Fraud

The Real Story Behind False Declines and How Wibmo Trident FRM Secures Transactions 

In today’s fast-evolving digital economy, businesses rely heavily on seamless online transactions to drive growth and customer satisfaction. However, false declines — legitimate transactions mistakenly flagged as fraudulent — have become a growing concern. These incidents lead to customer frustration and significant revenue loss. As fraudsters continue to innovate, businesses must deploy advanced security measures that both combat fraud and minimize false declines.  In this blog, we explore the causes and impact of false declines and how Wibmo’s Trident FRM (Fraud Risk Management) system helps businesses reduce these risks while providing secure, frictionless payment experiences.  What Are False Declines?  False declines, also called false positives, occur when valid transactions are incorrectly rejected due to fraud detection systems being overly cautious. These rejections can be triggered by unusual spending patterns, technical errors, or overly strict fraud detection algorithms. While these systems aim to block fraudulent activity, they can sometimes hinder genuine transactions.  In 2023, false declines have been an expensive issue for businesses, costing global eCommerce firms an estimated $81 billion in lost revenue. This highlights the need for more advanced fraud detection systems that balance security with customer convenience.  The Impact on Businesses and Consumers  False declines affect both businesses and consumers alike. For businesses, the immediate loss of revenue from rejected transactions is just the beginning. Customer churn is a serious consequence, as 47% of customers who experience a false decline may not return, leading to long-term revenue loss. Additionally, false declines contribute to operational inefficiencies as businesses deal with disputes and chargebacks, further affecting profitability.  For consumers, having a legitimate transaction rejected can damage trust and loyalty. The frustration caused by a false decline often leads to customers turning to competitors, affecting future engagement.  How Wibmo Trident FRM Reduces False Declines  To address these challenges, Wibmo’s Trident FRM (Fraud Risk Management) provides a sophisticated solution that combines machine learning, real-time data analysis, and behavioural analytics to accurately assess transaction risk.  Key Features of Wibmo Trident FRM:  Trident FRM continuously monitors user behaviour, detecting anomalies and signs of potential fraud. This advanced fraud detection helps block fraudulent transactions while allowing legitimate ones to be processed without interruption.  Unlike traditional fraud detection systems, Wibmo Trident FRM adapts to emerging fraud patterns. It fine-tunes authentication requirements based on transaction risk, ensuring a balance between fraud prevention and customer experience.  Leveraging AI-powered data analytics, Wibmo Trident FRM offers real-time fraud detection, blocking fraudulent transactions as they occur. This ensures that businesses can process legitimate transactions smoothly while preventing unauthorized activities.  Combating Online Fraud  The global rise of eCommerce has seen an increase in online fraud, with $48 billion in eCommerce fraud losses globally in 2023. Businesses must adopt proactive fraud prevention strategies to avoid these significant financial losses. Wibmo Trident FRM provides a robust solution that not only protects businesses but also reduces the frustration caused by false declines.  Best Practices for Fraud Prevention:  Benefits of Wibmo Trident FRM  Wibmo Trident FRM allows businesses to strike the right balance between security and customer experience. By reducing false declines, businesses can protect their revenue and build long-term customer trust and loyalty. Its adaptive approach ensures that customers enjoy a seamless and secure payment journey, even in a high-risk online environment.  Customer Experience Impact:  With fewer interruptions and smoother transactions, Wibmo Trident FRM enhances the overall customer experience, helping businesses maintain customer loyalty while ensuring secure payments.  Conclusion  As online fraud continues to rise, it’s crucial for businesses to adopt advanced fraud management solutions. False declines can cause both financial losses and customer dissatisfaction, making it essential to minimize them through intelligent risk management. Wibmo Trident FRM offers an effective solution that provides real-time, adaptive fraud prevention while ensuring legitimate transactions are processed smoothly. 

