{"id":8095,"date":"2023-10-23T11:18:46","date_gmt":"2023-10-23T11:18:46","guid":{"rendered":"https:\/\/dev.ftxidentity.com\/custom-development\/?p=8095"},"modified":"2025-03-21T11:02:19","modified_gmt":"2025-03-21T11:02:19","slug":"cnp-fraud-in-ecommerce","status":"publish","type":"post","link":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/","title":{"rendered":"What Is Card Not Present Fraud? (And 6 Ways Businesses Can Spot It)"},"content":{"rendered":"<p>Ecommerce is booming, and sadly, for online retailers that means <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/techniques-for-tackling-digital-fraud-in-2024\/\"><strong>digital fraud<\/strong><\/a> is too. One growing form of fraud is Card Not Present (CNP) fraud.<\/p>\n<p>In fact, it\u2019s estimated that <a href=\"https:\/\/www.insiderintelligence.com\/content\/card-not-present-fraud-payment\" target=\"_blank\" rel=\"noopener\"><strong>73% of card payment fraud<\/strong><\/a> in the U.S. 2023 is a result of CNP scams.<\/p>\n<p>If you sell online, this statistic highlights the importance of understanding exactly what Card Not Present fraud is and how you can spot it. Then, you can use this knowledge to build a better fraud prevention strategy for your ecommerce site (or brick-and-mortar retail operation).<\/p>\n<p>Ultimately, the reason CNP fraud in ecommerce is so prevalent is that it\u2019s so easy to perpetrate. All a fraudster needs is stolen credit card information. And after making fraudulent purchases, this can result in massive charge back penalties and other headaches for unsuspecting online sellers.<\/p>\n<p>Interested in what you can do to protect yourself? This guide provides a closer look at CNP fraud, and offers ideas for detecting it, tools to prevent it, and fraud prevention tips for ecommerce sites.<\/p>\n<h2>What Is Card Not Present (CNP) Fraud?<\/h2>\n<p>Card Not Present fraud occurs when a fraudster uses stolen credit card information to make a purchase but does not actually have physical possession of the card. CNP fraud is most common in ecommerce transactions, as the thief does not need to present the card to a cashier.<\/p>\n<p>CNP fraud is most frequently used to:<\/p>\n<ul>\n<li>Perform unauthorized purchases (typically online)<\/li>\n<li>Make over-the-phone purchases<\/li>\n<li>Transfer bank balances to a different account<\/li>\n<li>Max out the credit cards<\/li>\n<li>Create fake cards and change addresses<\/li>\n<\/ul>\n<p>Although this is most common in ecommerce, CNP fraud can happen in retail operations. This is why brick-and-mortar shops shouldn\u2019t process a transaction when the card cannot be presented.<\/p>\n<h3>Types of Transactions Most Vulnerable to CNP Fraud<\/h3>\n<p>Here are some examples of the most common types of transactions for CNP fraud:<\/p>\n<ul>\n<li>Online shopping<\/li>\n<li>Mobile payments and <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/what-is-digital-wallet\/\"><strong>digital wallets<\/a><\/strong><\/li>\n<li>In-app purchases<\/li>\n<li>Unsecured websites or platforms<\/li>\n<li>Over-the-phone transactions<\/li>\n<\/ul>\n<p>The online payments landscape is continuously changing, and taking precautionary measures to prevent CNP fraud is crucial.<\/p>\n<h2>Common CNP Fraud Red Flags for Businesses<\/h2>\n<p>To <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/financial-risks-in-ecommerce-how-to-handle-them\/\"><strong>protect your ecommerce site from fraud<\/strong><\/a>, it\u2019s important to recognize CNP fraud. Some of the most common features include:<\/p>\n<h3>1. Unusual Purchase Patterns<\/h3>\n<p>Check for frequent, high-value transactions from unknown or \u2018not previously used\u2019 IP addresses. A few common signs are:<\/p>\n<ul>\n<li>New IP address making high-value purchases (without any special occasion)<\/li>\n<li>No previous purchase history<\/li>\n<li>Transactions that contradict the customer&#8217;s typical behavior and purchase history<\/li>\n<li>Random spikes in sales\/transaction amount and purchases<\/li>\n<\/ul>\n<h3>2. Unusual IP Addresses<\/h3>\n<p>Scammers use multiple IP addresses to remain anonymous and avoid charges. If numerous sales and order inconsistencies originate from multiple geographical locations within a short timeframe, CNP fraud is a potential cause.