{"id":3934,"date":"2019-02-25T08:00:49","date_gmt":"2019-02-25T15:00:49","guid":{"rendered":"https:\/\/www.numinix.com\/blog\/?p=3934"},"modified":"2026-03-24T15:14:21","modified_gmt":"2026-03-24T22:14:21","slug":"e-commerce-fraud-schemes-that-shoppers-should-be-aware-of","status":"publish","type":"post","link":"https:\/\/www.numinix.com\/blog\/e-commerce-fraud-schemes-that-shoppers-should-be-aware-of\/","title":{"rendered":"E-commerce fraud schemes that shoppers should be aware of"},"content":{"rendered":"<p><a href=\"https:\/\/www.numinix.com\/wordpress\/wp-content\/uploads\/2019\/02\/e-commerce-fraud.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3935\" src=\"https:\/\/www.numinix.com\/wordpress\/wp-content\/uploads\/2019\/02\/e-commerce-fraud.jpeg\" alt=\"e-commerce fraud \" width=\"600\" height=\"399\" srcset=\"https:\/\/www.numinix.com\/wordpress\/wp-content\/uploads\/2019\/02\/e-commerce-fraud.jpeg 600w, https:\/\/www.numinix.com\/wordpress\/wp-content\/uploads\/2019\/02\/e-commerce-fraud-300x200.jpeg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">As an e-commerce business owner, you and your team are constantly faced with the need to juggle multiple tasks at once. Whether it be quality control of your products, <\/span><a href=\"https:\/\/www.numinix.com\/plugins-customer-support-c-381_383?utm_source=Blog_February2019_ECommerceFraud\"><span style=\"font-weight: 400;\">customer service<\/span><\/a><span style=\"font-weight: 400;\">, keeping up-to-date with your <\/span><a href=\"https:\/\/www.numinix.com\/plugins-seo-c-381_386?utm_source=Blog_February2019_ECommerceFraud\"><span style=\"font-weight: 400;\">SEO<\/span><\/a><span style=\"font-weight: 400;\"> or simply managing your <\/span><a href=\"https:\/\/www.numinix.com\/plugins-social-networking-c-381_387?utm_source=Blog_February2019_ECommerceFraud\"><span style=\"font-weight: 400;\">social media accounts<\/span><\/a><span style=\"font-weight: 400;\">, it\u2019s a constant, ongoing battle of busyness. Needless to say, one of the most important responsibilities of e-commerce is fraud protection. When you\u2019re aware of how hackers are gaining access to online customer data, you\u2019re able to better secure your site in order to protect and reassure your customers. Trust goes a long way in online business and an increase in your level of security can help with most e-commerce fraud. So, continue reading to brush up on a few common schemes that fraudsters are using. <\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"#\" data-href=\"https:\/\/www.numinix.com\/blog\/e-commerce-fraud-schemes-that-shoppers-should-be-aware-of\/#Classic_fraud\" >Classic fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"#\" data-href=\"https:\/\/www.numinix.com\/blog\/e-commerce-fraud-schemes-that-shoppers-should-be-aware-of\/#Triangulation_fraud\" >Triangulation fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"#\" data-href=\"https:\/\/www.numinix.com\/blog\/e-commerce-fraud-schemes-that-shoppers-should-be-aware-of\/#Interception_fraud\" >Interception fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"#\" data-href=\"https:\/\/www.numinix.com\/blog\/e-commerce-fraud-schemes-that-shoppers-should-be-aware-of\/#Card_testing_fraud\" >Card testing fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"#\" data-href=\"https:\/\/www.numinix.com\/blog\/e-commerce-fraud-schemes-that-shoppers-should-be-aware-of\/#Account_takeover_fraud\" >Account takeover fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"#\" data-href=\"https:\/\/www.numinix.com\/blog\/e-commerce-fraud-schemes-that-shoppers-should-be-aware-of\/#How_can_you_protect_your_business_from_e-commerce_fraud\" >How can you protect your business from e-commerce fraud?<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Classic_fraud\"><\/span><b>Classic fraud <\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This type of fraud generally consists of stolen credit card credentials that are purchased from the dark web. The purchased goods are sent to re-shippers in an attempt to retrieve stolen merchandise and often, internet proxies are used to cover up any international IP addresses.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Triangulation_fraud\"><\/span><b>Triangulation fraud <\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Three parties are involved in this type of fraud <\/span><span style=\"font-weight: 400;\">\u2014 <\/span><span style=\"font-weight: 400;\">the fraudster, the shopper and the e-commerce store. The fraudster begins by creating an online storefront, often on eBay or Amazon, that offers buyers high-demand goods at incredibly low prices. The store collects the payment after the purchase is made, then uses a stolen credit card to purchase the goods from a legitimate website and proceed by shipping them to the customers. \u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Interception_fraud\"><\/span><b>Interception fraud<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The fraudster begins by processing an order where the billing and shipping information match the address that\u2019s linked to a card. Then they try to intercept the package by changing the address last minute before the order ships, contacting the shipper directly to reroute the package to a new address where they\u2019re able to retrieve it from or simply by waiting outside the address of delivery and offering to sign for the package. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Card_testing_fraud\"><\/span><b>Card testing fraud<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This practice tests the validity of a credit card number, with the plans to use those credentials on another website to commit fraud. Fraudsters often target websites that reveal a different response for each type of declined payment. For example, when a card is declined due to an incorrect expiration date, a response is given allowing the individual to simply fill in a different date. This gives multiple opportunities for the information to be entered. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Account_takeover_fraud\"><\/span><b>Account takeover fraud<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Now, this is an extremely important fraud case to be aware of. A fraudster doesn\u2019t always need to have the credit card information to be able to steal. If they\u2019re able to get a hold of a customer\u2019s login details, on an account where their credit card credentials are stored, they are able to change the shipping address and make purchases on behalf of the cardholder. \u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_can_you_protect_your_business_from_e-commerce_fraud\"><\/span><b>How can you protect your business from e-commerce fraud?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><span style=\"font-weight: 400;\">Choose a <\/span><a href=\"https:\/\/www.numinix.com\/shop-by-ecommerce-platforms-c-179?utm_source=Blog_February2019_ECommerceFraud\"><span style=\"font-weight: 400;\">secure platform<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use a secure connection for online checkout (SSL authentication for web and data protection). <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Don\u2019t store sensitive data. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use an address and card verification system.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Require users to create strong passwords with both upper and lowercase letters as well as symbols or numbers.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Set up system alerts for suspicious activity.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use tracking numbers for all of your orders. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Monitor your site. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Perform regular Payment Card Industry (PCI) scans.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Contact Numinix to integrate fraud-prevention filters on your website.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you have any more <\/span><a href=\"https:\/\/www.numinix.com\/custom_quote\"><span style=\"font-weight: 400;\">questions or concerns<\/span><\/a><span style=\"font-weight: 400;\"> in regards to e-commerce fraud protection, please <\/span><a href=\"https:\/\/numinix.atlassian.net\/servicedesk\/customer\/portal\/2\/user\/login?destination=portal%2F2&amp;utm_source=Blog_February2019_ECommerceFraud\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">contact a member of our team<\/span><\/a><span style=\"font-weight: 400;\"> to offer advice on how you can secure your e-commerce site.<\/span><\/p>\n<p><b>Are there any other types of e-commerce fraud that we didn\u2019t discuss? Please share your thoughts in the comments section below. <\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an e-commerce business owner, you and your team are constantly faced with the need to juggle multiple tasks at once. Whether it be quality control of your products, customer service, keeping up-to-date with your SEO or simply managing your social media accounts, it\u2019s a constant, ongoing battle of busyness. Needless to say, one of&#8230;<\/p>\n","protected":false},"author":269,"featured_media":3935,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[877,818,835,29,872],"tags":[311,825,965,580,34],"class_list":["post-3934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-commerce-business","category-e-commerce-platforms","category-plugins","category-search-engine-optimization","category-social-media-marketing","tag-customer-service","tag-e-commerce-fraud","tag-fraud-prevention","tag-plugins","tag-seo"],"modified_by":"Nurul Afsar","jetpack_featured_media_url":"https:\/\/www.numinix.com\/wordpress\/wp-content\/uploads\/2019\/02\/e-commerce-fraud.jpeg","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/posts\/3934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/users\/269"}],"replies":[{"embeddable":true,"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/comments?post=3934"}],"version-history":[{"count":0,"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/posts\/3934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/media\/3935"}],"wp:attachment":[{"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/media?parent=3934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/categories?post=3934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.numinix.com\/blog\/wp-json\/wp\/v2\/tags?post=3934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}