Preventing Card-Not-Present (CNP) Fraud (2024)

ISO 20022 Guide

Card-not-present fraud is one of the fastest-growing forms of card fraud. Here’s how to safeguard your business and your customers against it.

On This Page

What is a card-not-present transaction?What are the different types of card-not-present transactions?What is card-not-present fraud?How do scammers obtain information to commit card-not-present fraud?What risks does card-not-present fraud pose to consumers?How prevalent is card not present fraud?Who bears the loss for fraudulent card-not-present transactions?How else does card-not-present fraud effect merchants?What technology can merchants use to combat card-not-present fraud?How does ACI Worldwide fight card-not-present fraud?

What is a card-not-present transaction?

A card-not-present (CNP) transaction refers to any transaction that takes place without a credit card or cardholder being physically present. CNP transactions stand in contrast to card-present transactions, in which payment details are captured in person by swiping, tapping or dipping a credit card through a reader.

Preventing Card-Not-Present (CNP) Fraud (1)

What are the different types of card-not-present transactions?

There are a wide variety of CNP transactions, including:

Preventing Card-Not-Present (CNP) Fraud (2)

What is card-not-present fraud?

As its name implies, card-not-present fraud is a form of card fraud run specifically on CNP transactions. CNP transactions tend to be more vulnerable to fraud than card-present ones because scammers don’t need to steal a physical card, counterfeit one or find their way around EMV chip technology in order to make fraudulent transactions.

In most cases, all a fraudster needs to make a transaction is a cardholder’s credentials, such as their name, billing address, account number, card value verification (CVV) number or card expiration date.It can take longer for merchants to detect this type of fraud because the scammer’s transactions are seemingly legitimate, which means fraudsters are often able to make multiple purchases using stolen credentials before they’re found out.

Card-not-present fraud can be divided into two subcategories: without 3D Secure (3DS) authentication, and with 3DS authentication. For reference, 3D Secure authentication is a security protocol designed to reduce the risk of fraud, identity theft and other illicit activities during CNP transactions.

Preventing Card-Not-Present (CNP) Fraud (3)

Card-not-present fraud without 3DS authentication includes any CNP transaction that does not require an additional level of customer authentication — for example, when a customer makes a purchase online by entering their card information into a website and is not prompted to verify their identity. Although 3DS is intended to reduce the risk of fraud, fraud can still occur. Card-not-present fraud with 3DS typically happens when a card issuer bypasses authentication steps in an attempt to validate a transaction. If fraud should occur, the card issuer is held liable; however, this type of fraud can still impact a merchant’s overall fraud performance key performance indicators.

How do scammers obtain information to commit card-not-present fraud?

Cybercriminals use a variety of tactics to obtain cardholders’ payment details and commit card-not-present fraud — tactics such as:

Social Engineering

Social engineering is a broad category of scams in which fraudsters use psychological manipulation to convince their targets to share personal information, provide access to restricted systems or spread malware. Although phishing is perhaps the best known example of social engineering, other forms include spear phishing, baiting, pretexting, tailgating and quid pro quo attacks.

Spyware

Cybercriminals will often use social engineering to convince victims to download attachments that will automatically install spyware on their devices, which then monitors their activity. One of the most common forms of spyware, called a keylogger, records every keystroke a user makes and automatically sends it to the fraudster, enabling them to gain access to sensitive information, including user logins, account numbers and payment credentials.

Data Breaches

Merchants and banks are common targets for hackers looking to expose cardholders’ personal and financial information. Data from Statista shows that in the third quarter of 2022 alone, approximately 15 million data records were exposed worldwide through data breaches — a 37% increase from the previous quarter.

Card Skimming

Fraudsters will sometimes install skimming devices in ATMs or point-of-sale terminals at gas stations, restaurants and retail stores. When a cardholder inserts their credit or debit card into the machine, the device automatically captures their information from the card’s magnetic strip and sends it directly to the scammer.

Public Wi-Fi Networks

Cardholders who use public internet (without a VPN) to access accounts or review sensitive documents are at an increased risk of card-not-present fraud, as scammers will often monitor these networks to steal cardholders’ credentials.

What risks does card-not-present fraud pose to consumers?