The Real Story Behind False Declines and How Wibmo Trident FRM Secures Transactions  Read More »

Enhancing Fraud Prevention with Risk-Based Authentication and Method URL

Preventing fraud while maintaining a seamless user experience is crucial for merchants and issuers alike in the rapidly evolving digital payment landscape. A key way to strengthen fraud prevention is by gathering more device and browser characteristics before authentication. This can be achieved through Risk-Based Authentication (RBA), Browser Fingerprinting, and the use of Method URL as part of the EMV 3DS protocol. Let’s explore how these elements work together to improve security and reduce fraud. The Role of Risk-Based Authentication (RBA) Risk-Based Authentication (RBA) dynamically assesses each transaction’s risk level based on multiple factors, such as device characteristics, location, and user behaviour. Instead of applying a blanket security protocol for all transactions, RBA allows issuers to adjust the level of authentication required based on the perceived risk. This improves fraud detection while minimizing friction for low-risk transactions, thereby creating a better user experience. Browser Fingerprinting: A Core Element of Fraud Detection Browser fingerprinting is a technique used to collect unique information from a user’s browser. This includes data like the device’s operating system, browser version, plugins, IP address, screen resolution, and more. By building a unique profile of the user’s environment, issuers can detect anomalies that may indicate fraud, such as sudden changes in the user’s device or location. However, to leverage this information effectively, additional data must be captured early in the transaction flow, which is where Method URL comes into play. Understanding Method URL Method URL is a critical step of the EMV 3DS protocol. It enables issuers to collect additional browser information during the early stages of the authentication process. This step, which occurs before the authentication request is fully processed, provides vital data that can enhance RBA and fraud prevention measures. How Method URL Works: Benefits of Method URL in Fraud Prevention The use of Method URL offers several benefits for both issuers and merchants in combating fraud: Best Practices for Implementing Method URL To maximize the benefits of Method URL, issuers and merchants should follow these best practices: Integrating Wibmo Protect Wibmo Protect is an advanced fraud prevention solution that seamlessly integrates with RBA, Browser Fingerprinting, and Method URL to provide an additional layer of security. By leveraging Wibmo Protect, issuers and merchants can benefit from: Conclusion Method URL, when integrated properly, significantly improves fraud prevention by enabling issuers to gather vital browser and device characteristics early in the authentication process. By leveraging this data for risk-based authentication, both issuers and merchants can reduce fraud, improve authentication success rates, and provide a better user experience for customers. As fraud prevention becomes more complex, using tools like Method URL and Wibmo Protect is essential for staying ahead of emerging threats and ensuring secure, frictionless transactions.

Enhancing Fraud Prevention with Risk-Based Authentication and Method URL Read More »

