Detect fraudulent account opening behavior with advanced behavioral biometrics & device intelligence
Account Opening (AO) fraud also referred to as Fraudulent Applications (FRAP) fraud is a type of fraud that occurs within the process of opening new accounts.
In this fraud, the fraudsters usually open a new account under a stolen or completely synthetic identity. Usually, the fraudsters obtain Personal Identifiable Information on the web (PII) or through social engineering and open new accounts and use it for their own nefarious goals.
New accounts can be opened to create money mule accounts, abuse new account promotions or abuse people’s PIIs to receive benefits or tax refunds.
Detecting Account Opening fraud is tough. Businesses usually don’t have good solutions in place to properly tackle these challenges.
The usual Know-Your-Customer (KYC) and Anti-Money-Laundering (AML) solution (driven by regulation) aim to minimize fraudulent account opening, but even these methods can be hacked and overcome.
Also, the KYC procedures include significant challenges when it comes to the privacy and security of personal data. Additionally, the KYC procedures introduce a significant hurdle to the user experience in the process of opening a new account.
Any business that has a digital account creation would benefit from a solution that can invisibly detect account opening fraud at the time of creation – and this is what ThreatMark delivers.
ThreatMark Anti-Fraud Solution (AFS) processes user, device and user behavior data to build advanced ML models that can precisely predict user’s intent while they’re opening the accounts.
For the success of the models the data gathering process is crucial. Diligent collection of data and precise tagging of the users can ensure the predictions are precise and fraudulent account opening is recognized at the time of submitting the forms.
Unlike standard KYC solutions. ThreatMark doesn’t require any photos, documents, complex surveys nor video recordings.
Our solution only requires that our probes are successfully installed and that the users behave as they would usually do.
Digest the core details of our technology and review our unique approach in this datasheet.
Use the form below to connect with our fraud and security specialists. Add your questions, thoughts & share your most pressing challenges.