<\/p>\n<h3>3. Unusual Time or Frequency<\/h3>\n<p>You likely understand your customers\u2019 purchasing patterns well. Hence, if there are transactions at odd hours or unusually high orders, it may indicate fraudulent activity. You may need to check a customer\u2019s purchase history; this will help you determine if a string of new purchases matches that behavior.<\/p>\n<h3>4. Mismatched Billing and Shipping Addresses<\/h3>\n<p>One of the first actions of any scammer is changing the delivery and shipping location. If <strong>these three activities<\/strong> are happening simultaneously, it is a sign of CNP fraud:<\/p>\n<ul>\n<li>A high number of orders deviating from your customer\u2019s purchase history<\/li>\n<li>Change in delivery location while billing address remains the same.<\/li>\n<li>Request for urgent\/quick deliveries<\/li>\n<\/ul>\n<h3>5. Multiple Failed Payment Attempts<\/h3>\n<p>Monitor any failed payment attempts caused by incorrect card details. This may suggest that someone is trying to access the user\u2019s card details and attempting to make unauthorized transactions.<\/p>\n<h3>6. Inconsistencies in Account Information<\/h3>\n<p>If your customer has entered multiple card details, check for inconsistencies, such as discrepancies in personal information, minor changes in email addresses, contact numbers, etc. These are signs that your customer\u2019s card details have been compromised.<\/p>\n<h2>How Businesses Can Prevent CNP Fraud<\/h2>\n<p>The latest fraud prevention technologies can safeguard your business from CNP tactics. Moreover, it\u2019s imperative that you train your team to spot this type of fraud. A few of the methods you can use include:<\/p>\n<h3>1. Two-Factor Authentication (2FA)<\/h3>\n<p>Users can access their account after verifying their identity through a 2FA method.<\/p>\n<p><strong>Example: <\/strong> One-Time Password, Security Code, Authorization Link, etc.<\/p>\n<h3>2. Biometric Authentication<\/h3>\n<p>This enhances security and verifies users by linking activities to unique physical attributes.<\/p>\n<p><strong>Example: <\/strong> <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/feature\/biometric-authentication\/\"><strong>Fingerprint or facial recognition<\/strong><\/a> to access email account or banking app.<\/p>\n<h3>3. Fraud Detection Tools<\/h3>\n<p>Invest in an identity verification tool that can spot fraudulent profiles.<\/p>\n<p><strong>Example: <\/strong> FTx Identity can <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/feature\/age-identity-verification\/\"><strong>perform ID verifications<\/strong><\/a> in real-time.<\/p>\n<h3>4. Fraud Monitoring with Machine Learning<\/h3>\n<p>ML algorithms can record user buying history, analyze this data, and detect transaction patterns that indicate fraud. The accuracy level tends to be incredibly high, and there is minimal human intervention.<\/p>\n<p><strong>Example: <\/strong> Fraud monitoring to detect money laundering, market manipulation, identity theft, credit card fraud, etc.<\/p>\n<h3>5. Secure Payment Gateways<\/h3>\n<p>A safe, secure payment platform. Check for a fast and reputable platform as your preferred payment gateway. Many scammers replicate the payment gateway to extract customer information.<\/p>\n<p><strong>Example: <\/strong> PayPal\u2019s payment gateway is an example.<\/p>\n<h3>6. Employee Training<\/h3>\n<p>Periodically train your staff to recognize and respond to potential signs of fraud.<\/p>\n<p><strong>Example: <\/strong> Software training, customer verification protocols, etc.<\/p>\n<h3>7. Regular Security Audits<\/h3>\n<p>Conduct regular security audits to check for discrepancies and identify potential red flags in the system.<\/p>\n<p><strong>Example: <\/strong> Software training, monitoring and maintaining customer databases, and how to perform purchase order audits.<\/p>\n<h3>8. Blockchain Technology<\/h3>\n<p>Blockchain technology provides a secure, tamper-resistant, and <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/decentralized-identity-on-blockchain-technology-is-it-worth-it\/\"><strong>decentralized identity verification<\/strong><\/a> tool.<\/p>\n<p><strong>Example: <\/strong> Cross-border identification, anti-money laundering, real-time supply chain and inventory visibility, etc.<\/p>\n<h2>Why You Should Address CNP Fraud Right Now<\/h2>\n<p>CNP fraud has become a big problem, and businesses new to build better systems to protect themselves:<\/p>\n<h3>1. Rising Digital Transactions<\/h3>\n<p>More commerce is moving online. In the future, the majority of businesses will have at least some ecommerce activities.