Transforming India’s Digital Payments: The Rise of AePS and Its Challenges

A Decade of Digital Evolution India’s digital landscape has undergone a remarkable transformation over the past decade. With the advent of digital payment channels such as UPI, IMPS, and net banking, the country has achieved unprecedented growth in digital transactions. Despite these advancements, one specific demographic—rural middle-aged to senior citizens—was not fully utilizing this ecosystem. To address this gap and make basic banking services accessible in areas with limited banks and ATMs, the government launched the Aadhaar Enabled Payment System (AePS). Introduction of AePS The Aadhaar Enabled Payment System, introduced by the NPCI in 2016, is a digital payment method based on the Unique Identification Number (UIN) linked to the Aadhaar card. It allows Aadhaar cardholders to conduct financial transactions via Aadhaar-based authentication without needing to visit a bank. Instead, these transactions are facilitated by business correspondents (Bank Mitras) using micro-ATMs. AePS empowers all sections of society by making financial and banking services accessible to everyone through Aadhaar. It supports seamless fund transfers, cash deposits, withdrawals, balance inquiries, and more. Additionally, AePS facilitates the disbursement of government welfare schemes such as NREGA, social security pensions, and old age/handicapped pensions. Exponential Growth Since its launch, AePS has seen a significant boost in utilization. In 2019, the revenue from AePS transactions was around INR 5 billion. Within five years, this figure skyrocketed to INR 51 billion in 2024, a tenfold increase. By 2025, it is projected to reach INR 67 billion. In 2023 alone, over 370 million customers conducted transactions through AePS, highlighting its widespread adoption and success. Rising fraud concerns However, the rapid growth of AePS has also attracted fraudsters, targeting the predominantly rural, middle-aged, and senior population. Over the past 2–3 years, numerous reports of AePS-related fraud have surfaced. For instance, in Hyderabad, a gang of cybercriminals was arrested for fraudulently withdrawing ₹14.64 lakh from 149 customers. Such incidents underscore the growing risk of cyber-financial scams associated with AePS. According to the Indian Cyber Crime Coordination Centre (I4C), AePS frauds accounted for 11% of cyber financial scams originating in India in 2023. Addressing Fraud: RBI and NPCI Initiatives In response to the increasing fraud cases, the RBI has instructed banks to streamline the onboarding process for AePS touchpoint operators, including mandatory due diligence. Additional fraud risk management requirements are also being considered. The NPCI has released circulars addressing customer withdrawal limits, account statements, and Business Correspondent (BC) onboarding procedures. Strengthening onboarding processes AePS providers must rigorously scrutinize the onboarding processes for business correspondent agents. This involves conducting comprehensive background checks to verify the authenticity and credibility of potential agents. Additionally, a risk-based categorization system should be implemented, where agents are classified based on an assessment of their history, including any previous instances of fraudulent activities or non-compliance. By adopting a detailed and systematic approach to onboarding, AePS providers can ensure that only trustworthy and low-risk agents are integrated into the system. Moreover, continuous monitoring and periodic reassessment of BC agents are crucial to maintaining high standards of integrity and security. Regular training and awareness programs should be conducted to keep agents updated on the latest security protocols and fraud prevention techniques. By strengthening these onboarding and monitoring processes, AePS providers can significantly reduce the risk of fraud and enhance the overall security and reliability of the payment system. This proactive approach not only safeguards the interests of users but also fortifies the reputation and operational efficiency of the AePS ecosystem. Common fraud scenarios One prevalent fraud scenario involves unauthorized cash withdrawals, where users receive no indication of the transaction. Fraudsters often impersonate fingerprints or deceive customers about the success of transactions. In some instances, BC agents have been known to use silica gel to replicate fingerprints, further complicating the detection of fraudulent activities. These sophisticated methods of fraud underscore the necessity for AePS providers to enhance their security measures and address these specific threats comprehensively. To combat these issues effectively, AePS providers need to strengthen their ecosystem and focus on specific patterns to identify and mitigate fraudulent activities. Key Areas of Focus Preparing for Future Challenges Currently, the primary issue revolves around cash withdrawals. However, with the increasing volume of fund transfers, there is a potential risk of anti-money laundering activities. As AePS providers continue to expand their services, they need to be adequately equipped to handle these emerging challenges. This involves not only detecting and preventing fraudulent activities but also complying with stringent regulatory requirements to ensure the integrity of the financial system. Conclusion The AePS industry is booming, and as it grows, fraudsters will seek new ways to exploit the system. To sustain growth and protect users, financial institutions must enhance fraud and risk management systems by investing in advanced technologies like artificial intelligence and machine learning for real-time monitoring and anomaly detection. Continuous education and training for users and service providers on potential risks and best practices are also crucial. By implementing robust security measures, the AePS ecosystem can mitigate fraud risks and continue to flourish, driving financial inclusion and transforming India’s digital payment landscape. Collaboration with regulatory bodies is essential to stay ahead of emerging threats and ensure a secure, seamless payment experience. With a concerted effort towards enhancing security and compliance, the AePS industry can thrive, paving the way for a more inclusive and digitally empowered India.

Transforming India’s Digital Payments: The Rise of AePS and Its Challenges Read More »

