<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>luttecontrelafraude Archives - Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/es/tag/luttecontrelafraude/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/es/tag/luttecontrelafraude/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastbuilddate>Fri, 20 Mar 2026 10:49:57 +0000</lastbuilddate>
	<language>es</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>luttecontrelafraude Archives - Oneytrust</title>
	<link>https://www.oneytrust.com/es/tag/luttecontrelafraude/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Refund fraud: when AI becomes a tool for fraudsters…</title>
		<link>https://www.oneytrust.com/es/fraude-remboursement-ia-generative/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 20 Mar 2026 10:49:55 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[AI ACT]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[Fraud prevention]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3802</guid>

					<description><![CDATA[<p>A phenomenon that TF1 recently highlighted in its 8pm news report, in which Oneytrust was able to share its expertise and shed light on these new fraudulent practices. 🚨 Fraud is evolving rapidly thanks to generative AI Fraudsters now have access to technologies that were once the preserve of experts. It takes just a few...</p>
<p>The post <a href="https://www.oneytrust.com/es/fraude-remboursement-ia-generative/">Refund fraud: when AI becomes a tool for fraudsters…</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A phenomenon that TF1 recently highlighted in its 8pm news report, in which Oneytrust was able to share its expertise and shed light on these new fraudulent practices.</p>



<figure class="wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="TF1-oneytrust mars2026" src="https://player.vimeo.com/video/1172835019?dnt=1&amp;app_id=122963" width="720" height="405" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share" referrerpolicy="strict-origin-when-cross-origin"></iframe>
</div></figure>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f6a8.png" alt="🚨" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Fraud is evolving rapidly thanks to generative AI</strong></p>



<p>Fraudsters now have access to technologies that were once the preserve of experts. It takes just a few clicks to generate:</p>



<ul class="wp-block-list">
<li><strong>doctored images</strong> of products “supposedly” broken,</li>



<li><strong>forged supporting documents</strong>,</li>



<li>and well-crafted <strong>synthetic identities</strong></li>
</ul>



<p>As TF1 explains, private sellers are now facing disputes based on AI-manipulated photos, with automated systems sometimes turning against the honest victim themselves.</p>



<p>One user interviewed recounted losing €180 due to an AI-generated image showing a supposedly broken vinyl record — an item that, by its very nature, does not break in that way. The platform’s automated system, however, ruled in favour of the fraudster, illustrating the vulnerability of traditional checks.</p>



<p>This phenomenon is part of a global trend: fraud involving doctored images is skyrocketing, with a 15% increase in falsified images in claims since the start of 2025.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f4c8.png" alt="📈" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Three major trends observed by Oneytrust</strong></p>



<p>At Oneytrust, our experts have identified three major shifts:</p>



<ol class="wp-block-list">
<li><strong>More sophisticated fraud</strong></li>
</ol>



<p>Generative AI can produce highly realistic images, some of which are impossible to distinguish with the naked eye. Synthetic identities or invoices recreated pixel by pixel can fool traditional verification systems.</p>



<ol start="2" class="wp-block-list">
<li><strong>The industrialisation of attempts</strong></li>
</ol>



<p>What was once manual work is now automated. Fraudsters are now launching vast, coordinated campaigns, drastically increasing the volume of attempts detected on e-commerce sites.<br>This industrialisation is confirmed by the TF1 report, which warns of waves of scams potentially affecting millions of people.</p>



<ol start="3" class="wp-block-list">
<li><strong>New weak signals</strong></li>
</ol>



<p>Traditional methods are no longer sufficient. When evidence is generated by AI, behaviour, metadata and contextual inconsistencies become the new areas of analysis.</p>



<p><br><strong><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> AI: an essential tool for countering these new attacks</strong></p>



<p>With fraudsters now using AI, anti-fraud solutions must evolve. That is why Oneytrust has integrated advanced artificial intelligence models at the heart of its technologies.</p>



<p>In particular, our systems enable us to:</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Detect behavioural and contextual inconsistencies</strong></p>



<p>Frequency of returns, unusual histories, multiple addresses or devices: the patterns speak for themselves.<br>Our solution cross-references these signals to identify abuse well before it becomes visibly repetitive.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /><strong> Adapt in real time</strong></p>



<p>Fraud methods change every week. Our models continuously recalibrate to keep pace with these changes and block emerging attacks.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Identify organised networks</strong></p>



<p>By analysing data structure and correlating identity details, devices and network history, Oneytrust exposes organised criminal groups operating under different identities or accounts.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Tailor detection to your returns processes</strong></p>



<p>Oneytrust adapts precisely to each retailer’s returns policies and internal workflows, incorporating their rules, thresholds and operational specifics.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f91d.png" alt="🤝" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>The real challenge: maintaining trust</strong></p>



<p>In this context, the issue is no longer simply about blocking fraud.<br>It is about <strong>protecting the relationship of trust </strong>between retailers and their customers.</p>



<p>Excessive suspicion can damage the shopping experience. Being too permissive can encourage abuse and undermine business models. The balance is therefore delicate — and AI plays a crucial role in accurately distinguishing between:</p>



<ul class="wp-block-list">
<li>honest shoppers,</li>



<li>opportunistic fraudsters,</li>



<li>and organised criminal networks.</li>
</ul>



<p>Oneytrust is committed to maintaining this balance by combining cutting-edge technology with human expertise.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f52e.png" alt="🔮" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Fraud and AI: a huge challenge… but far from insurmountable</strong></p>



