Skip to main content

Second-Party Fraud

TL;DR
  • Second-party fraud = Fraud involving an authorized user or collusion between parties
  • Common patterns: AU abuse (primary + AU working together), merchant collusion, "friendly" family fraud
  • Detect via: AU spending different from primary, same AU on multiple accounts, disputes only on AU transactions
  • Different from first-party fraud (single fraudster) and friendly fraud (chargeback abuse)

Fraud involving authorized users or collusion between parties.

Definition

Second-party fraud occurs when fraud is committed with the knowledge or participation of someone authorized to access an account, but who is not the primary account holder.

Common Patterns

Authorized User Abuse

An authorized user on an account commits fraud:

  • Makes purchases knowing the primary won't pay
  • Account was opened specifically to add fraudulent AU
  • AU maxes out account, primary claims no responsibility

Example: Parent opens card, adds child as AU. Child makes purchases, parent disputes as "unauthorized."

Collusion Schemes

Two or more parties work together:

  • Accomplice accounts – Primary and AU work together
  • Merchant collusion – Customer and merchant split proceeds
  • Employee collusion – Insider enables external fraud

"Friendly" Collusion

Family members or friends enabling fraud:

  • Knowingly sharing credentials
  • Allowing purchases with intent to dispute
  • "Lending" identity for fraudulent applications

Detection Indicators

PatternIndicator
AU velocityMultiple AU additions in short period
AU patternSame AU appearing on multiple accounts
Spending patternAU spending dramatically different from primary
Dispute patternPrimary disputes only AU transactions
Address mismatchAU address differs from primary

Investigation Approach

Questions to Answer

  1. Did the primary authorize the AU addition?
  2. Does the primary know the AU personally?
  3. Is the spending pattern consistent with the account history?
  4. Are there other accounts with similar patterns?

Evidence to Gather

  • AU addition authorization records
  • Communication between parties (if available)
  • Spending pattern analysis
  • Device/IP overlap between primary and AU

Prevention Strategies

  1. Verify AU relationships – Confirm relationship to primary
  2. Notify primary of AU activity – Real-time alerts
  3. Limit AU privileges – Spending limits for new AUs
  4. Velocity monitoring – Alert on AU abuse patterns
  5. Cross-account analysis – Identify same AU on multiple accounts