BIN Attack Fraud

Card not present (CNP) transactions are those where the purchase is made without presenting the physical card to the merchant at the point of sale. As more and more physical stores are using EMV-compliant terminals, Javelin Strategy & Research credit card fraud statistics report that card-not-present fraud is now 81% more likely to happen than card-present fraud. Card-not-present transactions can be done via online merchants, telephone orders, or mail. There are various modus operandi to commit CNP fraud, such as account takeover using phishing scams, malware infection to capture keystrokes, or friendly fraud. In such scenarios, the cardholder is involved in the fraud, and it is kind of a personalised attack. However, today we will talk about an impersonal attack where a fraudster exploits a BIN (bank identification number) and uses distributed computing power to automatically generate the remaining numbers and test these combinations to see which card numbers are correct and if the cards are active. This kind of attack is called BIN attack fraud. The subtlety of BIN Attack fraud is that it does not involve any data breach or ID theft; it is just a pure random coincidence that a victim’s card number is chosen. The compromised cards can have a significant impact on issuing banks in terms of chargebacks, call c entre volume spikes, and re-issuance expenses. Furthermore, any cardholder disruption or friction during this tenure leads to a loss of interchange revenues. The damage to the bank’s reputation could lead to cardholders switching the bank’s services to another, more secure bank. A merchant involved in BIN attack fraud faces increased disputes or chargebacks, additional fees, and regulatory fines. Depending on the nature of the attack and risk profile, the acquiring bank may choose to suspend support for the merchant’s site. The cardholder’s bank may restrict purchases from your site, resulting in further financial losses. Refunding any fraudulent transactions is an operational challenge, not to mention the reputational loss. Thus, BIN attack fraud is a problem both for issuers and merchants. Preventing a BIN Attack Fraud To prevent BIN attack fraud, the merchant or the issuing bank can deploy a few techniques: Enable 3D security. The latest version of EMV 3DS 2.x is an additional security layer for online credit and debit card transactions that aims to achieve a balance between security and user convenience. As a merchant, enable a CAPTCHA test to tell humans and bots apart. While this may create friction for genuine customers, it’s an effective deterrent against BOT scripts. Deploy an anti-fraud solution that can look at many aspects and block transactions or alert your fraud analyst. A good anti-fraud solution should have: Ability to spot multiple low-value transactions (unusually low for the merchant’s business). Multiple declines within a short period The timing of transactions may be unusual for the merchant, business, or cardholder. A large number of transactions from the same BIN were attempted in a short period of time (a few seconds apart). IP Velocity Checks: Even though these days, through proxy and spoofing, fraudsters can make it seem that the transactions are coming from different IPs, Use an anti-fraud solution that deploys good device fingerprinting techniques to solve this issue, as fingerprinting is impervious to IP proxies. Unusually large volume of international transactions for a given merchant or for a cardholder. Look for patterns, cards with sequential numbers, the same card number but different expiration dates, or CVV codes. Ability to create a profile for the merchant and cardholder and alert in case of any significant deviations. There are a few additional measures that the industry could take, such as creating advisory, actionable intelligence, and a listing of sites that anti-fraud tools can take advantage of. EMV 3DS 2.x allows merchants and acquirers to do a risk assessment prior to making an EMV 3DS authentication call to the issuer. A combined risk assessment from both the acquiring and issuing sides acts as a strong deterrent to fraudsters. Both issuers and acquirers can pool their intelligence and create a shared intelligence pool of fraud markings to identify common points of fraud. Information on declines on the switch side during authorization when fed into 3DS authentication ACS gives actionable intelligence to anti-fraud tools. BIN attack fraud is still a crude brute-force attack vector that is detectable, and preventive measures can be taken to interrupt it. A well-informed merchant and bank implementing a defensive anti-fraud solution that keeps itself abreast of the latest advisories combined with continuous monitoring of anomalous behaviour can stay a step ahead of this kind of fraudulent attack. Author: Ajit Nair, Director Product Management Wibmo A PayU/Naspers FinTech Company Cnp, Fraud, Fraud Prevention, Payment Fraud, Payments

BIN Attack Fraud Read More »

RETURN FRAUD- The e-commerce way of Shop-Lifting

The pandemic changed the way consumers shopped. A black swan event changed consumer behavior and Online shopping is one of the segments to reap benefits. The pandemic and the exponential growth in e-commerce forced traditional brick-and-mortar shops to adapt to the evolution. Pre-pandemic brick-and-mortar shops kept a cautious eye on shoplifters but the e-commerce boom came up with its own shoplifting nemesis, say Hello to RETURN FRAUD. Fraudsters abuse the retailer’s fraud policy which was actually created for customer delight and it’s the smaller e-retailers who bear the brunt of Refund Fraud. The modus operandi of Refund Frauds differs from traditional frauds as it takes place post transaction — once the goods have exchanged ownership from the merchant to the consumer. A thriving ecosystem, Fraud-as-a-Service (Professional Refunders) has come into place to support those who wish to take advantage of lax return policies without actually having to go through the process. Reddit and Discord channels are leveraged as promotional grounds for these Illegal Life Pro Tips (ILPT) Modus Operandi 1. Everything is legitimate during the online transaction. Fraud is initiated once the good is received by the consumer. 2. Consumer goes to a Professional Refunder who charges a percentage cut on the refund value. 3. Refunder impersonates the Consumer 4. Refunder initiates the escalation with the merchant and uses the PERFECTED METHODS to get a refund without returning the product. A few of the Perfected Methods : a) Substance Leak — With doctored images/videos refunders report hazardous breakage such as monitor capacitor leakage, or battery acid leakage, thus making the product legally un-shippable. b) Partially Empty Box — Generally used for tracked shipping where the package is claimed to have arrived but has missing components. c) Fake ID Tracking Numbers — A properly weighed package is returned back without the actual goods. The shipping address is doctored to a new but incorrect address. Refunder then initiates a return claim with the merchant — to whose naked eye the package appears to be shipped and delivered back. d) Blood or Maggots — Claiming of finding questionable substances (again, doctored images/videos) in the product received and thus a reason for why one can’t possibly handle the opened package. Refund Fraud not only is a concern to merchants but also runs a risk of putting consumers’ virtual assets at risk such as email, passwords, card details, etc — as refunders offer Fraud-as-a-Service, access to the buyer account. Apart from the complicated methods listed above employed by professional refund fraudsters, consumers, with a Robin Hood mentality, too are learning about refund fraud and executing Refund Fraud as : a) Bricking: A working item ( generally electronic items) is purchased with the intention to be returned after stripping down the valuable component and rendering the item eventually unusable. b) Wardrobing: Majorly observed with expensive clothing. An item is purchased, used, and eventually returned. c) Switch Fraud: Returning a previously owned defective or damaged identical item with the aim of cashing on to the refund. Be it the retailers or the e-retailers have a return policy in place but a fine balance needs to be maintained — neither overly complex nor overly relaxed. The process of refund dents a blow to the bottom line not only in terms of labor involved in the process but also in refurbishing the returned items. Trying to avoid Return Fraud by adding manual resources will be a mountain task in this era of data where organizations are sitting on a mountain of data as well as leveraging data from other sources. Multiple data enrichment tools provide services as quick reverse checks on multiple data points for instance email addresses. Current innovations in fraud detection software over the recent years have made it possible to curb the menace of fraud even with very little technical knowledge. Author: Sujit Kumar Mahato, Product Manager Wibmo A PayU/Naspers FinTech Company Fraud, Fraud Detection, Fraud Prevention, Return Fraud, Risk Management

