Fraud Typology Reference

Audience: Fraud Operations, Fraud Analysts, Data Science, Compliance Last updated: March 2026 Version: 4.2

This reference describes the major fraud typologies detected by FraudShield AI Engine, the behavioral signals that characterize each pattern, the primary Risk Indicators (RIs) that fire, and the detection models responsible for scoring. Use this guide to understand why an alert was generated for a specific transaction, to tune thresholds for a specific typology, and to train analyst teams on recognizing fraud patterns in investigation.

Typologies evolve — so do models Fraud typologies shift continuously as fraudsters adapt to detection countermeasures. This reference reflects patterns current as of March 2026. The model retraining cycle (see Model Retraining Cycle) incorporates new confirmed fraud patterns into training data on an annual basis, or sooner when a significant new typology emerges.

Quick reference

Typology Primary channels Detection model Dominant RI categories
Account Takeover (ATO) Web, Mobile MDL_WIRE_ATO Device & channel, behavioral biometrics, velocity
Authorized Push Payment (APP) Fraud RTP, FedNow, Web wire MDL_RTP_MULE, MDL_WIRE_ATO Beneficiary, velocity, behavioral, amount anomaly
Card-Not-Present (CNP) Fraud eCommerce, API MDL_CARD_CNP Network/IP, device, velocity, amount anomaly
Check and Deposit Fraud Branch, Mobile (RDC), ATM MDL_ACH_FRAUD Velocity, account lifecycle, amount anomaly
ACH Fraud (BEC / Unauthorized Debit) ACH origination, Batch MDL_ACH_FRAUD Beneficiary, account lifecycle, velocity
Money Mule Activity RTP, FedNow, Web, ACH MDL_RTP_MULE Network graph, velocity, beneficiary, account lifecycle
Synthetic Identity Fraud New account origination, Loan MDL_1PF_APPFRAUD Account lifecycle, enrichment (identity), network graph
First-Party Fraud New account, Loan origination MDL_1PF_APPFRAUD Account lifecycle, velocity, amount anomaly
Cross-Border Wire Fraud SWIFT, Fedwire, Web MDL_WIRE_ATO Beneficiary, network/IP, velocity, amount anomaly

Account Takeover (ATO)

Account takeover occurs when a fraudster gains unauthorized access to a legitimate customer's online banking account — typically through credential theft (phishing, credential stuffing, SIM swap) or social engineering — and uses the access to initiate fraudulent transfers.

Behavioral pattern

Key RIs

Risk IndicatorSignalTypical sub-score
RI_DEVICE_FINGERPRINT_CHANGELogin device not seen before for this account55–85
RI_IP_COUNTRY_MISMATCHIP country differs from account registration country40–75
RI_KEYSTROKE_ANOMALY_SCORETyping pattern below biometric similarity threshold60–95
RI_CREDENTIAL_CHANGE_72HPassword or security credential changed in last 72 hours70–90
RI_NAVIGATION_ANOMALYAtypical navigation path before payment45–70
RI_SESSION_DURATION_SHORTSession duration below 5th percentile for this customer35–60
RI_NEW_PAYEE_FIRST_TXNBeneficiary not previously paid by this account55–90
ATO tuning note The behavioral biometrics RIs are among the most predictive for ATO. If your institution hasn't deployed the behavioral SDK, ATO detection relies primarily on device and IP signals, which are less precise. Deploy the FraudShield Behavioral SDK on your web and mobile channels for materially better ATO catch rates.

Authorized Push Payment (APP) Fraud

In APP fraud, the legitimate account holder is manipulated into authorizing a payment to a fraudster-controlled account. The transaction is technically authorized by the customer — the fraud is in the social engineering that convinced them to make it. Common pretexts: fake HMRC/IRS tax demands, investment scams, romance scams, impersonation of bank staff or law enforcement.

APP fraud is the fastest-growing fraud typology on instant payment rails (RTP, FedNow) because irrevocability means there's no recall window once the payment is sent.

