Skip to main content

Fake Identity Fraud

TL;DR
  • Fake identity fraud = Orders placed using fabricated or mismatched identity information
  • For merchants: Focus on detecting fake personas at checkout, not building credit files
  • Detect via: Name/address mismatches, disposable contact info, suspicious account patterns
  • Prevent with: Identity verification, device fingerprinting, address validation
  • Often part of larger fraud ring operations

When fraudsters create fake personas to commit fraud.

Definition

Fake identity fraud occurs when someone uses fabricated or mismatched identity elements to place orders. Unlike third-party fraud (stolen identity) or first-party fraud (real identity abused), fake identity involves made-up customer personas.

For Issuers vs. Merchants

Banks worry about "synthetic identities" built over years to get credit. Merchants see the simpler version: fake personas used for immediate fraud.

What Merchants Actually See

Fabricated Customers

ElementExample
Fake nameRandom combinations, celebrity names
Mismatched infoName doesn't match card, address doesn't match name
Disposable contactBurner phone, temporary email
No digital footprintEmail/phone has no history

Common Patterns

PatternWhat's Happening
Name ≠ cardholder nameUsing someone else's payment
Email created same dayThrowaway for this order
Phone is VoIPUntraceable number
Address is commercial mailboxDrop point for packages
Account has no historyCreated just for fraud

Why Fake Identities Get Used

Fraud TypeHow Fake Identity Helps
Third-party fraudHide real identity when using stolen card
Promo abuseFake accounts for unlimited promos
Refund fraudUntraceable account for abuse
Resale fraudBuy limited items for resale
Fraud ringsScale operations with fake personas

Detection Signals

Identity Mismatch Indicators

SignalRisk Level
Name on order ≠ name on cardHigh
Billing name ≠ shipping nameMedium
Email name ≠ account nameMedium
Phone area code ≠ address locationLow-Medium

Contact Information Red Flags

SignalWhat It Suggests
Disposable email domainThrowaway identity
Email created recentlyAccount for this fraud
VoIP phone numberUntraceable contact
Phone recently acquiredNew burner phone
No social/email footprintFabricated person

Account Behavior

BehaviorRisk
New account + high-value orderUsing fake identity for fraud
Account info changed before orderSwitching to fake details
Multiple identity changesTesting what works
No order history, immediate large purchaseFabricated customer

Prevention Strategies

At Checkout

CheckWhat It Catches
Name match validationCardholder ≠ customer
Email domain checkDisposable emails
Phone verificationFake numbers
AVSAddress doesn't match card

Identity Verification

LevelMethodWhen to Use
BasicEmail confirmationAll orders
MediumPhone verificationHigh-value orders
StrongDocument verificationVery high-value, suspicious orders

Behavioral Analysis

Device fingerprinting reveals:

  • Same device, multiple "identities"
  • Known fraud device
  • Automation/bot signals
  • Location inconsistencies

Response Playbook

When you suspect fake identity:

  1. Add friction – Phone verification, email confirmation
  2. Verify card match – Name on card matches order?
  3. Check device – Same device, other accounts?
  4. Review history – Any prior legitimate activity?
  5. Decline or delay – Don't ship until verified

Fake Identity vs. Other Fraud Types

TypeIdentityPaymentYour Focus
Third-partyStolen realStolenPayment verification, 3DS
First-partyOwn realOwnPolicy abuse detection
Fake identityFabricatedMixedIdentity verification

Prevention Checklist

  • Name matching on card validation
  • Disposable email domain blocking
  • Phone verification for new accounts
  • VoIP detection enabled
  • Device fingerprinting active
  • AVS/CVV verification
  • Velocity limits on new accounts
  • High-value order review queue

Next Steps

Detecting fake identities?

  1. Check identity signals – Score mismatches
  2. Review contact info – Disposable markers
  3. Link accounts – Same device, different names

Preventing fake identity fraud?

  1. Add identity checks – Name matching
  2. Verify contact info – Email and phone
  3. Use device intelligence – Catch repeats

Related to larger fraud ring?

  1. Check for patterns – Organized activity
  2. Map linked accounts – Find the network
  3. Update blocklists – Stop infrastructure