<p>Artificial intelligence has profoundly transformed the landscape of reimbursement fraud. Whilst it provides fraudsters with new tools, it further enhances companies’ ability to detect and stop them.</p>



<p>With ongoing investment, increasingly sophisticated models and greater collaboration across the entire ecosystem, this battle is not only possible, but winnable.</p>



<p>Trust is one of the cornerstones of online commerce. Together, let’s continue to protect it.</p><p>The post <a href="https://www.oneytrust.com/es/fraude-remboursement-ia-generative/">Refund fraud: when AI becomes a tool for fraudsters…</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Act and Fraud Prevention : why the market must prepare</title>
		<link>https://www.oneytrust.com/es/ai-act-2026-lutte-contre-la-fraude/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 27 Feb 2026 18:21:43 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[AI ACT]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[Fraud prevention]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3747</guid>

					<description><![CDATA[<p>Find out how Oneytrust is preparing to comply with this new text, which is just as crucial as the GDPR was in its day! The text defines an AI system very broadly as a ‘machine-based system, operating with varying degrees of autonomy, capable of adapting after deployment and which, for explicit or implicit purposes, deduces...</p>
<p>The post <a href="https://www.oneytrust.com/es/ai-act-2026-lutte-contre-la-fraude/">AI Act and Fraud Prevention : why the market must prepare</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><br>Find out how Oneytrust is preparing to comply with this new text, which is just as crucial as the GDPR was in its day!</p>



<ol class="wp-block-list">
<li><strong>The new broad definition of an ‘AI system’</strong></li>
</ol>



<p>The text defines an AI system very broadly as a ‘machine-based system, operating with varying degrees of autonomy, capable of adapting after deployment and which, for explicit or implicit purposes, deduces from data how to generate results (predictions, content, recommendations, decisions) that influence physical or virtual environments’.</p>



<p>This broad technological scope is complex to implement operationally, but the market agrees that it encompasses sophisticated approaches such as machine learning (ML), hybrid expert rule + machine learning approaches, and advanced optimisation.</p>



<p>With the proliferation of AI use by fraudsters, trusted anti-fraud companies such as Oneytrust will need to further develop their range of AI solutions to power their scoring, behavioural alerting and anomaly analysis engines in order to keep up with the times and identify increasingly sophisticated fraud patterns.</p>



<ol start="2" class="wp-block-list">
<li><strong>Risks: where does fraud detection fit in?</strong></li>
</ol>



<p>The AI Act classifies certain uses as ‘high risk’ (critical biometrics, employment, education, access to essential services such as credit scoring, health insurance pricing, etc.). These systems are authorised but must be accompanied by a very sophisticated risk management system and an assessment of their compliance before being placed on the market.</p>



<p>One notable exception is that AI used to detect financial fraud is not automatically considered ‘high risk’. This reduces the direct regulatory burden, but does not remove the expectations of transparency, data quality and human oversight that regulated institutions contractually pass on to their subsidiaries and suppliers (such as Oneytrust).</p>



<ol start="3" class="wp-block-list">
<li><strong>What are the key dates to remember?</strong></li>
</ol>



<p>The main requirements of the AI Act will come into force in stages. Here are the key dates to remember:</p>



<ul class="wp-block-list">
<li><strong>2 February 2025</strong>: entry into force of the ‘unacceptable risk’ prohibitions + AI literacy requirement (awareness/training for staff involved in AI).</li>



<li><strong>2 August 2025</strong>: obligations for general-purpose AI models (GPAI) begin to apply (generative AI).</li>



<li><strong>2 February 2026</strong>: European deadline for certain implementing acts (post-market surveillance plans).</li>



<li><strong>2 August 2026</strong>: obligations for high-risk AI systems.</li>



<li><strong>August 2027</strong>: general application of all provisions of the regulation.</li>
</ul>



<ol start="4" class="wp-block-list">
<li><strong>Why prepare even if you are not ‘high risk’?</strong></li>
</ol>



<p>Fraudsters are becoming industrialised with AI. Deepfakes, fake documents, automated attack scripts, automated use of synthetic identities: fraud is scaling up. Those involved in the fight against fraud must adapt quickly to these new trends.</p>



<p>Although fraud prevention is not explicitly considered high risk, it is essential to ensure that solutions respect the fundamental rights and privacy of customers and end users, whether in accordance with the GDPR or the AI Act. In addition, the expectations of regulated partners (mainly in the banking sector) are increasingly high, as they are subject to sector-specific requirements that demand traceability, good documentation and heightened vigilance regarding the quality of the data used to satisfy their supervisors.</p>



<ol start="5" class="wp-block-list">
<li><strong>The Oneytrust response</strong></li>
</ol>



<p>Oneytrust provides identity verification and fraud detection solutions for e-merchants, fintechs and banks, relying on AI solutions coupled with our 25 years of human expertise in fraud prevention to detect synthetic identities, transactional anomalies and risk signals in real time. We are members of the BPCE Group, which drives us to high standards of compliance and model governance.<sup data-fn="5de12d73-b305-46c7-8f46-0517b019a95f" class="fn"><a id="5de12d73-b305-46c7-8f46-0517b019a95f-link" href="#5de12d73-b305-46c7-8f46-0517b019a95f">1</a></sup></p>



<p>As with the GDPR, we did not wait to cultivate our expertise on the AI Act and have been raising awareness and training our staff on these new compliance issues for several years. <strong>Contact us if you would like to learn more about Oneytrust&#8217;s vision for AI compliance and risk management!</strong></p><p>The post <a href="https://www.oneytrust.com/es/ai-act-2026-lutte-contre-la-fraude/">AI Act and Fraud Prevention : why the market must prepare</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Weak signals: those little-noticed details that reveal the authenticity of a digital identity</title>
		<link>https://www.oneytrust.com/es/signaux-faibles-identite-digitale/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Thu, 19 Feb 2026 08:21:03 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[identité digitale]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[signaux faibles]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3733</guid>

					<description><![CDATA[<p>Modern fraudsters no longer break down doors; they enter with the right keys. Valid credentials, recognized devices, credible customer journeys: everything seems normal. And yet, something is wrong. That something is weak signals. What is a weak signal in digital identity? A weak signal, as its name suggests, is not a red alert. It is...</p>
<p>The post <a href="https://www.oneytrust.com/es/signaux-faibles-identite-digitale/">Weak signals: those little-noticed details that reveal the authenticity of a digital identity</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><br>Modern fraudsters no longer break down doors; they enter with the right keys. Valid credentials, recognized devices, credible customer journeys: everything seems normal. And yet, something is wrong.</p>



<p>That something is weak signals.</p>



<p><strong>What is a weak signal in digital identity?</strong></p>



<p>A weak signal, as its name suggests, is not a red alert. It is a detail. A micro-anomaly. An almost invisible (or rather ignored) inconsistency taken in isolation, but which takes on its full meaning when correlated with other elements.</p>



<p>For example:</p>



<ul class="wp-block-list">
<li>a known device… but whose technical fingerprint has changed slightly;</li>



<li>a connection from a usual city… at a completely atypical time;</li>



<li>correct keystrokes… but with an unusual rhythm;</li>



<li>a smooth user journey… but traveled at a speed too fast to be human.</li>
</ul>



<p>None of these elements alone is sufficient to justify blocking an event. But together, they tell a different story from what the declarative data would suggest.</p>



<p><strong>Why strong signals are no longer enough</strong></p>



<p>Historically, security relied on binary elements: correct password, validated SMS code, recognized device.</p>



<p>The problem? These proofs can be stolen, intercepted, or simulated.</p>



<p>Malware, phishing, massive data leaks, and automation tools have turned credentials into mere raw material for fraudsters. Even strong authentication is no longer foolproof against real-time proxy attacks or remote takeover.</p>



<p>The result: a user can tick all the boxes for legitimacy while still being a fraudster. This is precisely where weak signals become decisive.</p>



<p><strong>Weak signals reveal behavior, not a declared identity</strong></p>



<p>A declared identity can be falsified. Behavior is much more difficult to fake.</p>



<p>Weak signals allow us to answer not the question “Is this information correct?” but “Does this behavior resemble that of a legitimate human being in this specific context?”</p>



<p>This leads us to a dynamic interpretation of digital identity, based on the consistency of habits, the continuity of interactions, and the logic of sequences of actions.</p>



<p><br><strong>From isolated events to behavioral history</strong></p>



<p>The true power of weak signals lies not in a snapshot, but in duration.</p>



<p>A strange connection may be insignificant. Two anomalies close together begin to raise questions. A series of micro-deviations paints a picture of fraud.</p>



<p>It is by connecting these dots that we move from one-off checks to continuous behavioral monitoring. Digital identity ceases to be a state and becomes an evolving probability.</p>



<p><br><strong>The challenge: detecting without degrading the experience</strong></p>



<p>Exploiting weak signals does not mean increasing friction.</p>



<p>The goal is to adapt the level of vigilance: request additional verification only when the risk increases, silently monitor suspicious behavior, and trigger enhanced controls on sensitive actions.</p>



<p>In other words: make security proportional to the actual risk.</p>



<p><strong>When email addresses become a weak signal</strong></p>



<p>Email addresses are often perceived as simple contact identifiers. However, they contain a wealth of information that is underestimated when analyzed from a semantic and behavioral perspective.</p>



<p>Let&#8217;s take two examples: marie.dupont@yahoo.fr and ma.rie_du.pont1567@gmail.com.</p>



<p>Both addresses are technically valid. Both can pass standard checks. But they don&#8217;t tell the same story.</p>



<p>Semantic analysis involves observing the structure, logic, and consistency of an email address in relation to the context declared by the user.</p>



<p>Discreet but telling clues may emerge: domain name, username composition, presence of promotional keywords, consistent or inconsistent series of numbers, unusual complexity, or recurrence of similar patterns observed in previous fraud cases.</p>



<p>Taken in isolation, none of these elements proves fraud. But they may indicate that an address was created quickly, en masse, or for purely transactional rather than relational purposes.</p>



<p>A real digital identity often leaves traces of continuity. Conversely, in many fraud scenarios, the email address is a disposable tool designed to pass a technical check, not to reflect a lasting identity.</p>



<p>Semantic analysis therefore allows us to answer a subtle question: does this address resemble a human point of contact or a functional artifact created for a specific scenario?</p>



<p>Once again, the value comes from correlation: unusually structured email, rapid account creation, device recently seen on other accounts, automated browsing. It is the aggregation of these weak signals that reveals a credible risk.</p>