<\/p>\n<h3>2. Inter-Connectivity<\/h3>\n<p>To allow the users easy accessibility, generally, all the cards and bank accounts are interlinked.<\/p>\n<p>This interconnected nature of the global economy allows fraudsters to commit fraud and steal account details by gaining access to a single card.<\/p>\n<h3>3. Consumer Trust<\/h3>\n<p>You lose business when customers stop making purchases. One of the common reasons is the need for more trust during online payments.<\/p>\n<p>Consumers need to feel confident that their financial information is secure, further maintaining trust and encouraging the growth of the digital economy.<\/p>\n<h3>4. Financial Loss Prevention<\/h3>\n<p>CNP fraud can result in significant financial loss. Keeping CNP fraud under control helps reduce the economic losses from such fraudulent activities.<\/p>\n<h2>Industry Standards and Compliance<\/h2>\n<p>Businesses must comply with industry standards and regulations for enhanced protection. Here are some key requirements based on your business:<\/p>\n<ul>\n<li>Payment Card Industry Data Security Standard (PCI DSS)<\/li>\n<li>Secure Payment Gateway Standards<\/li>\n<li>Identity Verification Tools and Regulations<\/li>\n<li>KYC Requirements<\/li>\n<li>Card Verification Values (CVV) &#8211; Generally used during card payments<\/li>\n<li>Address Verification System (AVS)<\/li>\n<li>ISO Compliance<\/li>\n<li>Consumer Data Privacy Norms<\/li>\n<li>Strong Customer Authentication (SCA) &amp; 3-Domain Security (3DS) Regulations<\/li>\n<li>Data Encryption Standards<\/li>\n<li>Network Security Standards<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8098\" src=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/02-Industry-Standards-and-Compliance-1.png\" alt=\"Industry Standards and Compliance \" width=\"1200\" height=\"1257\" srcset=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/02-Industry-Standards-and-Compliance-1.png 1200w, https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/02-Industry-Standards-and-Compliance-1-286x300.png 286w, https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/02-Industry-Standards-and-Compliance-1-978x1024.png 978w, https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/02-Industry-Standards-and-Compliance-1-768x804.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h2>How Does CNP Fraud Work?<\/h2>\n<p>Beware of these most common Card Not Present (CNP) fraudulent methods:<\/p>\n<h3>1. Phishing<\/h3>\n<p>Phishing is a fraudulent method where fraudsters trick individuals into sharing sensitive information such as account numbers, ATM PINs, credit card details, and OTPs.<\/p>\n<p><strong>How It Works in CNP Fraud: <\/strong> Phishing scammers can create company communications (email), websites, or banks mimicking the legitimate identity. When users make any transactions on these platforms, all your account details get shared, making you a victim of phishing.<\/p>\n<h3>2. Account Takeover (ATO)<\/h3>\n<p>When scammers gain unauthorized access to your bank account or email.<\/p>\n<p><strong>How It Works in CNP Fraud: <\/strong> When fraudsters gain access to mail accounts, they can misuse it by asking for money from your contact list, creating false company communications, or changing bank details and taking over banking accounts. This allows them to make CNP transactions using the compromised account\u2019s details.<\/p>\n<h3>3. Stolen Card Details<\/h3>\n<p>A stolen card is always the easiest form of gaining unauthorized access to credit or debit card information.<\/p>\n<p><strong>How It Works in CNP Fraud: <\/strong> When fraudsters gain control of the card, they can commit CNP fraud by hacking into personal files. With these stolen card details and personal data, they can commit CNP fraud by making unauthorized purchases.<\/p>\n<h3>4. Card Skimming<\/h3>\n<p>Scammers install copying devices on ATMs or POS terminals to capture the customer\u2019s personal information.<\/p>\n<p><strong>How It Works in CNP Fraud: <\/strong> This type of CNP fraud can take your stolen card data from skimming devices, and they can get complete access to the card, using it for purchases, withdrawals, etc.<\/p>\n<h2>How to Respond to CNP Fraud in Your Business<\/h2>\n<p>If you suspect CNP fraud, here are some steps you can take to help remedy the issue:<\/p>\n<h3>Internal Investigation<\/h3>\n<p>It is essential to identify and assess the extent of the fraud. This step will help to evaluate the system\u2019s vulnerabilities as well.