What is Triangulation Fraud? How to Defend Against Reseller
Scams
Consider the perfect eCommerce sale. An honest customer buys a product online that the merchant fulfills. The merchant earns business revenue, while the customer receives a needed good or service. Everyone is happy. Unfortunately, fraudsters have developed ways to insert themselves into this process: as fake middlemen. Since many merchants act as resellers, drop shippers, or third-party suppliers on eCommerce platforms, criminals can create businesses that lure unsuspecting consumers into three-way fraud—a scam known as triangulation fraud. Triangulation fraud has devastating impacts on merchants. It leads to direct financial losses, chargebacks, product loss, and drained resources. Even worse, the scam preys on the privacy and trust of digital sales, leading to a crucial breakdown of faith by the consumer in the payments industry. FUGU has post payment defenses that give you more time to accurately detect and limit this type of fraud. Let’s explore triangulation fraud and how you can protect your business from this scam.
Triangulation Fraud Explained
Triangulation fraud is a social scam (typically within a card-not-present ecosystem) that creates a false version of a triangular sale. A fraudster, posing as a business or reseller, accepts money from unsuspecting consumers. They mirror common three-way sales that you might see, say with travel agents or event ticket resellers, but instead of filing orders honestly, they use false orders with merchants.
The tactic tricks both the customer and merchants into completing what looks like honest sales. In reality, the genuine parties have engaged with a false middleman (one who pockets the money and leaves the merchant with the chargeback). The triangular nature of the scam comes from the fact that three parties are conducting the sale: the genuine customer, the fraudulent seller, and the honest merchant.
Step-by-step process of triangulation fraud
Here is a typical walkthrough of how fraudsters execute triangulation fraud:
1. Genuine customer purchase: The genuine consumer purchases a product or service with genuine card details from what they think is a known seller (e.g. an eCommerce marketplace, booking websites, etc). In truth, they are buying from a fraudulent reseller. Criminals often advertise cheap and discounted products to attract buyers and communicate directly with the customer to earn the sale. As a result, a consensual transaction executes with a valid payment method. The fraudster pockets this “pushed” money.
2. Fraudulent ordering: Instead of shipping or fulfilling the customer’s order, the fraudster then places a second purchase with an honest merchant on behalf of the genuine customer. But for this second transaction, the criminal uses another innocent user’s stolen credit card data (often gathered from phishing, fraud rings, and friendly fraud schemes) even though the product delivers to the genuine customer’s address. By mixing real customer details with stolen payment data, the order appears legitimate to the merchant. Many scammers will go so far as to have full sales conversations with merchants, phone calls, or back-and-forth email chains.
3. Genuine order processing: The merchant, on the assumption they are working with a verified third party, processes the false payment and ships the product to the genuine customer. The customer receives what they paid for, has no idea they are part of a scam, and does not raise any alarms.
4. Final chargeback: Eventually, the owner of the stolen credit card notices unauthorized charges and files a chargeback against the merchant. The merchant, now liable for both the lost product and the payment, is left with little recourse and suffers a financial loss.
Triangulation Fraud Prevention Challenges
Triangulation fraud is a social scheme that exploits legitimate eCommerce systems. As a result, this type of fraud is particularly challenging to detect, and for several reasons:
Weaknesses of Triangulation Scams (and how you can use that to
protect your business)
Even though middleman fraud operates behind the scenes to conceal the scheme, some signs hint towards triangulation fraud. For one, triangulation fraud does have a digital trail. The fraudster uses stolen card details—once the legitimate cardholder or financial institution notices suspicious activity and reports it, you can trace the card and fraud origin. And if you collect order and transaction details from the middleman, that can lead back to the false reseller account. Second, triangulation fraud orders contain mismatched info and conflicting data. Orders from the fraudster occur with a device or location that does not match expected billing, shipping, or geographic data. Fake or incorrect drop addresses, suspicious IPs, strange email addresses, incorrect biometrics/device fingerprinting, and wrong geolocation data can all raise flags. Thirdly, criminals often work in groups and use repeat tactics to work their schemes at scale. In the case of triangulation fraud, criminals want products that will entice buyers, have a low profile to avoid detection systems, earn fast cash flow, and operate at high volume to limit risk. As a result, there are common reseller patterns that speak to the likelihood of triangulation fraud:
• Frequent, low-value orders
• Products with small margins and high turnover
• Bulk sales
• Popular items with high sales values
• High transaction volumes targeting resellable, movable, or returnable items
Lastly, there is metadata you can watch for that betrays a scammer. A lack of communication, changes in language style, strange payment activity, multiple accounts, missing or unverified account details, or unconventional shipping requests all hint towards a fraud ring rather than an honest consumer or reseller.
How FUGU Protects Your eCommerce Business With Post-Payment
Verification Processes:)
With a detailed understanding of the common triangulation signs, FUGU’s proprietary AI algorithms are uniquely prepared to defend against middleman fraud. We confirm the legitimacy of orders as the transaction occurs to reduce the risk of fulfilling orders made with stolen credit cards. We achieve this via post-payment tracking. The signs for triangulation fraud are apparent—if you have an adequate time runway and can assess the common signals of fraud against preset risk thresholds. For example, with triangulation fraud, there is often email communication between the fraudster and the customer or merchant. By looking through that communication data, we can detect middleman scams. A scammer can often betray their intentions (misplaced address details, evasive responses, last minute change requests).
Or if we notice that the location of the customer, third-party reseller, email/IP, and credit card details are all different, that hints toward triangulation fraud, which we can then explore. This only occurs with high-quality post-payment verification. The longer you monitor each incoming detail of a transaction, the more accurate a picture you build, letting you better detect triangulation fraud. FUGU accomplishes this goal through several tool features:
Card-not-present fraud (of which triangulation fraud is a sub-type) accounts for 73% of total card fraud. That has led to more than $30 Billion in global losses for 2022 alone, with estimates of yet greater losses in the future. Merchants and industry players must build adequate defenses to this type of fraud to ensure sustainable business health. Fortunately, emergent technology provides effective methods to track and limit triangulation fraud. By decoupling acceptance from verification and assessing transactions across the entire payment model, FUGU’s AI powered analysis can detect fraudulent triangulation orders before they process, helping protect revenues with far fewer false positives. To see how the tool works, check out our solutions page