<p><strong>From raw data to contextual intelligence</strong></p>



<p>Weak signals already exist in your systems: technical logs, browsing data, device metadata, action sequences.</p>



<p>The difference lies not in the quantity of data, but in the ability to correlate it in real time, contextualize it according to the journey, learn from past patterns, and detect subtle deviations.</p>



<p><strong>Digital identity is no longer a file, it is a flow</strong></p>



<p>For years, we treated identity as a file: static information to be verified once and for all.</p>



<p>Weak signals are forcing us to change our paradigm. Identity is becoming a continuous stream of behaviors, which are confirmed or degraded through interactions.</p>



<p><br><strong>Conclusion</strong></p>



<p>Major frauds rarely hide behind big anomalies. They are concealed in the details that we don&#8217;t look at.</p>



<p>Learning to read weak signals means accepting that the truth is no longer found in a single piece of evidence, but in the accumulation of micro-clues. In a world where identities can be fabricated, stolen, or rented, this subtle reading becomes one of the pillars of digital trust.</p><p>The post <a href="https://www.oneytrust.com/es/signaux-faibles-identite-digitale/">Weak signals: those little-noticed details that reveal the authenticity of a digital identity</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cookies: a marketing ally… but also a loophole for fraud</title>
		<link>https://www.oneytrust.com/es/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 10 Dec 2025 16:39:57 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[cookies]]></category>
		<category><![CDATA[cybercirminalite]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[marketing]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3634</guid>

					<description><![CDATA[<p>Why are cookies such a prime target? The impact on your brand Examples of techniques used by fraudsters How to protect your digital ecosystem? ConclusionCookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can...</p>
<p>The post <a href="https://www.oneytrust.com/es/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/">Cookies: a marketing ally… but also a loophole for fraud</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Why are cookies such a prime target?</strong></p>



<ul class="wp-block-list">
<li><strong>Easy to hijack</strong>: A stolen cookie can be enough to steal someone&#8217;s online identity.</li>



<li><strong>Rich in sensitive data</strong>: Usernames, sessions, preferences… all this information can be exploited for targeted attacks.</li>



<li><strong>Invisible to the user</strong>: Most internet users are unaware of the scope of the information stored, which facilitates fraud.</li>
</ul>



<p><strong>The impact on your brand</strong></p>



<ul class="wp-block-list">
<li><strong>Advertising fraud</strong>: Falsified cookies artificially inflate impressions and clicks, distorting your KPIs and increasing your costs.</li>



<li><strong>Session hijacking</strong>: Hackers can access customer accounts, generating fraudulent transactions.</li>



<li><strong>Reputational damage</strong>: A vulnerability exploited via cookies can damage your image and your GDPR compliance.</li>
</ul>



<p><strong>Examples of techniques used by fraudsters</strong></p>



<ul class="wp-block-list">
<li><strong>Session sniffing</strong>: Interception of cookies on unsecured websites.</li>



<li><strong>XSS injection</strong>: Malicious scripts to steal cookies.</li>



<li><strong>CSRF</strong>: Fraudulent actions performed without the user&#8217;s knowledge.</li>



<li><strong>Predictable credentials</strong>: Exploitation of weak algorithms to guess sessions.</li>
</ul>



<p><strong>How to protect your digital ecosystem?</strong></p>



<ul class="wp-block-list">
<li><strong>Proactive monitoring</strong>: Detecting anomalies in cookie-related behaviour.</li>



<li><strong>Advanced anti-fraud solutions</strong>: Identifying falsified or cloned cookies.</li>



<li><strong>Awareness and transparency</strong>: Informing your users and building trust.</li>
</ul>



<p><strong>Conclusion</strong><br>Cookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can impact customer confidence, distort your metrics and damage your image.</p>



<p><br>To remain competitive and protect your digital ecosystem, it is essential to take a proactive approach: secure your customer journeys, integrate anti-fraud solutions, and inform your users. <strong>Protecting cookies means protecting your business and your reputation.</strong></p>



<p><br><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Contact us to secure your customer journeys and build trust in your services.</p><p>The post <a href="https://www.oneytrust.com/es/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/">Cookies: a marketing ally… but also a loophole for fraud</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Synthetic identities: the invisible fraud that costs billions</title>
		<link>https://www.oneytrust.com/es/synthetic-identities-the-invisible-fraud-that-costs-billions/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 26 Nov 2025 16:50:02 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[identitesynthetique]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[syntheticidentity]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3621</guid>

					<description><![CDATA[<p>What is a synthetic identity? Unlike traditional identity theft, where the fraudster steals an entire real identity, a synthetic identity is a hybrid combination. It combines authentic data (in the United States, this is the social security number, while elsewhere it is usually the national identity document, date of birth and postal address) with invented...</p>
<p>The post <a href="https://www.oneytrust.com/es/synthetic-identities-the-invisible-fraud-that-costs-billions/">Synthetic identities: the invisible fraud that costs billions</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>What is a synthetic identity?</strong></p>



<p>Unlike traditional identity theft, where the fraudster steals an entire real identity, <strong>a synthetic identity is a hybrid combination</strong>. It combines <strong>authentic data</strong> (in the United States, this is the social security number, while elsewhere it is usually the national identity document, date of birth and postal address) with <strong>invented information</strong> (usually contact details). This combination creates a seemingly coherent profile, especially when only the so-called authentic data is verified/analysed (as in a banking KYC process, for example).</p>