<\/p>\n<h3>Report the Fraud<\/h3>\n<p>For any individual or business, it is crucial to report the fraud to prevent any further complications, and it is a mandatory step to claim the amount of fraud (if applicable to your business).<\/p>\n<h3>Notify Payment Processors<\/h3>\n<p>You must inform them about the fraud if there is a security breach from the installed payment gateway application. They can investigate their software\u2019s vulnerabilities and alert other clients.<\/p>\n<h3>Customer Communication<\/h3>\n<p>Once you have taken security measures to stop further fraud, you NEED to inform your customers and STOP other cashless transactions until everything is clear.<\/p>\n<h3>Implement Security Measures<\/h3>\n<p>Invest in a robust identity verification system and strengthen security measures to safeguard your business from future incidents.<\/p>\n<h3>Responding to CNP Checklist<\/h3>\n<ul>\n<li><strong>Step 1: <\/strong>Contact Local Law Enforcement<\/li>\n<li><strong>Step 2: <\/strong>File a Report with the Concerned Trade Partner<\/li>\n<li><strong>Step 3: <\/strong>Contact Banking or Card Companies<\/li>\n<li><strong>Step 4: <\/strong>Notify Your Software Company (if their software was compromised)<\/li>\n<li><strong>Step 5: <\/strong>Alert Your Customers<\/li>\n<li><strong>Step 6: <\/strong>Notify Your Payment Gateway Partner<\/li>\n<li><strong>Step 7: <\/strong>Report to a Cyber Crime Agency (if applicable in your business)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Responding-to-CNP-Checklist-\u2013-20-10-2023-1.jpg\" alt=\"\" width=\"1200\" height=\"679\" class=\"alignnone size-full wp-image-12499\" srcset=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Responding-to-CNP-Checklist-\u2013-20-10-2023-1.jpg 1200w, https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Responding-to-CNP-Checklist-\u2013-20-10-2023-1-300x170.jpg 300w, https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Responding-to-CNP-Checklist-\u2013-20-10-2023-1-1024x579.jpg 1024w, https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Responding-to-CNP-Checklist-\u2013-20-10-2023-1-768x435.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h2>Protecting Your Customers<\/h2>\n<p>Another tip: You can provide these tips for your customers, if you suspect suspicious activity. Tell them to:<\/p>\n<h3>Contact the Bank or Card Company<\/h3>\n<p>You should immediately alert your bank or credit card company and report if you ever face a \u2018credit card is not present during this transaction\u2019 error. They will temporarily block your account and restrict further transactions. There are 24\/7 customer care numbers and a one-touch card-blocking facility in mobile banking apps. You should immediately reach out to your bank in any such scenario.<\/p>\n<h3>Freeze Accounts<\/h3>\n<p>Suspend your account to stop further fraudulent transactions immediately.<\/p>\n<p><strong>Remember: <\/strong> You can register for a new card anytime! But you can\u2019t always get your stolen money back.<\/p>\n<p>If you suspect such activities or you are repeatedly getting payment messages, someone is likely trying to access your details.<\/p>\n<p>Freezing your accounts can safeguard your compromised account information, block unauthorized transactions, etc.<\/p>\n<h3>Change Passwords<\/h3>\n<p>As soon as you realize your account is getting misused, block your account OR change the passwords immediately.<\/p>\n<p><strong>Tip: <\/strong> Regularly changing your banking passwords is recommended to prevent unauthorized access.<\/p>\n<h3>Monitor Bank and Credit Card Statements<\/h3>\n<p>Banks generally release monthly card usage history; you must regularly monitor your card and account statements to identify unusual transactions.<\/p>\n<h3>File a Police Report<\/h3>\n<p>In case of any fraud, you NEED to file a police report. It is necessary for documentation and reclaiming (if eligible) the lost amount when discussing with banks.<\/p>\n<h2>Prevent Card Not Present (CNP) Fraud with FTx Identity<\/h2>\n<p>As a business owner, you need to protect your company reputation, customer data, and monetary collections. This is possible by investing in smart and intuitive tools, real-time customer and transaction monitoring, regular staff training, and updating yourself with the latest cybercrimes, etc.