<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Julie Breton, Author at Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/nl/author/julie-breton/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/nl/author/julie-breton/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastbuilddate>Fri, 20 Mar 2026 10:49:57 +0000</lastbuilddate>
	<language>nl-NL</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>Julie Breton, Author at Oneytrust</title>
	<link>https://www.oneytrust.com/nl/author/julie-breton/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Refund fraud: when AI becomes a tool for fraudsters…</title>
		<link>https://www.oneytrust.com/nl/fraude-remboursement-ia-generative/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 20 Mar 2026 10:49:55 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[AI ACT]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[Fraud prevention]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3802</guid>

					<description><![CDATA[<p>A phenomenon that TF1 recently highlighted in its 8pm news report, in which Oneytrust was able to share its expertise and shed light on these new fraudulent practices. 🚨 Fraud is evolving rapidly thanks to generative AI Fraudsters now have access to technologies that were once the preserve of experts. It takes just a few...</p>
<p>The post <a href="https://www.oneytrust.com/nl/fraude-remboursement-ia-generative/">Refund fraud: when AI becomes a tool for fraudsters…</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A phenomenon that TF1 recently highlighted in its 8pm news report, in which Oneytrust was able to share its expertise and shed light on these new fraudulent practices.</p>



<figure class="wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="TF1-oneytrust mars2026" src="https://player.vimeo.com/video/1172835019?dnt=1&amp;app_id=122963" width="720" height="405" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share" referrerpolicy="strict-origin-when-cross-origin"></iframe>
</div></figure>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f6a8.png" alt="🚨" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Fraud is evolving rapidly thanks to generative AI</strong></p>



<p>Fraudsters now have access to technologies that were once the preserve of experts. It takes just a few clicks to generate:</p>



<ul class="wp-block-list">
<li><strong>doctored images</strong> of products “supposedly” broken,</li>



<li><strong>forged supporting documents</strong>,</li>



<li>and well-crafted <strong>synthetic identities</strong></li>
</ul>



<p>As TF1 explains, private sellers are now facing disputes based on AI-manipulated photos, with automated systems sometimes turning against the honest victim themselves.</p>



<p>One user interviewed recounted losing €180 due to an AI-generated image showing a supposedly broken vinyl record — an item that, by its very nature, does not break in that way. The platform’s automated system, however, ruled in favour of the fraudster, illustrating the vulnerability of traditional checks.</p>



<p>This phenomenon is part of a global trend: fraud involving doctored images is skyrocketing, with a 15% increase in falsified images in claims since the start of 2025.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f4c8.png" alt="📈" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Three major trends observed by Oneytrust</strong></p>



<p>At Oneytrust, our experts have identified three major shifts:</p>



<ol class="wp-block-list">
<li><strong>More sophisticated fraud</strong></li>
</ol>



<p>Generative AI can produce highly realistic images, some of which are impossible to distinguish with the naked eye. Synthetic identities or invoices recreated pixel by pixel can fool traditional verification systems.</p>



<ol start="2" class="wp-block-list">
<li><strong>The industrialisation of attempts</strong></li>
</ol>



<p>What was once manual work is now automated. Fraudsters are now launching vast, coordinated campaigns, drastically increasing the volume of attempts detected on e-commerce sites.<br>This industrialisation is confirmed by the TF1 report, which warns of waves of scams potentially affecting millions of people.</p>



<ol start="3" class="wp-block-list">
<li><strong>New weak signals</strong></li>
</ol>



<p>Traditional methods are no longer sufficient. When evidence is generated by AI, behaviour, metadata and contextual inconsistencies become the new areas of analysis.</p>



<p><br><strong><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> AI: an essential tool for countering these new attacks</strong></p>



<p>With fraudsters now using AI, anti-fraud solutions must evolve. That is why Oneytrust has integrated advanced artificial intelligence models at the heart of its technologies.</p>



<p>In particular, our systems enable us to:</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Detect behavioural and contextual inconsistencies</strong></p>



<p>Frequency of returns, unusual histories, multiple addresses or devices: the patterns speak for themselves.<br>Our solution cross-references these signals to identify abuse well before it becomes visibly repetitive.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /><strong> Adapt in real time</strong></p>



<p>Fraud methods change every week. Our models continuously recalibrate to keep pace with these changes and block emerging attacks.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Identify organised networks</strong></p>



