© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Industry News / Understanding New Account Fraud And How To Fight It

Understanding New Account Fraud And How To Fight It

  • Author
    Nok Nok News
  • Published
    14 Sep 2021
  • 0 comments
    Join Conversation
Industry News

Fraudsters constantly find ways to overcome security measures taken by companies. Among the most targeted are financial institutions. 

Detecting fraud can be hard, especially if you are not aware of them. The best protection is to strengthen security through authentication. Aside from traditional verification processes, adding passwordless authentication can help.

New Account Fraud (NAF)

One type of fraud that you should be aware of is New Account Fraud (NAF). It targets different payment accounts using mobile and/or digital channels. These include debit or credit cards, demand deposit accounts (DDAs), online merchants, and card not present (CDP) accounts.  

Fraudulent activities have increased through the years. In 2018, new accounts with credit card fraud were up 4%. New fraudulent mobile accounts increased by 28%. New fraudulent bank accounts had a 12% rise.

Use of Identity

There are two ways of using identity for NAF attacks. First, the fraudsters steal legitimate identities. Second, they create synthetic identities.

What is the difference?

Legitimate identities include data sourced from data breaches, phishing, and/or hacking. These will be used to open accounts. Thus, using the name of the victim. The fraudsters will pretend to be the person whose identity they have stolen. They often do this to bypass authentication, intercept communications from financial institutions, or conduct deposits and withdrawals to establish a pattern that will convince the financial institution that they are the owners of the account.

After gaining the trust of the financial institution, they will conduct other activities. They may apply for loans, request credit limit increases, make purchases, withdraw funds, transfer money, or generate fraudulent checks. All of these will be done without the knowledge of the legitimate account holder.

Meanwhile, synthetic identity is a made-up identity. Fraudsters can fabricate an identity using completely fictitious information. They can opt to manipulate an identity using modified real personally identifiable information (PII). Another way is identity compilation, wherein fraudsters combine real and fabricated PII. 

The synthetic identity will be used to build credit. They will apply for a bank account or credit card. This way, they can bypass the identification and verification process. They will create a username and password for online transactions. Then, they can start committing payment fraud. 

While fraudsters use technology to conduct NAF attacks, financial institutions can also use it to their advantage. Improve cyber security to prevent being a victim of fraud. What you can do is by including multiple layers of security. Doing this makes it more difficult for fraudsters to bypass. Include different technologies, such as passwordless authentication, biometrics authentication, and even OTP.

Nok Nok News

Related Posts

The US Government Now Wants Phishing Resistant MFA
Industry News

The US Government Now Wants Phishing Resistant MFA

The Government Is Now Turning To The Private Sector For Better Cybersecurity
Industry News

The Government Is Now Turning To The Private Sector For Better Cybersecurity

The US Government Is Ramping Up Cybersecurity Precautions
Industry News

The US Government Is Ramping Up Cybersecurity Precautions

Intuit Announce New Advances In Digital Financial Management
Industry News

Intuit Announce New Advances In Digital Financial Management

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

info@staging.noknok.com

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • info@staging.noknok.com

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語