Cybercriminals who commit card-not-present fraud typically use cardholders’ payment information to make fraudulent purchases, ranging anywhere from a few hundred dollars to tens of thousands.

In addition to fraudulent purchases, scammers may also:

  • Use cardholders’ credentials to set up recurring payments from their account, typically in small enough increments that it doesn’t warrant the cardholder’s notice or concern;
  • Acquire cryptocurrency and convert it into cash without leaving a paper (or digital) trail
  • Buy gift cards in bulk so that they can reduce their risk of being tracked when they make online purchases or resell those gift cards.
Preventing Card-Not-Present (CNP) Fraud (5)

Downloadable ISO Migration Guide & Checklist

Take your first steps toward adopting the new messaging standard using our ISO 20022 migration guide and compliance checklist.

Get the Guide

How prevalent is card-not-present fraud?

Card-not-present fraud is one of the fastest-growing types of not just card fraud, but fraud in general:

Preventing Card-Not-Present (CNP) Fraud (6)
  • According to UK Finance’s Fraud the Facts 2021 report, card-not-present fraud constituted 85.3% of all card fraud reported in 2020.
  • A 2021 report from Nilson Report states that card-not-present fraud accounted for almost 7 out of 10 fraud losses to merchants and acquirers in 2020, totaling almost $19.43 billion USD worldwide.
  • Insider Intelligence expects card-not-present fraud to account for 74% of all fraud by 2024 — a 57% increase from pre-pandemic levels in 2019.

Who bears the loss for fraudulent card-not-present transactions?

Unlike card-present fraud, in which the issuing bank typically bears the loss for fraudulent transactions, merchants bear the loss for card-not-present fraud — particularly for CNP fraud without 3DS. In neither case is the cardholder held liable.

How else does card-not-present fraud affect merchants?

Bearing loss for card-not-present transactions can have a serious impact on merchants’ bottom lines. LexisNexis reports that in the United States and Canada, every $1 of fraud costs retail and eCommerce merchants $3.75 and $3.19, respectively. This is a considerable increase from 2019 rates — a 19.8% increase for the U.S. and an 11.1% increase for Canada — and those numbers are expected to climb.

If a customer realizes they’ve been the victim of card-not-present fraud, they may request a chargeback with their bank. Managing those chargebacks adds to merchants’ expenses, increasing overall fraud costs.

Card-not-present fraud not only takes a financial toll on merchants — it also has the potential to damage their brand’s reputation. If a merchant’s customers frequently find themselves the targets of card-not-present fraud, it suggests that that merchant has not done its due diligence authenticating purchases, which may prompt customers to take their business elsewhere.

Preventing Card-Not-Present (CNP) Fraud (7)

Get Your ISO 20022 Migration Guide.

Complete your migration with confidence using our comprehensive guide and ISO 20022 compliance checklist.

Download Now

What technology can merchants use to combat card-not-present fraud?

Merchants should look to invest in fraud management software that enables fraud orchestration by leveraging the following technologies:

  • Digital Identity Services: Digital identity services collect data elements from a wide variety of sources and apply machine learning, data association and profiling techniques to authenticate customer identities. Merchants can use digital identity services to review transactional data, assess the likelihood of risk for each transaction and develop positive or negative consumer profiles.
  • Strong Customer Authentication (SCA): SCA is a form of multifactor authentication that builds an additional layer of security into CNP transactions by requiring merchants to verify customers’ identities based on at least two of the following components:
    • Something the customer knows, such as a password, passphrase or personal identification number
    • Something the customer has, such as a mobile phone, wearable device, hardware token or smart card
    • Something the customer is (based on biometric data), such as a fingerprint, facial recognition scan, voice pattern or DNA signature

In addition to preventing card-not-present fraud, implementing SCA can help merchants achieve Payment Services Directive 2 compliance.

Preventing Card-Not-Present (CNP) Fraud (8)
  • Tokenization: Tokenization replaces sensitive data — such as a customer’s personally identifying information and payment details — with a unique, random numeric sequence, known as a token. This token is then used within a merchant’s payment environment to protect customer data. Since they cannot be converted back to their original form, these tokens add a layer of security to CNP transactions.
  • Network Intelligence: Network intelligence is a form of business intelligence that analyzes data packets continuously in real time to determine the relationship between those packets and identify potential fraud signals. This analysis is made possible by packet capture, data and advanced machine learning algorithms.
  • Incremental Machine Learning: Compared to traditional machine learning models, which can be fairly static and suffer from model degradation, incremental machine learning leverages historical and live data to recognize behavioral changes and dynamically respond to anomalous activity. Incremental machine learning models can be automatically updated in real time based on streaming data, enabling merchants to recognize new and emerging threats, even as fraudsters’ methods become more sophisticated.

How does ACI Worldwide fight card-not-present fraud?

ACI Fraud Management for Merchants is a full-service fraud prevention platform that uses fraud orchestration to empower merchants to reduce fraud and chargebacks while increasing conversions.

It achieves this by:

  • Providing holistic, real-time fraud operations using a single API connection
  • Consolidating 10,000+ fraud signals from various sources and applying data-rich analytics, so merchants can better anticipate and respond to payments fraud
  • Using advanced technology, including artificial intelligence, machine learning, and behavioral analytics to identify and assess anomalous behavior and unexpected patterns
  • Leveraging the latest in fraud prevention technology, including network intelligence, SCA, tokenization and incremental machine learning
  • Offering the flexibility to tailor fraud strategies based on payment method, channel and market, as well as add functionality when needed
  • Utilizing an automated, real-time decisioning engine to generate PCI- and compliance-certified fraud prevention strategies
  • Delivering support from a payments risk optimization team, which can provide bespoke payment strategies that guarantee long-term growth

Let’s Talk Payments

Our payment experts are ready to help you tackle your payment challenges. Set some time to speak today!

Contact Us

Preventing Card-Not-Present (CNP) Fraud (2024)

FAQs

Preventing Card-Not-Present (CNP) Fraud? ›

Use 3DS and other multi-factor authentication

What is card not present CNP fraud? ›

Card-not-present fraud (CNP) is a category of fraud made via online transactions, telephone, or mail. In other words, it's a fraudulent payment in situations where a card is not presented to a merchant for a visual check.

How do you detect CNP fraud? ›

You need to verify the address given by the customers when making the purchase. It is crucial to match the billing address on file with one given by the credit card company. To prevent any cnp fraud, you need to check the validity of the three-digit CVV used as security codes.

Is the merchant liable for card not present? ›

In card-not-present transactions, the merchant is typically liable for any fraud or chargebacks that occur, as they are responsible for verifying the cardholder's identity and the legitimacy of the transaction without the physical card being presented.

What is CNP in banking? ›

Q: What is a Card-Not-Present (CNP) transaction? A Card-Not-Present transaction is a type of payment that occurs when neither the cardholder nor the physical card is present at the time of the transaction. This typically involves payments made over the phone, online, or via fax.

Who is liable for CNP fraud? ›

In most instances, liability for fraudulent CNP transactions falls onto the merchant whereby chargebacks are a common sight as the victim often only reacts once it's spotted. Payment fraud prevention is the key to safer and healthier business growth.

Who pays card-not-present fraud? ›

Card-not-present fraud with 3DS typically happens when a card issuer bypasses authentication steps in an attempt to validate a transaction. If fraud should occur, the card issuer is held liable; however, this type of fraud can still impact a merchant's overall fraud performance key performance indicators.

How did someone use my card without having it? ›

It occurs when criminals steal card information from unsuspecting victims using skimmers, small devices designed to capture a card's magnetic stripe or chip data. If the perpetrator manages to get hold of the victim's physical card for a second, they can swipe or scan it with a reader to extract the data.

How did hackers get my debit card number? ›

Hacking. When you bank or shop on public Wi-Fi networks, hackers can use keylogging software to capture everything you type, including your name, debit card account number and PIN. Phishing. Be wary of messages soliciting your account information.

What is the difference between CNP fraud and CP fraud? ›

Occurrence: CP fraud occurs during in-person transactions, in which the physical card is used for payment. Method: This involves using a stolen physical card or creating counterfeit cards using stolen card data. Detection: CP fraud can be easier to detect compared with CNP fraud.

What is the card not present transaction rule? ›

A card-not-present (CNP) transaction occurs when neither the cardholder nor the credit card are physically present at the time of the transaction. It's most common for remote orders — over the phone or by fax, internet, or mail.

Is CVV required for card-not-present? ›

Is CVV required for card-not-present transactions? Not necessarily. Secure merchants use CVV verification to discourage CNP fraud, but not everyone uses CVV codes.

Is Apple Pay considered card-not-present? ›

Are Apple Pay payments considered card present, or card not present? Apple Pay payments made in store are considered card present transactions, while payments made using Apple Pay in-app are considered card not present. How are returns processed for Apple Pay purchases?

How can card-not-present payments be received? ›

Card not present transaction process

A virtual terminal replaces the POS in the transaction flow and the card details are then processed by the payment gateway. From here they are passed onto the acquirer, verified by the credit card companies (e.g. Visa and Mastercard) and are then authenticated by the card issuer.

What is the CNP process? ›

A card-not-present (CNP) transaction refers to a transaction that takes place online, over the phone, or via mail order, in which the cardholder does not present the physical card to the business at the time of the payment.

What is the CNP channel in a debit card? ›

Card-Not-Present (CNP) or Card Absent Environment

While CNP transactions are most commonly linked to ecommerce stores, purchases made over the phone and through the mail are also considered card-not-present (mail orders and phone orders are commonly referred to as MOTO).

What does CNP stand for in credit card? ›

A card-not-present (CNP) transaction occurs when neither the cardholder nor the credit card are physically present at the time of the transaction.

What is CNP usage in debit card? ›

A card-not-present (CNP) transaction is a purchase made remotely, without processing a physical card via a card reader or terminal (and without manually entering a PIN).

Who is liable for card present fraud? ›

Liability rests with the bank that issued the cardholder's card, and if the purchase is later deemed to be fraudulent, the merchant is not responsible for refunding the customer.

Top Articles
Why is Coinbase Holding My Funds? (Reasons, Duration, Solution)
How to Configure Port Forwarding in Secure Shell Managing Secure Shell Access in Oracle® Solaris 11.2
Netronline Taxes
Victor Spizzirri Linkedin
Warren Ohio Craigslist
Trevor Goodwin Obituary St Cloud
12 Rue Gotlib 21St Arrondissem*nt
Practical Magic 123Movies
Bustle Daily Horoscope
Rainfall Map Oklahoma
What’s the Difference Between Cash Flow and Profit?
Everything You Need to Know About Holly by Stephen King
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Leeks — A Dirty Little Secret (Ingredient)
Craiglist Kpr
使用 RHEL 8 时的注意事项 | Red Hat Product Documentation
Uta Kinesiology Advising
The Blind Showtimes Near Amc Merchants Crossing 16
Stoney's Pizza & Gaming Parlor Danville Menu
67-72 Chevy Truck Parts Craigslist
Www Va Lottery Com Result
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Margaret Shelton Jeopardy Age
Enduring Word John 15
10 Best Quotes From Venom (2018)
County Cricket Championship, day one - scores, radio commentary & live text
R/Orangetheory
Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
Emiri's Adventures
Wbli Playlist
Tenant Vs. Occupant: Is There Really A Difference Between Them?
Oreillys Federal And Evans
AsROck Q1900B ITX und Ramverträglichkeit
Build-A-Team: Putting together the best Cathedral basketball team
Toonily The Carry
World History Kazwire
Frcp 47
Metro Pcs Forest City Iowa
Differential Diagnosis
Foxxequeen
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
Frontier Internet Outage Davenport Fl
What is a lifetime maximum benefit? | healthinsurance.org
Theater X Orange Heights Florida
New Zero Turn Mowers For Sale Near Me
De boeken van Val McDermid op volgorde
Diesel Technician/Mechanic III - Entry Level - transportation - job employment - craigslist
Epower Raley's
What Responsibilities Are Listed In Duties 2 3 And 4
Ranking 134 college football teams after Week 1, from Georgia to Temple
Latest Posts
Article information

Author: Melvina Ondricka

Last Updated:

Views: 5732

Rating: 4.8 / 5 (48 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.