<p>By analysing data structure and correlating identity details, devices and network history, Oneytrust exposes organised criminal groups operating under different identities or accounts.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Tailor detection to your returns processes</strong></p>



<p>Oneytrust adapts precisely to each retailer’s returns policies and internal workflows, incorporating their rules, thresholds and operational specifics.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f91d.png" alt="🤝" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>The real challenge: maintaining trust</strong></p>



<p>In this context, the issue is no longer simply about blocking fraud.<br>It is about <strong>protecting the relationship of trust </strong>between retailers and their customers.</p>



<p>Excessive suspicion can damage the shopping experience. Being too permissive can encourage abuse and undermine business models. The balance is therefore delicate — and AI plays a crucial role in accurately distinguishing between:</p>



<ul class="wp-block-list">
<li>honest shoppers,</li>



<li>opportunistic fraudsters,</li>



<li>and organised criminal networks.</li>
</ul>



<p>Oneytrust is committed to maintaining this balance by combining cutting-edge technology with human expertise.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f52e.png" alt="🔮" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Fraud and AI: a huge challenge… but far from insurmountable</strong></p>



<p>Artificial intelligence has profoundly transformed the landscape of reimbursement fraud. Whilst it provides fraudsters with new tools, it further enhances companies’ ability to detect and stop them.</p>



<p>With ongoing investment, increasingly sophisticated models and greater collaboration across the entire ecosystem, this battle is not only possible, but winnable.</p>



<p>Trust is one of the cornerstones of online commerce. Together, let’s continue to protect it.</p><p>The post <a href="https://www.oneytrust.com/nl/fraude-remboursement-ia-generative/">Refund fraud: when AI becomes a tool for fraudsters…</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Act and Fraud Prevention : why the market must prepare</title>
		<link>https://www.oneytrust.com/nl/ai-act-2026-lutte-contre-la-fraude/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 27 Feb 2026 18:21:43 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[AI ACT]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[Fraud prevention]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3747</guid>

					<description><![CDATA[<p>Find out how Oneytrust is preparing to comply with this new text, which is just as crucial as the GDPR was in its day! The text defines an AI system very broadly as a ‘machine-based system, operating with varying degrees of autonomy, capable of adapting after deployment and which, for explicit or implicit purposes, deduces...</p>
<p>The post <a href="https://www.oneytrust.com/nl/ai-act-2026-lutte-contre-la-fraude/">AI Act and Fraud Prevention : why the market must prepare</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><br>Find out how Oneytrust is preparing to comply with this new text, which is just as crucial as the GDPR was in its day!</p>



<ol class="wp-block-list">
<li><strong>The new broad definition of an ‘AI system’</strong></li>
</ol>



<p>The text defines an AI system very broadly as a ‘machine-based system, operating with varying degrees of autonomy, capable of adapting after deployment and which, for explicit or implicit purposes, deduces from data how to generate results (predictions, content, recommendations, decisions) that influence physical or virtual environments’.</p>



<p>This broad technological scope is complex to implement operationally, but the market agrees that it encompasses sophisticated approaches such as machine learning (ML), hybrid expert rule + machine learning approaches, and advanced optimisation.</p>



<p>With the proliferation of AI use by fraudsters, trusted anti-fraud companies such as Oneytrust will need to further develop their range of AI solutions to power their scoring, behavioural alerting and anomaly analysis engines in order to keep up with the times and identify increasingly sophisticated fraud patterns.</p>



<ol start="2" class="wp-block-list">
<li><strong>Risks: where does fraud detection fit in?</strong></li>
</ol>



<p>The AI Act classifies certain uses as ‘high risk’ (critical biometrics, employment, education, access to essential services such as credit scoring, health insurance pricing, etc.). These systems are authorised but must be accompanied by a very sophisticated risk management system and an assessment of their compliance before being placed on the market.</p>



<p>One notable exception is that AI used to detect financial fraud is not automatically considered ‘high risk’. This reduces the direct regulatory burden, but does not remove the expectations of transparency, data quality and human oversight that regulated institutions contractually pass on to their subsidiaries and suppliers (such as Oneytrust).</p>



<ol start="3" class="wp-block-list">
<li><strong>What are the key dates to remember?</strong></li>
</ol>



<p>The main requirements of the AI Act will come into force in stages. Here are the key dates to remember:</p>



