credit-cardPayment Fraud Prevention

Stop fraudulent orders and chargebacks by linking payment attempts to devices. Identify returning fraudsters instantly, even when they use new cards, emails, or identities.

The Problem

Payment fraud costs businesses over $40 billion annually. Traditional defenses focus on validating the card itself — CVV checks, AVS matching, 3D Secure — but they miss a critical dimension: who is using the card.

A fraudster with stolen card details can:

  • Pass all card verification checks (they have the full card data)

  • Use a different email address each time

  • Ship to new addresses or use package forwarding

  • Clear cookies and use incognito mode

  • Rotate through VPNs and proxies

triangle-exclamation

Common Payment Fraud Patterns

Fraud Type
Description
Business Impact

Card Testing

Bots test thousands of stolen cards with small purchases

Chargebacks, processor penalties

Stolen Card Fraud

Using compromised card details for purchases

Direct loss + chargeback fees

Friendly Fraud

Legitimate purchases disputed as "unauthorized"

Revenue loss, increased disputes

Account Takeover

Accessing accounts to use saved payment methods

Customer trust damage

Reseller Fraud

Bulk purchases with stolen cards for resale

Inventory loss, chargebacks

Refund Abuse

Claiming items not received or damaged

Direct financial loss

Why Traditional Fraud Detection Fails

  1. Fraudster uses stolen card #1 → Blocked by bank

  2. Same fraudster tries card #2 with new email → Approved (looks like a new customer)

  3. Same fraudster tries card #3 with VPN → Approved (different IP address)

  4. Same fraudster tries card #4 in incognito → Approved (no cookies to track)

triangle-exclamation

The Solution: Device-Linked Payment Intelligence

Guardian Stack adds a persistent identity layer to every transaction. Even when fraudsters change cards, emails, addresses, and IP addresses, they're still using the same physical device — and Guardian detects it.

How It Works

  1. Customer reaches checkout

  2. Guardian SDK silently collects device signals

  3. Customer submits payment

  4. Your backend fetches the Guardian event and checks:

    • Has this device had chargebacks before?

    • Is this device testing multiple cards?

    • Does the location match the billing address?

    • Is this a bot or automated browser?

  5. Approve, review, or decline the transaction

circle-info

Key insight: The visitorId persists across sessions, browsers, and cleared cookies. A fraudster who caused chargebacks last month is instantly recognizable today.


Implementation Guide

Step 1: Frontend — Capture Device Signals at Checkout

Install the Guardian JS SDK:

Initialize Guardian when your app loads, then call .get() at checkout:

Step 2: Backend — Assess Risk Before Charging

Install the Guardian Server SDK:

Create your checkout endpoint with fraud checks:


Real-World Examples

Stolen Card Detection

Scenario: A fraudster obtains stolen card details and attempts purchases on your site.

Card Testing Prevention

Scenario: Bots test thousands of stolen cards with small purchases to find valid ones.

Returning Fraudster Detection

Scenario: A fraudster who caused chargebacks 3 months ago returns with a new email, card, and VPN.

Geographic Anomaly Detection

Scenario: Card billing address is in New York, but the device is connecting from Eastern Europe via VPN.


Handling Chargebacks: Close the Loop

When you receive a chargeback, update your fraud database to catch the same fraudster next time:


Database Schema Example


Best Practices

Do

  • Store visitorId with every order for chargeback correlation

  • Link chargebacks back to device IDs to catch returning fraudsters

  • Use risk scoring for graduated responses (approve/review/decline)

  • Monitor velocity to catch card testing attacks

  • Flag for review rather than auto-decline borderline cases

  • Track decline rates per device to identify card testers

Don't

  • Don't reveal fraud detection logic in error messages

  • Don't block VPNs outright — many legitimate customers use them

  • Don't rely solely on AVS/CVV — fraudsters often have full card data

  • Don't ignore small transactions — they may be card testing probes

  • Don't delete fraud data — historical patterns are valuable


Key Metrics to Track

Metric
Description
Target

Chargeback Rate

Chargebacks / Total Transactions

< 0.5%

Fraud Detection Rate

Blocked fraudulent / Total fraudulent

> 90%

False Positive Rate

Legitimate blocked / Total blocked

< 5%

Card Testing Blocks

Velocity-based blocks per day

Monitor trends

Returning Fraudster Catches

Blacklisted devices blocked

Track monthly


Conclusion

Payment fraud is a continuous battle, but you don't have to fight blind. By linking every transaction to a persistent device identity, Guardian Stack lets you:

  • Catch returning fraudsters even with new cards and identities

  • Stop card testing bots before they find valid cards

  • Reduce chargebacks by declining high-risk transactions

  • Identify fraud rings by connecting related devices

  • Build institutional memory that improves over time

The key insight: fraudsters can steal unlimited cards, but they have limited devices. Make the device your anchor point for fraud prevention.


circle-check

Last updated

Was this helpful?