Behavioral pattern

Key RIs

Risk IndicatorSignalTypical sub-score
RI_COPY_PASTE_BENEFICIARYBeneficiary account number was pasted, not typed60–80
RI_NEW_PAYEE_FIRST_TXNNo prior payments to this beneficiary from any account70–90
RI_MEMO_KEYWORD_RISKNLP analysis of memo field detects social engineering keywords50–85
RI_BENEFICIARY_ACCOUNT_AGEReceiving account opened within last 7 days75–95
RI_AMOUNT_ROUND_THRESHOLDAmount designed to fall just under $10,000 CTR threshold (structuring signal)55–75
RI_SESSION_DURATION_SHORTTransaction initiated with unusually brief session40–65

Card-Not-Present (CNP) Fraud

CNP fraud uses stolen card credentials (card number, expiry, CVV) to make purchases in online or phone channels where the physical card isn't presented. Card data is typically obtained through phishing, data breaches, or dark-web markets.

Behavioral pattern

Key RIs

Risk IndicatorSignalTypical sub-score
RI_IP_COUNTRY_MISMATCHIP country ≠ billing address country50–80
RI_VELOCITY_CARD_ATTEMPTS_1HMultiple card auth attempts in last hour (enumeration)65–95
RI_DEVICE_FINGERPRINT_CHANGETransaction from new/unknown device45–70
RI_MCC_ANOMALYMerchant category inconsistent with cardholder spending history40–65
RI_DIGITAL_GOODS_HIGH_VALUEHigh-value purchase in digital goods or gift card category55–80
RI_VPN_DETECTEDTransaction originating through VPN or proxy35–60

Check and Deposit Fraud

Check and deposit fraud encompasses check kiting (exploiting float between accounts), remote deposit capture (RDC) fraud (depositing the same check multiple times), return deposit item fraud, and cash deposit fraud. FraudShield AI monitors transactions across all deposit channels: branch, ATM, mobile (RDC), and offline (batch posting).

Base Transaction Activity (BTA) coverage

Deposit fraud detection uses channel-specific BTAs. Each BTA combination (channel + deposit type) has calibrated detection logic.

BTADescriptionKey fraud patterns
M_DCK_DMobile app — check deposit (RDC)Duplicate mobile deposit, altered check amount, deposited payee mismatch
A_DCK_DATM — check depositEnvelope stuffing (depositing cash inside empty envelope), altered checks
B_DCK_DBranch — check depositCounterfeit business checks, kiting between institutions
O_DCK_DOffline — check deposit (batch)Large-volume check kiting rings across multiple accounts
A_DCS_DATM — cash depositShort deposits (deposit less than claimed), staged deposits

Key RIs for check kiting

Risk IndicatorSignal
RI_KITING_PATTERN_SCORECyclical deposit/withdrawal pattern between two accounts consistent with float exploitation
RI_VELOCITY_DEPOSIT_24HUnusually high number of deposits in 24 hours
RI_RETURN_RATE_30DHigh return rate on deposited items in last 30 days (R01, R02, R09 returns)
RI_WITHDRAWAL_BEFORE_CLEARANCEFunds withdrawn before the deposited check has cleared
RI_DUPLICATE_CHECK_DEPOSITCheck serial number or MICR line matches a previously deposited item

ACH Fraud — Business Email Compromise and Unauthorized Debits

ACH fraud takes two main forms. In Business Email Compromise (BEC), fraudsters compromise or spoof an email account to redirect ACH payroll or vendor payments to fraudster-controlled accounts. In unauthorized debit, stolen account credentials are used to originate ACH debits from victim accounts without authorization.

