What is Triangulation Fraud?

Triangulation fraud involves three parties, a legitimate buyer, a dodgy “seller” and an unwitting merchant. The fraudulent seller offers an attractive price, collects the payment and purchases the item from a real store using stolen card details. The item is then shipped directly to the real buyer, who receives their goods. Weeks later the cardholder disputes the purchase. The chargeback is assigned to the legitimate merchant, not the scam storefront, which has long since disappeared.

Signals: new buyer accounts with pristine details but recycled devices, shipping to reshippers, orders placed in seconds after the “seller” collected the money, BIN corridors that correspond to testing and images and descriptions on the fake store that seem like they’ve been scraped from the brands.

powered by kycaid

Transform your KYC & AML journey

Experience seamless and efficient customer verification with KYCAID

Mitigation: flag new‑first‑time‑high‑value orders with drop addresses, throttle giftable items and hold early payouts for new sellers on marketplaces. At checkout, push riskier baskets through specific friction per payment fraud prevention. When buyer or seller identity seems flimsy, trigger identity verification. Triangulation happens in the gaps between each party—close that gap with evidence and cooling periods.

What is Triangulation Fraud?

Triangulation fraud involves three parties, a legitimate buyer, a dodgy “seller” and an unwitting merchant. The fraudulent seller offers an attractive price, collects the payment and purchases the item from a real store using stolen card details. The item is then shipped directly to the real buyer, who receives their goods. Weeks later the cardholder disputes the purchase. The chargeback is assigned to the legitimate merchant, not the scam storefront, which has long since disappeared.

Signals: new buyer accounts with pristine details but recycled devices, shipping to reshippers, orders placed in seconds after the “seller” collected the money, BIN corridors that correspond to testing and images and descriptions on the fake store that seem like they’ve been scraped from the brands.

Mitigation: flag new‑first‑time‑high‑value orders with drop addresses, throttle giftable items and hold early payouts for new sellers on marketplaces. At checkout, push riskier baskets through specific friction per payment fraud prevention. When buyer or seller identity seems flimsy, trigger identity verification. Triangulation happens in the gaps between each party—close that gap with evidence and cooling periods.

The website uses cookies

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Cookie Policy.

Privacy Preference Center

We use cookies to improve the functionality of our site, while personalizing content and ads. You can enable or disable optional cookies as desired. For more detailed information about the cookies we use, see our Cookie Policy

Menage cookies