<ul class="wp-block-list">
<li><strong>2 February 2025</strong>: entry into force of the ‘unacceptable risk’ prohibitions + AI literacy requirement (awareness/training for staff involved in AI).</li>



<li><strong>2 August 2025</strong>: obligations for general-purpose AI models (GPAI) begin to apply (generative AI).</li>



<li><strong>2 February 2026</strong>: European deadline for certain implementing acts (post-market surveillance plans).</li>



<li><strong>2 August 2026</strong>: obligations for high-risk AI systems.</li>



<li><strong>August 2027</strong>: general application of all provisions of the regulation.</li>
</ul>



<ol start="4" class="wp-block-list">
<li><strong>Why prepare even if you are not ‘high risk’?</strong></li>
</ol>



<p>Fraudsters are becoming industrialised with AI. Deepfakes, fake documents, automated attack scripts, automated use of synthetic identities: fraud is scaling up. Those involved in the fight against fraud must adapt quickly to these new trends.</p>



<p>Although fraud prevention is not explicitly considered high risk, it is essential to ensure that solutions respect the fundamental rights and privacy of customers and end users, whether in accordance with the GDPR or the AI Act. In addition, the expectations of regulated partners (mainly in the banking sector) are increasingly high, as they are subject to sector-specific requirements that demand traceability, good documentation and heightened vigilance regarding the quality of the data used to satisfy their supervisors.</p>



<ol start="5" class="wp-block-list">
<li><strong>The Oneytrust response</strong></li>
</ol>



<p>Oneytrust provides identity verification and fraud detection solutions for e-merchants, fintechs and banks, relying on AI solutions coupled with our 25 years of human expertise in fraud prevention to detect synthetic identities, transactional anomalies and risk signals in real time. We are members of the BPCE Group, which drives us to high standards of compliance and model governance.<sup data-fn="5de12d73-b305-46c7-8f46-0517b019a95f" class="fn"><a id="5de12d73-b305-46c7-8f46-0517b019a95f-link" href="#5de12d73-b305-46c7-8f46-0517b019a95f">1</a></sup></p>



<p>As with the GDPR, we did not wait to cultivate our expertise on the AI Act and have been raising awareness and training our staff on these new compliance issues for several years. <strong>Contact us if you would like to learn more about Oneytrust&#8217;s vision for AI compliance and risk management!</strong></p><p>The post <a href="https://www.oneytrust.com/nl/ai-act-2026-lutte-contre-la-fraude/">AI Act and Fraud Prevention : why the market must prepare</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Weak signals: those little-noticed details that reveal the authenticity of a digital identity</title>
		<link>https://www.oneytrust.com/nl/signaux-faibles-identite-digitale/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Thu, 19 Feb 2026 08:21:03 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[identité digitale]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[signaux faibles]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3733</guid>

					<description><![CDATA[<p>Modern fraudsters no longer break down doors; they enter with the right keys. Valid credentials, recognized devices, credible customer journeys: everything seems normal. And yet, something is wrong. That something is weak signals. What is a weak signal in digital identity? A weak signal, as its name suggests, is not a red alert. It is...</p>
<p>The post <a href="https://www.oneytrust.com/nl/signaux-faibles-identite-digitale/">Weak signals: those little-noticed details that reveal the authenticity of a digital identity</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><br>Modern fraudsters no longer break down doors; they enter with the right keys. Valid credentials, recognized devices, credible customer journeys: everything seems normal. And yet, something is wrong.</p>



<p>That something is weak signals.</p>



<p><strong>What is a weak signal in digital identity?</strong></p>



<p>A weak signal, as its name suggests, is not a red alert. It is a detail. A micro-anomaly. An almost invisible (or rather ignored) inconsistency taken in isolation, but which takes on its full meaning when correlated with other elements.</p>



<p>For example:</p>



<ul class="wp-block-list">
<li>a known device… but whose technical fingerprint has changed slightly;</li>



<li>a connection from a usual city… at a completely atypical time;</li>



<li>correct keystrokes… but with an unusual rhythm;</li>



<li>a smooth user journey… but traveled at a speed too fast to be human.</li>
</ul>



<p>None of these elements alone is sufficient to justify blocking an event. But together, they tell a different story from what the declarative data would suggest.</p>



<p><strong>Why strong signals are no longer enough</strong></p>



<p>Historically, security relied on binary elements: correct password, validated SMS code, recognized device.</p>



