{"id":34680,"date":"2025-07-07T16:28:34","date_gmt":"2025-07-07T14:28:34","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/top-ecommerce-fraud-2025-and-protection\/34680\/"},"modified":"2025-07-07T16:28:34","modified_gmt":"2025-07-07T14:28:34","slug":"top-ecommerce-fraud-2025-and-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/top-ecommerce-fraud-2025-and-protection\/34680\/","title":{"rendered":"Top fraud schemes threatening e-commerce"},"content":{"rendered":"<p>According to Juniper Research data, global e-commerce turnover <a href=\"https:\/\/www.juniperresearch.com\/research\/fintech-payments\/ecommerce\/ecommerce-payments-market-report\/\" target=\"_blank\" rel=\"nofollow noopener\">surpassed $7 trillion<\/a> in 2024, and is projected to grow by 1.5 times over the next five years. But cybercriminal interest in this field is growing even faster. Last year, losses from fraud exceeded $44 billion\u00a0\u2014 and they\u2019re expected to reach US$107 billion within five years.<\/p>\n<p>Any online platform\u00a0\u2014 regardless of size or industry\u00a0\u2014 can become a target, whether it\u2019s a content marketplace, a hardware store, a travel agency, or a water park website. If you accept payments, run a loyalty program, and allow creation of customer accounts, fraudsters will definitely come knocking. So which attack schemes are most common, what kind of damage can they cause, and how can you stop them?<\/p>\n<h2>Account theft<\/h2>\n<p>Thanks to <a href=\"https:\/\/www.kaspersky.com\/blog\/infostealers-targeted-attacks-business\/52772\/\" target=\"_blank\" rel=\"noopener nofollow\">infostealers<\/a> and various database leaks, attackers have access to billions of email-password combinations used on various sites. They can try these combinations on any other site with user accounts, on the assumption that humans often use the same password for different services. This attack method is known as \u201ccredential stuffing\u201d, and if successful, attackers can place orders using the victim\u2019s linked bank card or spend loyalty points. Criminals can also use compromised accounts to make fraudulent payments with other credit cards.<\/p>\n<h2>Testing stolen cards<\/h2>\n<p>Just as with login credentials, attackers may have a database of credit-card data stolen using malware. They need to test which cards are still valid and can process online payments\u00a0\u2014 and for this, any e-commerce site will do. These \u201ctest\u201d purchases are usually small. Working cards are then resold to other criminals, who go on to drain the funds in various ways.<\/p>\n<p>From the store\u2019s side, this looks like a customer adding a bunch of random inexpensive items to their cart and repeatedly trying to check out, each time with a different card. Even small stores can end up with <a href=\"https:\/\/www.reddit.com\/r\/shopify\/comments\/1dnjd1m\/high_velocity_card_testing_issue\/\" target=\"_blank\" rel=\"nofollow noopener\">hundreds of abandoned carts<\/a>. Eventually, the payment gateway may block the store for exceeding the allowed number of failed payment attempts.<\/p>\n<h2>Buyer fraud<\/h2>\n<p>Sometimes real customers may complete an order, only to later tell their bank they never made the purchase\u00a0\u2014 and demand a refund. This could be a case of deliberate fraud, or simply one family member using another\u2019s card without permission\u00a0\u2014 for instance, a teenager using a parent\u2019s card. Although such incidents are usually small-scale, they can still cause serious damage\u00a0\u2014 especially if the store becomes known in \u201clifehacker\u201d communities as a site that easily refunds money.<\/p>\n<h2>Fraudulent purchases<\/h2>\n<p>Depending on your store\u2019s niche, location, and other factors, criminals may try to use stolen credit cards to \u201ccash out\u201d by purchasing goods or services. This can result in a wave of orders followed by a flood of disputes and cancellations. In some extreme cases, the volume alone becomes a threat\u00a0\u2014 one store received <a href=\"https:\/\/www.reddit.com\/r\/magento2\/comments\/1dybjrb\/urgent_help_needed_braintree_fraudulent_orders\/\" target=\"_blank\" rel=\"nofollow noopener\">118\u00a0000 fraudulent orders<\/a>, with criminals placing a fake order every three seconds.<\/p>\n<h2>Gift card attacks<\/h2>\n<p>If your store accepts gift cards, bots may attempt to brute-force thousands of card numbers and verification codes to find valid ones. Once found, they\u2019re either used to make purchases or resold on the secondary market.<\/p>\n<h2>Loyalty points theft<\/h2>\n<p>If your store allows purchases using accumulated loyalty points without requiring additional verification via SMS or other methods, attackers can either immediately drain any account they manage to access, or wait for the victim to accumulate more points. The latter often happens with stores that sell high-value products and have a loyal customer base.<\/p>\n<h2>Scalping exclusive products<\/h2>\n<p>If you sell, say, tickets to popular concerts or limited-edition sneakers, be prepared for resellers. Scalper bots can snap up all exclusive stock within minutes, triggering justified outrage from loyal customers. There\u2019s an active black market for bots designed for popular e-commerce platforms, such as Shopifybot.<\/p>\n<h2>Mass account registration<\/h2>\n<p>To successfully run the schemes described above, attackers often create hundreds or thousands of accounts in your store, increasing operational costs\u00a0\u2014 for instance, by triggering welcome SMS messages and follow-up email campaigns.<\/p>\n<h2>Direct and indirect business losses<\/h2>\n<p>Even if neither you nor your customers lose money or goods, any of the above schemes can lead to a wide range of problems and expenses:<\/p>\n<ul>\n<li>Costs from fraudulent transactions and repeated failed payments. Depending on the situation and the terms of your agreement with the payment gateway, you might have to cover transaction and chargeback fees, fines, and other costs. You might also exceed your transaction limits and temporarily lose access to the payment gateway\u00a0\u2014 effectively paralyzing normal operations.