Often times, a fraudulent order has no single characteristic that gives it away Often times, a fraudulent order has no single characteristic that gives it away. “It’s almost like dust building up on an object,” CyberSource’s Vic Dolcourt says. “Little bits of suspicion get added up.” Some of those specks:Shipping address and billing address don’t match.Customer orders multiple items in the same size, color or style.Customer wants the fastest delivery option, regardless of price.Order total is much higher than a typical order.Multiple orders are going to one address. One scam: Fraudsters enlist people to “work at home” in the United States by receiving lots of deliveries and reshipping them overseas.Shipping address has a box number or suite number, indicating that the recipient may have set up a temporary address at a post office or UPS Store.Shipping address is in a country where the retailer has experienced a high amount of fraud.Shipping address is associated with past chargebacks or fraud according to the U.S. Postal Inspection Service.Customer has put a fraud alert on his file with the credit bureaus.Customer’s e-mail address is a free Web-mail account.Multiple order attempts are coming from one IP address but with different customer names and credit card numbers.The geolocation of the customer’s IP address is on one continent and the shipping or billing address is on another. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe