stolen card Real Cardholder Issuing Bank Cardholder Profile Issue a Credit card2 Registers / creates an account1 3 4 VacationRental.com Name Card # Exp Date Zip Code CVV Submit VacationRental.com
  • 14. Known Good and Bad Buyers (Maintain Blocklist/Whitelist/Watchlist) Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Booking declined Booking successful Dark Web Obtains a stolen card Traveler List Green (Approve) Orange (Refer) Red (Decline) Did you know? More than 10% of the traffic is from repeat or known customers  Check if you know the buyer (use verified elements like email or phone )  STRONG match on buyer fuzzy match on card, run rules by checking against traveler lists. 1 2 Cardholder Profile Issuing Bank
  • 15. Velocity Control (frequency of seeing a buyer) Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Issuing Bank Cardholder Profile Dark Web Obtains stolen cards Counters IP Address Email id Card Number  Multiple bookings from the same card (Orange/ Risky)  Multiple bookings from different cards but same device (Orange/Risky)  The above from a device proxying itself (red/ decline) 2 TOOL #3 Bookings declined Booking successful Booking from a real cardholder Booking 1 Booking 2 Booking 3 1 3
  • 16. Device Fingerprinting ( IP, Geo location etc.) Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Issuing Bank Cardholder Profile Dark Web Obtains a stolen card TOOL #4 Location: RUSSIA Location: CALIFORNIA Detect where the device is using IP and geolocation 2 Detect the device uniquely using device fingerprinting 1 Detect the real device even if proxy is used 3 * RED FLAG - Zip verified in California but device is in Russia - CVV failed - Multiple bookings - Immediate stay - E-mail can’t co-relate to CA either *
  • 17. Modern Tools – Machine Learning, Behavioral Analysis Fraudster Real Cardholder Payment Processor/Gateway VacationRental.com Name Card # Exp Date Zip Code CVV Submit Issuing Bank Cardholder Profile Dark Web Obtains a stolen card TOOL #5 MACHINE LEARNING - Statistical models can’t handle more than 2 dimensions well - Pair Machine learning with Rules to define Policies such as avoiding business with sanctioned countries &/or quick fixes Machine Learning Behavioral Analysis - Behavior of a fraudster is different from that of a real cardholder. For instance, they use bots to fill card information and spend much lesser time reviewing properties
  • 18.
  • 19.
  • 20. 20
  • 21. Yapstone proprietary and confidential 21 TPV by Billing City
  • 22. Yapstone proprietary and confidential 22 Fraud and Attempted Fraud by Billing City