<\/li>\n<li>Advertising costs and distorted analytics. Bots often arrive via referral links, paid search ads, and other forms of online advertising. This means your real advertising budget may be wasted attracting fake users. Even if the bots don\u2019t consume your budget directly, their activity can mess up ad platform algorithms, resulting in lower-quality traffic to your site.<\/li>\n<li>Costs for marketing campaigns and promotions that are misused by exploiting newly created accounts. Already registered users create new accounts to spend welcome bonuses for the first purchase, and fraudsters look for vulnerabilities and try to obtain bonuses en masse by dishonest means. As a result, the marketing budget allocated for attracting and increasing user loyalty is wasted.<\/li>\n<li>Poor planning. Numerous fake orders can be hard to filter out of your analytics\u00a0\u2014 especially if you rely on the default analytics tools built into your e-commerce platform. As a result, planning for demand and stock becomes much more difficult.<\/li>\n<li>Wasted time. Dealing with hundreds of abandoned carts, thousands of bogus accounts, and countless failed payment attempts consumes your employees\u2019 time and energy, leading to operational delays and losses.<\/li>\n<li>Customer dissatisfaction. Depending on the attack type, customers may suffer direct losses (money stolen, loyalty points drained, fraudulent activity on their account) or indirect inconveniences (product shortages, failed transactions). Whatever the issue, your support and marketing teams will have to handle it\u00a0\u2014 offering discounts, compensation and so on. But many customers will simply walk away and never come back.<\/li>\n<\/ul>\n<p>It\u2019s no surprise that, <a href=\"https:\/\/explodingtopics.com\/blog\/ecommerce-fraud-stats\" target=\"_blank\" rel=\"nofollow noopener\">according to some estimates<\/a>, for every hundred dollars in fraudulent orders, businesses lose over double that in total costs.<\/p>\n<h2>How to protect your online business<\/h2>\n<p>The days of blocking bots by filtering IP addresses or adding a CAPTCHA at checkout are over. The AI boom has empowered not only automation in marketing and customer support\u00a0\u2014 but also a new generation of dangerous fraud bots that easily bypass traditional protection.<\/p>\n<p>That\u2019s why businesses of all sizes need next-generation security technologies that monitor every user session from the moment they land on the site until checkout. This kind of continuous protection helps detect any anomalies\u00a0\u2014 whether it\u2019s a compromised legitimate account, abuse of the payment gateway API, mass fake account creation, or attempts to circumvent security measures.<\/p>\n<p>A leading solution in this space is <a href=\"https:\/\/www.kaspersky.co.za\/enterprise-security\/fraud-prevention?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Fraud Prevention<\/a>. By continuously analyzing the user\u2019s device, behavior, environment, and metadata in real time, it builds a profile of a legitimate user, detects anomalies early on, and protects against account compromise and fraud. Kaspersky Fraud Prevention can be tailored to the specific needs of your store using flexible rules that leverage both your own data and global analytics. The solution does not require installation on the user\u2019s device and is integrated into an existing website and mobile application with minimal effort.<\/p>\n<p>Many site owners report that advanced anti-fraud analytics actually improve the customer experience\u00a0\u2014 since legitimate users encounter fewer CAPTCHAs, SMS verifications, and other friction points. And ultimately, your business faces fewer losses\u00a0\u2014 and can focus more on developing your product range and service.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"28063\">\n","protected":false},"excerpt":{"rendered":"<p>How cybercriminals can exploit your online store \u2014 and how to stop them.<\/p>\n","protected":false},"author":2722,"featured_media":34681,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3020,3021],"tags":[1853,2141,132,80,1451,726,321,422],"class_list":{"0":"post-34680","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-tips","11":"tag-business","12":"tag-credit-cards","13":"tag-fraud","14":"tag-payments","15":"tag-scam","16":"tag-technology","17":"tag-threats"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top-ecommerce-fraud-2025-and-protection\/34680\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top-ecommerce-fraud-2025-and-protection\/29004\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top-ecommerce-fraud-2025-and-protection\/24232\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top-ecommerce-fraud-2025-and-protection\/29113\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top-ecommerce-fraud-2025-and-protection\/40025\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top-ecommerce-fraud-2025-and-protection\/53758\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top-ecommerce-fraud-2025-and-protection\/29338\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top-ecommerce-fraud-2025-and-protection\/35040\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/34680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=34680"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/34680\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/34681"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=34680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=34680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=34680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}