<p>As a result, traditional systems, which are often calibrated to validate an identity by digitising traditional practices (‘your papers, please’), miss the mark.</p>



<p><strong>Why institutions are vulnerable ?</strong><br>Fraudsters exploit the trust placed in partially accurate data. In the United States, with a valid official ID or minimal credit history, synthetic identities pass the initial verification stages. <strong>The fraudster can then ‘mature’ their identity</strong>: open a bank account, take out small loans, make regular payments… until they obtain a solid credit rating. This patience pays off: once credibility is established, the fraudster takes out a larger loan and then disappears. This is known as ‘bust-out fraud’.</p>



<p><br>The cost is considerable: across the Atlantic, synthetic identity fraud already accounts for several billion dollars in losses each year, according to estimates by major firms. In Europe, the figures are beginning to follow the same trend, particularly with the rise of 100% digital processes.</p>



<p><strong>The limitations of traditional approaches</strong><br>Traditional controls – document verification, historical scoring, ad hoc analysis of events or transactions – struggle to detect these hybrid profiles. Weak signals (email username, telephone number attributes, presence of ‘digital footprints’) can only be detected through rare expertise. Furthermore, current regulations focus almost exclusively on KYC compliance. However, control and fraud prevention are two distinct things. The former encompasses all the characteristics/steps that allow access to a service… but because all of this is exposed, it also makes it possible to understand and therefore circumvent the measures.</p>



<p><strong>Towards a new approach to detection</strong><br>Faced with this threat, companies must change their paradigm. The future lies in solutions capable of:</p>



<ul class="wp-block-list">
<li>Going beyond ‘declarative’ data by being able to add additional information.</li>



<li>Cross-reference dynamic signals (browsing behaviour, machine fingerprint, location) with static identity attributes.</li>



<li>Detect relational inconsistencies between different identities: shared telephone numbers, recycled addresses, accounts linked to the same device.</li>



<li>Use artificial intelligence to analyse massive volumes of data/information in real time and identify patterns invisible to the human eye.</li>
</ul>



<p>These approaches transform detection: moving from simple documentary/contextual validation to a holistic and behavioural view of the user.</p>



<p><strong>A strategic challenge for digital players</strong><br>Synthetic identities are not a marginal phenomenon: they <strong>directly threaten profitability, regulatory compliance and customer trust. </strong>For banks, e-merchants and insurers, investing in advanced prevention technologies is no longer an option: it is <strong>a condition for survival in the digital economy.</strong></p>



<p></p><p>The post <a href="https://www.oneytrust.com/es/synthetic-identities-the-invisible-fraud-that-costs-billions/">Synthetic identities: the invisible fraud that costs billions</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</title>
		<link>https://www.oneytrust.com/es/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Sun, 26 Oct 2025 20:16:36 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[gdpr]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[rgpd]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3427</guid>

					<description><![CDATA[<p>Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data. Its objectives: For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history,...</p>
<p>The post <a href="https://www.oneytrust.com/es/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/">GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol class="wp-block-list">
<li><strong>The GDPR, a structured framework for data protection</strong></li>
</ol>



<p>Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data.</p>



<p>Its objectives:</p>



<ul class="wp-block-list">
<li>Strengthen the rights of European citizens.</li>



<li>To make companies more accountable in their use of data.</li>



<li>To harmonise rules within the European Union.</li>
</ul>



<p>For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history, etc.). The GDPR therefore requires a balance between security, performance and respect for individual freedoms.</p>



<ol start="2" class="wp-block-list">
<li><strong>A legacy of innovation and security with our historic CNIL authorisation</strong></li>
</ol>



<p>Long before the GDPR came into force, Oneytrust had already adopted this approach to compliance.</p>



<p>In fact, we benefited from <strong>a historic agreement (FIA-NET in 2005 and Oney Tech in 2013) with the CNIL, authorising the pooling of our customers&#8217; data, mainly in the e-commerce sector, subject to guarantees of privacy.</strong> Oneytrust has thus become the only French player to benefit from such extensive experience in data sharing, spanning more than 20 years.</p>



<p>This authorisation, developed in collaboration with the supervisory authority, has made it possible to:</p>



<ul class="wp-block-list">
<li>To significantly streamline the journey time for customers already known in our database,</li>



<li>To identify anomalies and fraud trends more effectively by relying on velocity and using our fraud experts to make decisions,</li>



<li>To protect both consumers and merchants,</li>



<li>while ensuring a high level of personal data security.</li>
</ul>



<p>This expertise was even <a href="https://www.cnil.fr/sites/default/files/atoms/files/cnil_livre_blanc_2-paiement.pdf">cited by the CNIL in its 2021 White Paper</a>, proof of the added value and pioneering nature of our approach.</p>



<ol start="3" class="wp-block-list">
<li><strong>A stronger internal GDPR culture</strong></li>
</ol>



<p>The implementation of the GDPR marked a new stage: beyond technical measures, we focused on fostering an internal culture of compliance.</p>



<p>At Oneytrust, every employee plays a role in data protection, thanks in particular to:</p>



<ul class="wp-block-list">
<li>mandatory annual training,</li>



<li>regular awareness campaigns and monthly newsletters,</li>



<li>the systematic involvement of our Data Protection Officer (DPO) and compliance team in our projects,</li>



<li>the implementation of a data protection impact assessment on all our projects that have a structural impact on personal data,</li>