BEC pattern

Unauthorized debit pattern

Key RIs

Risk IndicatorSignal
RI_PAYEE_CHANGE_BEFORE_REGULAR_RUNBeneficiary account changed within 72 hours of a recurring payment
RI_NEW_ORIGINATOR_COMPANY_IDACH company ID not previously seen on this account
RI_ACCOUNT_LIFECYCLEOriginator account has no prior outgoing ACH history
RI_PAYEE_HIGH_RISK_ROUTINGDestination routing number associated with elevated mule account risk
RI_AMOUNT_BALANCE_DRAINDebit amount within 5% of available balance — drain pattern

Money Mule Activity

Money mule accounts receive proceeds from fraud committed against other victims and pass the funds onward — either knowingly (complicit mules) or unknowingly (recruited via job scams). Mule detection in FraudShield AI works in two directions: detecting when an account is sending to a mule account, and detecting when an account is acting as a mule.

Mule receiver pattern (account is a mule)

Key RIs for mule detection

Risk IndicatorSignal
RI_MULE_NETWORK_SCORENetwork graph centrality score — account connected to known mule nodes
RI_RAPID_MOVEMENT_THROUGH_ACCOUNTFunds received and re-sent within <24 hours (layering signal)
RI_SHARED_DEVICE_CLUSTERDevice or IP shared across >3 unrelated accounts
RI_INBOUND_MULTI_SOURCE_24HMultiple unrelated inbound senders within 24 hours
RI_ACCOUNT_AGE_DAYSAccount <90 days old (Early Account Monitoring)
RI_MULE_ACCOUNT_CONFIRMEDDestination account confirmed as mule by Early Warning Services or prior confirmed fraud

Synthetic Identity Fraud

Synthetic identity fraud uses a fabricated identity — often combining a real Social Security number (usually belonging to a child, elderly person, or recent immigrant with no credit file) with a fake name and address — to open accounts and build credit before committing "bust-out" fraud. Synthetic identities are the fastest-growing fraud type in the US.

Key signals

Key RIs

Risk IndicatorSignal
RI_SYNTHETIC_ID_SCOREIdentity verification provider's synthetic identity probability score
RI_ADDRESS_MISMATCHStated address doesn't match address associated with SSN in reference databases
RI_SHARED_DEVICE_CLUSTERApplication device previously used for other synthetic identity applications
RI_CREDIT_BUST_OUT_PATTERNRapid utilization to maximum credit limit followed by cash advance or balance transfer — bust-out signal
RI_ACCOUNT_AGE_DAYSAccount <90 days old with high transaction velocity

First-Party Fraud

First-party fraud is committed by a legitimate, correctly identified customer who intentionally misuses their account or misrepresents their situation to obtain a financial benefit. Unlike identity fraud, the person's real identity is known. Common forms include intentional overdraft abuse, false dispute claims, application fraud (overstating income or assets), and deliberate default.

Key signals

Cross-Border Wire Fraud

Cross-border wire fraud targets high-value SWIFT or international Fedwire transactions. The typology typically involves ATO as the entry point, followed by rapid outbound wire transfers to foreign accounts in jurisdictions with limited recovery prospects. Fraudsters specifically target international transfers because recall is complex, slow, and often unsuccessful once funds leave the domestic banking system.

Behavioral pattern

Key RIs

Risk IndicatorSignal
RI_PAYEE_HIGH_RISK_COUNTRYDestination country on FATF grey/black list or institutional high-risk list
RI_FIRST_INTERNATIONAL_WIRENo prior international wire transfers from this account
RI_AMOUNT_SPIKE_3SDAmount significantly above historical wire amounts for this account
RI_BENEFICIARY_DETAIL_CHANGE_SAME_SESSIONBeneficiary account or name changed in the same session as the wire submission
RI_IP_COUNTRY_MISMATCHIP country matches destination country — suggests fraudster is the initiator
Wire recall success rates drop sharply after 24 hours For cross-border wire fraud, the window to initiate a successful recall via SWIFT gSRP (global Stop and Recall Program) is typically 24–48 hours. CRITICAL-scored international wire alerts should be treated as time-critical. Make sure your alert SLA for cross-border CRITICAL alerts is 2 hours or less.