<\/p>\n<p>FTx Identity can help you manage this. With years of experience and a strong client base, we offer a solution to help you build a stronger, <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/digital-onboarding-process-tips\/\"><strong>more secure customer onboarding process<\/strong><\/a>. Contact us today to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ecommerce is booming, and sadly, for online retailers that means digital fraud is too. One growing form of fraud is Card Not Present (CNP) fraud. In fact, it\u2019s estimated that 73% of card payment fraud in the U.S. 2023 is a result of CNP scams. If you sell online, this statistic highlights the importance of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[112,113,114],"class_list":["post-8095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-verification","tag-card-not-present-fraud","tag-cnp-fraud","tag-cnp-fraud-prevention"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>6 Ways to Detect Card Not Present (CNP) Fraud Online<\/title>\n<meta name=\"description\" content=\"Learn what Card Not Present fraud is, how to detect it, and the tools online retailers can use to prevent it.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Card Not Present Fraud? (And 6 Ways Businesses Can Spot It)\" \/>\n<meta property=\"og:description\" content=\"Learn what Card Not Present fraud is, how to detect it, and the tools online retailers can use to prevent it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/\" \/>\n<meta property=\"og:site_name\" content=\"FTx Identity\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-23T11:18:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T11:02:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/\"},\"author\":{\"name\":\"Matthew Davis\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/1234628493c9bb7092791d40874293e5\"},\"headline\":\"What Is Card Not Present Fraud? (And 6 Ways Businesses Can Spot It)\",\"datePublished\":\"2023-10-23T11:18:46+00:00\",\"dateModified\":\"2025-03-21T11:02:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/\"},\"wordCount\":1999,\"publisher\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#organization\"},\"image\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg\",\"keywords\":[\"card not present fraud\",\"cnp fraud\",\"cnp fraud prevention\"],\"articleSection\":[\"Identity Verification\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/\",\"name\":\"6 Ways to Detect Card Not Present (CNP) Fraud Online\",\"isPartOf\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg\",\"datePublished\":\"2023-10-23T11:18:46+00:00\",\"dateModified\":\"2025-03-21T11:02:19+00:00\",\"description\":\"Learn what Card Not Present fraud is, how to detect it, and the tools online retailers can use to prevent it.\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg\",\"contentUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg\",\"width\":1200,\"height\":600,\"caption\":\"What Is Card Not Present (CNP) Fraud?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.ftxidentity.com\/custom-development\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Card Not Present Fraud? (And 6 Ways Businesses Can Spot It)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#website\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/\",\"name\":\"FTx Identity\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.ftxidentity.com\/custom-development\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#organization\",\"name\":\"FTx Identity\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg\",\"contentUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg\",\"caption\":\"FTx Identity\"},\"image\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/1234628493c9bb7092791d40874293e5\",\"name\":\"Matthew Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/5d8a280aca3e530748b1f03b83c3a18700f6eb39787fbba2e3b382335cd4f3e7?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5d8a280aca3e530748b1f03b83c3a18700f6eb39787fbba2e3b382335cd4f3e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5d8a280aca3e530748b1f03b83c3a18700f6eb39787fbba2e3b382335cd4f3e7?s=96&d=mm&r=g\",\"caption\":\"Matthew Davis\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 Ways to Detect Card Not Present (CNP) Fraud Online","description":"Learn what Card Not Present fraud is, how to detect it, and the tools online retailers can use to prevent it.