<li>a continuous improvement process to adapt our practices to regulatory changes.</li>
</ul>



<p>This collective effort means that compliance is not only perceived as a legal and regulatory issue by our teams, but more as <strong>a shared value in our daily work, by design, and acts as a differentiating factor for Oneytrust in a landscape of anti-fraud players</strong>, many of whom are based outside Europe.</p>



<ol start="4" class="wp-block-list">
<li><strong>Enhanced security thanks to our membership of a major banking group</strong></li>
</ol>



<p>Our membership of the BPCE group, France&#8217;s second-largest banking group, imposes particularly high standards in terms of security and compliance. Banking institutions are subject not only to horizontal regulations but also to numerous sector-specific regulations due to the critical nature of their activities.</p>



<p>This is reflected in particular by Oneytrust&#8217;s active participation in the Oney group&#8217;s DPO community, where we share best practices and regulatory monitoring, the implementation and execution of ongoing internal controls (quarterly, half-yearly, annual) that require the commitment of all our teams, and the integration of banking standards into our contractual processes (GDPR annexes, security clauses). All this is coupled with advanced technical measures: regular security tests, data flow security, etc.</p>



<p>Oneytrust&#8217;s commitments reinforce the robustness of our systems and the trust placed in us by our customers, placing compliance by design at the heart of our decision-making processes and projects.</p>



<ol start="5" class="wp-block-list">
<li><strong>Data protection: a key lever in the fight against fraud</strong></li>
</ol>



<p>Trust is the cornerstone of the fight against fraud. Consumers and businesses alike must be assured that their data is protected, even in the most sensitive contexts.</p>



<p><strong>At Oneytrust, we consider compliance with the GDPR to be a strategic weapon</strong>. We see it as an opportunity: an opportunity to legitimise our role as a trusted intermediary, to ensure that the fight against fraud is conducted in a manner that respects individual freedoms and privacy, while also preparing for the future.</p>



<p>Indeed, with the proliferation of artificial intelligence applications, new challenges are emerging. In order to counter the increasingly widespread use of AI by fraudsters, it has become essential for those involved in the fight against fraud to increase their use of AI. This allows us to remain adaptable and effective in the face of these new fraud trends.</p>



<p>However, AI makes extensive use of data, particularly personal data, and requires continuous development of protection and compliance measures. This is why the CNIL (the French supervisory authority responsible for enforcing the GDPR) has already published several series of recommendations on the proper handling of personal data when using AI. These are new challenges that need to be fully taken into account by those involved in the fight against fraud!</p>



<p>In conclusion, for more than 25 years, Oneytrust has placed data protection at the heart of its anti-fraud measures. The GDPR should not be seen as a constraint, but rather as an opportunity to strengthen trust, protect our customers and guarantee ever more effective and responsible solutions.</p>



<p>In a context marked by the rise of artificial intelligence, this requirement has never been more essential. It guides our daily commitment: combining security, performance and respect for fundamental rights. <strong>Please do not hesitate to contact us if you have any questions about the security of our fraud prevention processes and solutions, including the protection of personal data!</strong></p><p>The post <a href="https://www.oneytrust.com/es/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/">GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MERLIN Network: the comeback!</title>
		<link>https://www.oneytrust.com/es/merlin-network-the-comeback/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Tue, 14 Oct 2025 08:32:04 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[fraudnetwork]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[MERLIN]]></category>
		<category><![CDATA[reseaufraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2534</guid>

					<description><![CDATA[<p>A well-oiled fraud scheme It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank...</p>
<p>The post <a href="https://www.oneytrust.com/es/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>A well-oiled fraud scheme</strong></p>



<p>It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank card to purchase the product from a legitimate retailer – one of our partners specialising in childcare products.</p>



<p><strong>The result:</strong> the customer receives their product, convinced they have got a good deal. But the retailer faces a bank dispute and will never be paid.</p>



<p><strong>Rapid detection, immediate response</strong></p>



<p>Thanks to a sudden spike in sales of this product, our models detected an anomaly: our analysts were immediately alerted.<strong> Expert rules were put in place for our teams in less than four hours! Less than 12 hours after detection, the network was neutralised.</strong> This efficiency is based on the synergy between our Data department and our Investigations unit.</p>



<ul class="wp-block-list">
<li><strong>Investigators</strong> analysed weak signals to reconstruct the modus operandi.</li>



<li><strong>Data analysts</strong> transformed these insights into enhanced security rules capable of blocking future attempts and monitoring network developments.</li>
</ul>



<p><strong>In-depth investigation: knowing your enemy</strong></p>



<p>The story does not end there. Our experts continued their investigation to gain an in-depth understanding of how the network operated:</p>



<ul class="wp-block-list">
<li><strong>Four ‘professional’ shops</strong> were identified on the marketplace, all registered under different company names – identity theft.</li>



<li>Active since March 2024, they generated hundreds of orders, exclusively for educational games.</li>



<li>The fraud network manipulated the platform&#8217;s algorithms to push his products to the top of search results, notably by offering lower prices than others.</li>
</ul>



<p><strong>The result:</strong> <strong>a few hundred pounds in damages, but thousands of pounds in fraud prevented.</strong> Enhanced security rules, seasoned investigators, and fraudulent shops closed. A healthier marketplace.</p>