RETURN FRAUD- The e-commerce way of Shop-Lifting Read More »

Prediction, Prevention, and Detection of Fraud Attempts, the key to faster payment processing

The global digital payment market size is expected to grow from USD 89.1 billion in 2021 to USD 180.4 billion by 2026. The promotion of digital payments worldwide and the increasing penetration of smartphones are major contributors. Besides, the pandemic has accelerated the adoption of contactless and wallet payments. India, too, saw exponential growth. Thanks to 1 Billion cards and more than 2 Billion prepaid payment instruments like wallets and other digital payment modes. But, cyberattacks are a major roadblock in the growth of digital payment solutions. These global attacks are the most critical challenges that the payment industry has been facing. New and evolving cyberattacks affect businesses by breaking into payment systems to get cardholders’ data. The evolving frauds include : a) Friendly fraud — Fraudsters make the purchase on a credit card, receive the product or service. Then demand a refund for a lost or short-shipped order, or file a chargeback through their credit card issuing bank. With the intention of receiving a full refund of the purchase amount. b) Affiliate fraud — Refers to any unscrupulous activity conducted to generate commissions from an affiliate marketing program. Newer types of affiliate fraud include using stolen data for lead generation or stolen credit cards to generate sales. c) Botnets- Submit large numbers of transactions to test the viability of stolen payment card credentials. d) Phishing — Fraudulent communications, through email, text, or call, that appear to come from a reputed source. e) Velocity attacks — Multiple monetary authorizations seeking to detect an active account and decipher CVV/Expiry Date values of a set of cards within a BIN range. f) Triangulation — Fraudster is the middleman between a customer and an unsuspecting merchant. The customer places the order through the fraudster (impersonating as a merchant). Then the fraudster uses stolen credit card information to buy those goods from a legitimate merchant. It is estimated that 9 million identities are stolen each year in the US alone, with a new victim of identity theft every two seconds. Since many people do not report identity theft, no true number of victims exists. According to the Central Statistics Office (CSO), by 2021, loss from cyberattacks would rise to US$ 6 trillion from US$ 3 trillion in 2015. The growing number of cyberattacks is a hindrance to the adoption of digital payment services. In a recent study by YouGov and ACI worldwide, consumers are increasingly concerned about digital payments fraud. As a result, exercise greater caution when using digital payments compared to a year ago. 71% of consumers are more concerned about scams and fraud because of Covid-19, compared to 47 percent of consumers last year at the onset of the pandemic. The study also indicates that banks continue to be the preferred first point of contact in event of fraud. Around 60% of respondents would first call their bank to block their account or visit the bank branch to file a written complaint. Though worldwide initiatives towards customer awareness are on the rise, the banks will need to continue to lead the way not only by increasing customer awareness but also by deploying modern and robust enterprise-level fraud management solutions. For a delightful customer experience, banks need to predict, prevent and detect fraud attempts even before the payment processing to pave way for frictionless digital transactions. Author: Sujit Kumar Mahato, Product Manager Wibmo A PayU/Naspers FinTech Company Fraud, Fraud Detection, Fraud Prevention, Global Digital Payments, Online Payments

Prediction, Prevention, and Detection of Fraud Attempts, the key to faster payment processing Read More »

How to prevent identity theft?

