Skip to main content
Learning Center
Fraud BasicsFraud 101: What Is Fraud?

Absolute basics for someone who has never looked at fraud - what is fraud, how is it different from other crimes, and why does it matter

Fraud 101: The $47 Lamp That Cost $12,000

1. The Story

Thursday, 2:14 PM. Elena Martinez, a fraud analyst at HomeStyle (an online furniture retailer), notices something odd in the order queue. A customer named "John Smith" just bought a $47 table lamp. Nothing unusual there.

But Elena's been doing this for three years. She clicks into the order.

The shipping address is a residential home in suburban Ohio. The billing address matches. The email is johnsmith8847@gmail.com. Card passes AVS check. Everything looks clean.

Except the customer created their account 11 minutes ago. And in those 11 minutes, they've viewed 340 product pages.

No human browses that fast.

Elena pulls the IP address. It's a data center in Lithuania. She checks the device fingerprint. This exact browser configuration has appeared on 23 other "new" accounts today, all buying small items, all shipping to different Ohio addresses.

She flags the order. Then she starts pulling the threads.

By 5 PM, Elena has uncovered a card-testing ring. Criminals had stolen 2,000 credit card numbers from a restaurant data breach. They're using HomeStyle to test which cards still work. Buy something small. If it ships, the card is good. Then they sell the validated card numbers on a dark web marketplace for $15 each.

That $47 lamp was never about the lamp. It was about turning stolen data into verified, sellable assets.

Elena blocked 847 orders that day. Total prevented loss: $12,340 in merchandise, plus the chargebacks and fees that would have followed.

This story is fictional, but the patterns are real.


2. Why This Matters

This is where your journey into fraud begins.

If you're reading this, you're probably starting a career in fraud prevention, moving into a fraud-adjacent role, or just curious about how digital crime actually works. Whatever brought you here, understanding fraud isn't optional anymore. It touches every online business, every payment system, every customer interaction.

This article covers the foundations: what fraud actually is, who commits it, and what your job looks like if you're fighting it. Everything else in this learning center builds on these concepts.


3. What Is Fraud?

At its core, fraud is lying to get something valuable. That's it. A person (or bot, or criminal organization) deceives someone to obtain money, goods, access, or information they shouldn't have.

Three elements make something legally "fraud":

  1. Intent - The person meant to deceive (accidents don't count)
  2. Deception - They said or did something false
  3. Harm - Someone lost something because of it

Think of it like a counterfeit bill. The counterfeiter intends to trick you. The fake bill is the deception. You lose real money when you accept it. That's fraud.

The Two Big Categories

Third-party fraud is what most people picture: a criminal uses someone else's stolen identity or payment information. The victim is an innocent person whose data was compromised.

Elena's lamp case is third-party fraud. Real cardholders had their numbers stolen. Criminals used those numbers. The cardholders are victims.

First-party fraud is trickier. Here, the "victim" is actually the perpetrator. A customer buys a TV, receives it, then calls their bank claiming "I never got it." They keep the TV and get their money back. The merchant loses both.

This is also called "friendly fraud" (though there's nothing friendly about it) or "chargeback fraud."

Hybrid fraud blurs the line. Maybe someone bought stolen account credentials, used them to make purchases, then filed a chargeback claiming they were hacked. Are they the victim or the criminal? Often both.

When the Merchant Is the Fraud

Most fraud training assumes the merchant is the victim. But sometimes the merchant is the problem.

Merchant fraud is when a business itself operates deceptively. They take payments and never ship products. They sell counterfeits as authentic goods. They charge cards without authorization. The "victims" here are customers and payment processors.

Bust-out fraud is more elaborate. A criminal sets up what looks like a legitimate merchant, processes transactions normally for a few months to build trust with payment processors, then suddenly maxes out their processing limits with stolen cards. By the time chargebacks roll in, the "merchant" has vanished with the money.

Payment processors and acquiring banks spend significant resources trying to spot these schemes before the bust-out happens.