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What Is Card Not Present Fraud? (And 6 Ways Businesses Can Spot It)","og_description":"Learn what Card Not Present fraud is, how to detect it, and the tools online retailers can use to prevent it.","og_url":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/","og_site_name":"FTx Identity","article_published_time":"2023-10-23T11:18:46+00:00","article_modified_time":"2025-03-21T11:02:19+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg","type":"image\/jpeg"}],"author":"Matthew Davis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Matthew Davis","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#article","isPartOf":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/"},"author":{"name":"Matthew Davis","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/1234628493c9bb7092791d40874293e5"},"headline":"What Is Card Not Present Fraud? (And 6 Ways Businesses Can Spot It)","datePublished":"2023-10-23T11:18:46+00:00","dateModified":"2025-03-21T11:02:19+00:00","mainEntityOfPage":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/"},"wordCount":1999,"publisher":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#organization"},"image":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg","keywords":["card not present fraud","cnp fraud","cnp fraud prevention"],"articleSection":["Identity Verification"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/","url":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/","name":"6 Ways to Detect Card Not Present (CNP) Fraud Online","isPartOf":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage"},"image":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg","datePublished":"2023-10-23T11:18:46+00:00","dateModified":"2025-03-21T11:02:19+00:00","description":"Learn what Card Not Present fraud is, how to detect it, and the tools online retailers can use to prevent it.","breadcrumb":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#primaryimage","url":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg","contentUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/10\/Unveiling-Card-Not-Present-Fraud-and-How-to-Stay-Secure.jpg","width":1200,"height":600,"caption":"What Is Card Not Present (CNP) Fraud?"},{"@type":"BreadcrumbList","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/cnp-fraud-in-ecommerce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.ftxidentity.com\/custom-development\/"},{"@type":"ListItem","position":2,"name":"What Is Card Not Present Fraud? (And 6 Ways Businesses Can Spot It)"}]},{"@type":"WebSite","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#website","url":"https:\/\/dev.ftxidentity.com\/custom-development\/","name":"FTx Identity","description":"","publisher":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.ftxidentity.com\/custom-development\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#organization","name":"FTx Identity","url":"https:\/\/dev.ftxidentity.com\/custom-development\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/","url":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg","contentUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg","caption":"FTx Identity"},"image":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/1234628493c9bb7092791d40874293e5","name":"Matthew Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5d8a280aca3e530748b1f03b83c3a18700f6eb39787fbba2e3b382335cd4f3e7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d8a280aca3e530748b1f03b83c3a18700f6eb39787fbba2e3b382335cd4f3e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5d8a280aca3e530748b1f03b83c3a18700f6eb39787fbba2e3b382335cd4f3e7?s=96&d=mm&r=g","caption":"Matthew Davis"}}]}},"_links":{"self":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts\/8095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/comments?post=8095"}],"version-history":[{"count":5,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts\/8095\/revisions"}],"predecessor-version":[{"id":12501,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts\/8095\/revisions\/12501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/media\/8097"}],"wp:attachment":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/media?parent=8095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/categories?post=8095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/tags?post=8095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}