<p><strong>The return of the Merlin network</strong></p>



<p>In February 2025, the network returned, more cunning than ever. This time, it targeted two other partners via a new marketplace, with different products: small electrical appliances. The cat-and-mouse game lasted until May 2025, with the opening of fake shops, changes in products and targeted retailers.</p>



<p>This new round required:</p>



<ul class="wp-block-list">
<li><strong>Constant monitoring</strong>,</li>



<li><strong>Regular updates to security rules</strong>,</li>



<li><strong>Ongoing training for our investigators</strong>,</li>



<li>And above all, <strong>close collaboration with our merchant partners</strong>, who are fully committed to this fight.</li>
</ul>



<p><strong>How can you protect yourself against triangular fraud?</strong></p>



<p>Here are the key levers for anticipating and blocking this type of fraud:</p>



<ol class="wp-block-list">
<li><strong>User awareness</strong>: Inform buyers and sellers about warning signs: prices that are too low, suspicious contacts, unusual payment requests.</li>



<li><strong>Identity verification</strong>: Strengthen controls on platforms: supporting documents, cross-checks, etc.</li>



<li><strong>Transaction monitoring</strong>: Implement analysis tools to detect abnormal behaviour and weak signals.</li>
</ol>



<p>Triangular fraud is a growing threat. But with the right tools, constant vigilance and active collaboration between all e-commerce players, it can be effectively contained.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/es/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 2</title>
		<link>https://www.oneytrust.com/es/digital-identity-the-new-identity-card-for-the-digital-age-part-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 01 Oct 2025 15:13:36 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2529</guid>

					<description><![CDATA[<p>a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges...</p>
<p>The post <a href="https://www.oneytrust.com/es/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol class="wp-block-list">
<li><strong>Multiple challenges</strong></li>
</ol>



<p><strong>a) Security and protection of citizens</strong></p>



<p><strong>The primary purpose of digital identity is protection</strong>. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks.</p>



<p><strong>b) Trust and fluidity of exchanges</strong></p>



<p>For a company, <strong>accepting a new customer involves a risk</strong>. Digital identity provides the necessary elements to establish a trust score: is this a real, consistent person who has been active for a long time? This trust then facilitates exchanges, reduces friction (simplified KYC, smooth user journey) and improves the customer experience.</p>



<p><strong>c) Sovereignty and independence</strong></p>



<p>Today, proving one&#8217;s identity online often involves major private players (connection via Google, Apple or Facebook). However, <strong>delegating this strategic function to a few companies poses a problem of sovereignty</strong>. European states are seeking to regain control in order to avoid excessive dependence and guarantee data protection.</p>



<p><strong>d) Inclusion and equal access</strong></p>



<p><strong>Digital identity must not become a factor of exclusion</strong>. People who are digitally excluded (the elderly, rural areas, vulnerable populations) must have access to simple and accessible solutions. Equity requires an inclusive design of these tools.</p>



<ol start="2" class="wp-block-list">
<li><strong>Future prospects</strong></li>
</ol>



<p>By 2030, digital identity could undergo three major developments:</p>



<p><strong>Increased standardisation</strong>: adoption of international standards enabling seamless recognition between countries and services.</p>



<p><strong>Biometric integration</strong>: enhanced association with biometric fingerprints (voice, face, fingerprint) to further secure access.</p>



<p><strong>Enhanced user control</strong>: emergence of solutions where users decide which elements of their identity to share, depending on the context (e.g. proving they are of legal age without revealing their date of birth).</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is no longer a technical curiosity. It has become the beating heart of digital societies. It protects, streamlines and empowers, but also raises questions about surveillance and sovereignty.</p>



<p>By understanding it, decision-makers and citizens have an essential lever for navigating a world where the virtual and the real are inseparable. Ultimately, <strong>digital identity is the identity card of the digital age: intangible but decisive, invisible but unavoidable</strong>.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/es/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 1</title>
		<link>https://www.oneytrust.com/es/digital-identity-the-new-identity-card-for-the-digital-age/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 24 Sep 2025 12:38:47 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2518</guid>

					<description><![CDATA[<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and...</p>
<p>The post <a href="https://www.oneytrust.com/es/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services.</p>



<p><strong>1 . Defining digital identity</strong>:</p>



<p>Unlike civil identity, which is established and certified by the state, digital identity takes many forms. It is based on four main dimensions:</p>



<ul class="wp-block-list">
<li><strong>Declarative data</strong>: surname, first name, email address, telephone number, address. This information is provided voluntarily, but can be misused/“imitated”.</li>



<li><strong>Technical fingerprints</strong>: each connected device generates a unique signature (IP address, configuration, sensors, time zones, cookies). These signals, invisible to the naked eye, become valuable clues for recognising a user.</li>



<li><strong>Behaviour</strong>: typing speed, connection times, location, frequency of service use. These elements are more difficult to falsify and constitute a behavioural signature that is almost biometric.</li>



<li><strong>Social and economic interactions</strong>: history of contact, payment and browsing data use. This data builds a coherent narrative… or, conversely, reveals inconsistencies typical of fraudulent events.</li>
</ul>



<ol start="2" class="wp-block-list">
<li><strong>An identity in flux</strong></li>
</ol>



<p>Unlike a national identity card, which is fixed at the time of issue, digital identity is dynamic. Every connection, every payment, every interaction enriches this digital portrait. This dynamic provides robustness – it is difficult to simulate a consistent digital life over time – but also raises ethical questions:</p>