4. Who Commits Fraud?

Fraudsters aren't a single type. They range from opportunistic individuals to sophisticated criminal enterprises.

The Opportunist

A regular customer sees a loophole. Maybe they realize they can claim packages never arrived, or abuse a generous return policy. They're not "criminals" in their own mind. They're just gaming the system.

Opportunists often escalate. What starts as one fake chargeback becomes a pattern. They share tricks with friends. Small losses become systemic problems.

The Professional

Professional fraudsters treat fraud as a job. They have tools, techniques, and specialized knowledge. They might focus on a specific attack type (carding, account takeover, refund abuse) and get very good at it.

Many work in loose networks, buying and selling stolen data, sharing methods, and collaborating on attacks.

The Organization

Organized fraud rings operate like businesses. They have roles: people who steal data, people who validate it, people who cash out, people who recruit money mules. They have supply chains, quality control, and customer service (for their criminal clients).

Some rings are local crews. Others span continents. The most sophisticated ones launder millions annually.


5. Where Fraud Happens

Fraud can hit almost any point in a customer journey. Here are the hot spots:

StageWhat HappensExample Attack
SignupNew account creationFake accounts for abuse or selling
LoginAccessing existing accountCredential stuffing, account takeover
PaymentMaking a purchaseStolen cards, card testing
FulfillmentReceiving goods/servicesShipping to reshippers, claiming non-delivery
RefundReturning or disputingFalse claims, return fraud, chargebacks
LoyaltyPoints and rewardsPoints theft, promo abuse
SupportCustomer serviceSocial engineering agents for refunds/access

Criminals look for the weakest point. If your login is tight but your support team gives out password resets easily, they'll call support.


6. Your Job as a Fraud Analyst

If you're fighting fraud professionally, your job has four parts:

Detect patterns that predict loss. You're looking for signals: velocity spikes, geographic impossibilities, device anomalies, behavioral mismatches. Elena spotted a browsing pattern that was mechanically impossible for a human. That was detection.

Decide what to do about it. Not every suspicious signal means fraud. You have to choose: approve, deny, or ask for more verification. Too aggressive, and you block good customers. Too lenient, and you eat losses.

Explain your reasoning. To colleagues, to managers, to auditors, sometimes to regulators or law enforcement. Your decisions need to be defensible. "It felt wrong" isn't enough. "The device fingerprint matched 23 other accounts created today from a Lithuanian data center" is.

Improve the system over time. Fraud evolves. Yesterday's rules become today's bypassed controls. You're constantly tuning, testing, and building new defenses.


7. Key Takeaways

  • Fraud is deception for gain. Three elements: intent, deception, harm.
  • Third-party fraud uses stolen identities. First-party fraud is the customer lying.
  • Fraudsters range from opportunists to organized rings. Treat all of them seriously.
  • Every customer touchpoint is an attack surface. Signup, login, payment, fulfillment, refunds, support.
  • Your job: detect, decide, explain, improve. It's part pattern recognition, part judgment call, part continuous learning.

Next up: Common Fraud Types breaks down the specific attack methods you'll encounter.


8. Key Terms

TermDefinition
FraudIntentional deception to obtain something of value
Third-party fraudCriminal uses someone else's stolen identity or payment info
First-party fraudCustomer deceives the merchant (also: friendly fraud, chargeback fraud)
Merchant fraudThe merchant itself operates deceptively (fake products, unauthorized charges)
Bust-out fraudCriminal sets up fake merchant, builds trust, then processes stolen cards and disappears
Card testingUsing small purchases to verify stolen card numbers work
VelocityThe rate of actions over time (high velocity often signals automation)
Device fingerprintUnique characteristics of a browser/device used to identify repeat visitors
ChargebackCustomer disputes a charge with their bank, forcing merchant to refund
Money mulePerson who moves fraudulent funds, often unknowingly recruited

Generated with AI assistance. Reviewed by humans for accuracy.

Test Your Knowledge

Ready to test what you've learned? Take the quiz to reinforce your understanding.

    Fraud 101: What Is Fraud? - Fraud Basics