userNew Account Fraud Prevention

Detect and block users creating multiple accounts to exploit your platform. Learn how to use device fingerprinting to connect fake accounts to the same device.

The Problem

Every business with a signup flow faces the same challenge: fraudsters create multiple fake accounts to abuse your system. Whether it's claiming free trials repeatedly, gaming referral programs, or building networks for spam and scam operations, fake account creation costs businesses billions annually.

Traditional defences fail because:

  • Email verification is trivial to bypass with disposable email services

  • Phone verification can be defeated with virtual phone numbers

  • IP blocking fails against VPNs and rotating proxies

  • CAPTCHA is easily solved by bot farms and AI services

  • Rate limiting by IP misses distributed attacks

triangle-exclamation

Common Attack Vectors

Attack Type
Description
Business Impact

Free Trial Abuse

Creating new accounts to extend free trials indefinitely

Lost revenue, skewed metrics

Promo/Coupon Stacking

Using multiple accounts to claim one-time offers repeatedly

Direct financial loss

Referral Fraud

Self-referring between fake accounts to earn bonuses

Inflated CAC, program abuse

Review Manipulation

Fake accounts posting fraudulent reviews

Damaged trust, legal risk

Bonus Abuse

Exploiting sign-up bonuses across multiple accounts

Direct financial loss

Content Spam

Automated account creation for spam distribution

Platform degradation

The Solution: Device-Based Identity

Guardian Stack links accounts to devices, not just credentials. Even when a fraudster uses a new email, phone number, VPN, and incognito mode, they're still using the same physical device — and Guardian detects it.

How It Works

  1. User visits signup page

  2. Guardian SDK silently collects device signals

  3. User submits registration form

  4. Your backend fetches the Guardian event and checks:

    1. Is this device linked to existing accounts?

    2. Is this a bot or automated browser?

    3. Is the user hiding behind a VPN/proxy?

  5. Allow, challenge, or deny registration

circle-info

Key insight: The visitorId persists across incognito sessions, cleared cookies, and browser restarts. It's cryptographically tied to the physical device.


Implementation Guide

Step 1: Frontend — Capture Device Signals

Install the Guardian JS SDK:

Initialize Guardian when your app loads, then call .get() during registration:

Step 2: Backend — Verify & Decide

Install the Guardian Server SDK:

Create your signup endpoint with fraud checks:


Real-World Examples

Free Trial Abuse Prevention

Scenario: Your SaaS offers a 15-day free trial. Fraudsters create new accounts every 15 days to avoid paying.

Referral Program Protection

Scenario: You offer $20 for each referred user. Fraudsters refer themselves using multiple accounts.

Coupon/Promo Code Abuse Prevention

Scenario: A one-time 50% discount code is being reused across fake accounts.


Database Schema Example

Store Guardian identifiers for long-term fraud detection:


Best Practices

Do

  • Store visitorId with every account for future cross-referencing

  • Log fraud attempts without revealing detection methods to users

  • Use risk scoring for graduated responses instead of hard blocks

  • Combine signals — a VPN alone isn't fraud, but VPN + incognito + high velocity is suspicious

  • Review edge cases — legitimate users sometimes trigger signals

Don't

  • Don't block VPN users outright — many legitimate users use VPNs for privacy

  • Don't reveal detection methods in error messages (avoid "Bot detected")

  • Don't rely solely on IP — it's easily changed

  • Don't ignore velocity — rapid signups from one device indicate automation


Testing Your Implementation

Use these scenarios to verify your fraud detection:

Test Case
Expected Behavior

Normal signup

Account created successfully

Same device, new email

Blocked ("Already have an account")

Incognito mode signup

Slight score reduction, still allowed

VPN + incognito + rapid attempts

Challenge or block

Automated browser (Puppeteer)

Blocked (bot detected)

Anti-detect browser

Blocked (tampering detected)


Conclusion

New account fraud is a persistent threat that traditional verification methods can't solve. By linking accounts to physical devices through Guardian Stack's visitorId, you can:

  • Stop serial abusers who create multiple accounts

  • Protect promotional offers from exploitation

  • Preserve referral program integrity

  • Reduce manual fraud review with automated detection

  • Maintain good user experience for legitimate customers

The key insight: fraudsters can change emails, phone numbers, and IP addresses easily — but they can't easily change their physical device. Guardian Stack makes device identity the foundation of your fraud prevention strategy.


circle-check

Last updated

Was this helpful?