<p>How much data should be collected without infringing on privacy?</p>



<p>How can we ensure that users retain control over their digital identity?</p>



<p>What safeguards should be put in place to prevent widespread surveillance?</p>



<p>The GDPR in Europe and the concept of ‘self-sovereign identity’ attempt to provide answers. But the balance between security, fluidity and respect for individual freedoms remains fragile.</p>



<ol start="3" class="wp-block-list">
<li><strong>Why has this concept become so important?</strong></li>
</ol>



<p>Two major trends explain its growing importance. .</p>



<ul class="wp-block-list">
<li><strong>Widespread digitalisation</strong>: smartphones have become our universal access point. From public services to healthcare, everything is now digital. Initiatives such as France Identité and the European eIDAS 2.0 regulation aim to create digital identities that are recognised at national and supranational level.</li>



<li><strong>A boom in 100% web-based crime</strong>: identity fraud is skyrocketing. The concept of ‘synthetic identity’ illustrates this trend. Fraudsters assemble pieces of real and invented data to create fake profiles capable of fooling traditional controls.</li>
</ul>



<p>In this context, the ability to assess the credibility of a digital identity is becoming strategic for banks, insurers, retailers and also for governments.</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is constantly evolving: shaped by our usage, regulated by legislation, scrutinised for its security and commercial value. But this dynamic is not without its challenges. In the second part, we will address the multiple issues it raises – security, trust, sovereignty, inclusion – and the prospects that could redefine our relationship with identity by 2030.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/es/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MERLIN network: anatomy of a triangular fraud</title>
		<link>https://www.oneytrust.com/es/merlin-network-anatomy-of-a-triangular-fraud-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Thu, 18 Sep 2025 16:06:27 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2454</guid>

					<description><![CDATA[<p>What is triangular fraud? Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly...</p>
<p>The post <a href="https://www.oneytrust.com/es/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading">What is triangular fraud?</h3>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="427" height="426" data-id="1702" src="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg" alt="" class="wp-image-1702" srcset="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg 427w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-400x399.jpg 400w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-12x12.jpg 12w" sizes="(max-width: 427px) 100vw, 427px" /></figure>
</figure>



<p>Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly and effectively.</p>



<p><strong>How triangular fraud works:</strong></p>



<p>The triangular fraud process can generally be broken down into four steps:</p>



<ol class="wp-block-list">
<li><strong>Creation of multiple identities</strong>: fraudsters begin by creating synthetic identities by combining real and fictitious information from real customer information received during purchases on their website. This allows them to generate credible buyer profiles that can interact with sellers without arousing suspicion.</li>



<li><strong>Ordering products</strong>: using these identities, fraudsters place orders with legitimate sellers. Payment is often made with stolen or misused credit cards.</li>



<li><strong>Reshipping products</strong>: the purchased products are shipped to intermediate addresses or directly to the ‘real customer’ depending on the method used. At this stage, fraudsters may also sell the stolen products to real buyers via online platforms at a reduced price.</li>



<li><strong>Cash-out</strong>: Fraudsters cash out payments from genuine buyers, while the original seller remains unpaid or faces a chargeback.</li>
</ol>



<p><strong>Why is triangular fraud effective?</strong></p>



<p>Triangular fraud is particularly effective because of its networked approach, which allows fraudsters to separate the elements of the transaction. The initial seller believes they are interacting with a legitimate buyer, while the final buyer thinks they are getting a product at a bargain price. This separation makes detection difficult, as individual transactions may appear legitimate because the information used is real, long-standing and sometimes even shows healthy activity. Traditional security rules are unable to detect these weak signals of fraud.</p>



<p><strong>The MERLIN network</strong></p>



<p>At Oneytrust, we are constantly detecting new fraudulent schemes. One of the most telling recent cases is that of a network we have named ‘Merlin’ because it used products from this brand to carry out its attacks. Detected in June 2024, this network perfectly illustrates the complexity and evolution of today&#8217;s threats.</p>



<p>It all started with <strong>an alert about unusual purchases</strong>: a sharp increase in orders for Merlin educational games, worth less than £100, from a partner specialising in childcare products. This sudden spike immediately caught our attention.</p>



<p>Our experts quickly spotted <strong>similarities between the orders</strong>, suggesting the existence of an organised network. However, certain elements were puzzling: the digital identities appeared reliable, and some profiles even belonged to real customers – but with a different email address. This was a clear sign of <strong>identity theft</strong>, which is rare for such small amounts.</p>



<p>To remove any doubt, we contacted the customers concerned. All confirmed their identity… but denied having made these purchases. The fraud was now certain. A thorough discussion with one of them revealed the key: he had indeed purchased the product, but on an online marketplace, not from our partner. The evidence provided enabled us to identify the fraudulent shop and understand the modus operandi: <strong>a triangular fraud</strong>.</p>



<p>Once the pattern had been established, our analysts listed <strong>the common signals associated with suspicious orders</strong> and created specific security rules. Thanks to these targeted actions, reinforced by direct checks with customers, we were able to block transactions linked to this network. <strong>The result: in less than 12 hours, the ‘Merlin’ network was neutralised.</strong></p>



<p>This case shows how essential <strong>the responsiveness and expertise of our teams are in stopping new fraud networks as soon as they emerge</strong>. And the story of ‘Merlin’ is only just beginning… we will tell you more very soon.</p><p>The post <a href="https://www.oneytrust.com/es/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>