With unprecedented growth in online transactions, it is no surprise that online fraud has increased. One of the major malpractices is identity theft. In a country like India which is striding towards the number one position in online shopping, the rise in this kind of fraud cannot be overlooked. Accessing and retrieving personal information is a child’s play in an increasingly digitized country like India. With social media and the deep web or darknet getting more and more accessible to a larger population, the prevalence of identity theft is getting increasingly difficult to control. Who can be the victims of Identity Theft? Have you used your Credit or Debit card to shop online/POS? Have you paid the utility bills using your Card? Have you used UPI or other payment methods? In short, anyone who has used plastic money is in danger of identity theft. Everyone who has shopped online or used any payment portal using their payment credentials is at risk of falling prey to synthetic identity theft. It is, in essence, stealing your identity i.e., impersonating you digitally, and riding on your credibility and creditworthiness. It is done by gathering data that confirms the identity like phone number, Aadhar card number, or PAN card number along with Bank Account number and utilizing this data to impersonate and transact digitally. With widespread social media and the data captured by almost all websites, it is nearly impossible to stay completely private. The Conditions favouring Identity theft In a densely populated country like India, identity theft is spreading like a disease more due to Cyber security laws are in place but reporting and actual implementation of those laws is not easy in a developing country like ours. It is getting easier to lay hands on social security details like Pan and Aadhar Data breach is increasingly difficult to prevent crime by identifying the perpetrators and isolating them. Also, the timeline that the entire fintech industry works, is very limited i.e., the journey of the card to merchant to verification or access control and back to the transaction approval takes just thirty seconds on average. This renders a very small window to our lenders but an easier getaway to the fraudsters. It, therefore, makes more sense to fortify defences at our end through our payment gateways. Usage of multi-layered security makes it a herculean task to track perpetrators while they on other hand enjoy accessibility from any corner which has internet. The Impact It is an indisputable fact that digitization of the financial transactions in India has accelerated beyond what the experts forecasted. Part of it was contributed by the covid waves and the awareness of “cashless transactions and contactless delivery”. It can however not be denied that as the younger population of the country is swelling, we find a major part of the population turning net-savvy and preferring mobile transactions. They demand seamless experience and connectivity through IoT. This has not only provided traction to digitization but has also enhanced the effectiveness of creating an antifraud and secure transactional environment to retain the credibility of the digitized transactions. Role of FRM like Trident in Detection of fraud The simple logic that Wibmo uses is that the more you know your customer, the more difficult it becomes for the fraudsters to impersonate you. E.g., while a person might impersonate another with a banker, it is almost impossible to impersonate him with his family. The difference lies in the fact that the family knows the person in question too well. This is the exact logic we use at Wibmo through our TRIDENT. In essence, the more you use our services, the more difficult it becomes for fraudsters to steal your identity. Collecting various data points through ML or machine learning offers the most effective defence against identity theft. Based on the past patterns, the current transaction can be evaluated and analysed in a fraction of seconds, and thus the fraud detection and prevention can occur without increasing the transaction time. The continuous learning by the machine will only improve as the data points collected are only going to get the virtual persona of the customer more precise. The long-term utility and credibility that such a system can give to the issuer and acquirer are worth every penny spent and every effort taken. Role of end-users in the detection of the fraud There are few steps that you can take to reduce the risk as an end-user. 1. Take time to check the authenticity of the sites where you are planning to use the card. Do not simply click on the links sent over SMS or WhatsApp or mails offering you cashback or discount vouchers 2. Download the apps from a trusted origin and use that for repeat purchase rather than using links that might have been sent to you. 3. Never share the OTP, UPI pin, and other bank details. However, at times this has been reiterated it is surprising how even the educated crowd is taken in. Do not hesitate to change them in case you even suspect them having been compromised. No one can deny that Identity theft is a very real threat but reducing our transactions fearing this is akin to not using roads fearing accidents. Neither is it fair to throw the onus of this onto the end-users or customers. The only sustainable and robust solution lies in fortifying our defences at the PG level. Author: Krishnan KN, Advisor in Wibmo’s Agile PMO Wibmo A PayU/Naspers FinTech Company Fraud, Fraud Detection, Fraud Prevention, Identity Management, Identity Theft

How to prevent identity theft? Read More »