<p>The problem? These proofs can be stolen, intercepted, or simulated.</p>



<p>Malware, phishing, massive data leaks, and automation tools have turned credentials into mere raw material for fraudsters. Even strong authentication is no longer foolproof against real-time proxy attacks or remote takeover.</p>



<p>The result: a user can tick all the boxes for legitimacy while still being a fraudster. This is precisely where weak signals become decisive.</p>



<p><strong>Weak signals reveal behavior, not a declared identity</strong></p>



<p>A declared identity can be falsified. Behavior is much more difficult to fake.</p>



<p>Weak signals allow us to answer not the question “Is this information correct?” but “Does this behavior resemble that of a legitimate human being in this specific context?”</p>



<p>This leads us to a dynamic interpretation of digital identity, based on the consistency of habits, the continuity of interactions, and the logic of sequences of actions.</p>



<p><br><strong>From isolated events to behavioral history</strong></p>



<p>The true power of weak signals lies not in a snapshot, but in duration.</p>



<p>A strange connection may be insignificant. Two anomalies close together begin to raise questions. A series of micro-deviations paints a picture of fraud.</p>



<p>It is by connecting these dots that we move from one-off checks to continuous behavioral monitoring. Digital identity ceases to be a state and becomes an evolving probability.</p>



<p><br><strong>The challenge: detecting without degrading the experience</strong></p>



<p>Exploiting weak signals does not mean increasing friction.</p>



<p>The goal is to adapt the level of vigilance: request additional verification only when the risk increases, silently monitor suspicious behavior, and trigger enhanced controls on sensitive actions.</p>



<p>In other words: make security proportional to the actual risk.</p>



<p><strong>When email addresses become a weak signal</strong></p>



<p>Email addresses are often perceived as simple contact identifiers. However, they contain a wealth of information that is underestimated when analyzed from a semantic and behavioral perspective.</p>



<p>Let&#8217;s take two examples: marie.dupont@yahoo.fr and ma.rie_du.pont1567@gmail.com.</p>



<p>Both addresses are technically valid. Both can pass standard checks. But they don&#8217;t tell the same story.</p>



<p>Semantic analysis involves observing the structure, logic, and consistency of an email address in relation to the context declared by the user.</p>



<p>Discreet but telling clues may emerge: domain name, username composition, presence of promotional keywords, consistent or inconsistent series of numbers, unusual complexity, or recurrence of similar patterns observed in previous fraud cases.</p>



<p>Taken in isolation, none of these elements proves fraud. But they may indicate that an address was created quickly, en masse, or for purely transactional rather than relational purposes.</p>



<p>A real digital identity often leaves traces of continuity. Conversely, in many fraud scenarios, the email address is a disposable tool designed to pass a technical check, not to reflect a lasting identity.</p>



<p>Semantic analysis therefore allows us to answer a subtle question: does this address resemble a human point of contact or a functional artifact created for a specific scenario?</p>



<p>Once again, the value comes from correlation: unusually structured email, rapid account creation, device recently seen on other accounts, automated browsing. It is the aggregation of these weak signals that reveals a credible risk.</p>



<p><strong>From raw data to contextual intelligence</strong></p>



<p>Weak signals already exist in your systems: technical logs, browsing data, device metadata, action sequences.</p>



<p>The difference lies not in the quantity of data, but in the ability to correlate it in real time, contextualize it according to the journey, learn from past patterns, and detect subtle deviations.</p>



<p><strong>Digital identity is no longer a file, it is a flow</strong></p>



<p>For years, we treated identity as a file: static information to be verified once and for all.</p>



<p>Weak signals are forcing us to change our paradigm. Identity is becoming a continuous stream of behaviors, which are confirmed or degraded through interactions.</p>



<p><br><strong>Conclusion</strong></p>



<p>Major frauds rarely hide behind big anomalies. They are concealed in the details that we don&#8217;t look at.</p>



<p>Learning to read weak signals means accepting that the truth is no longer found in a single piece of evidence, but in the accumulation of micro-clues. In a world where identities can be fabricated, stolen, or rented, this subtle reading becomes one of the pillars of digital trust.</p><p>The post <a href="https://www.oneytrust.com/nl/signaux-faibles-identite-digitale/">Weak signals: those little-noticed details that reveal the authenticity of a digital identity</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Agentic AI  &#8211; what you need to know in 2026 </title>
		<link>https://www.oneytrust.com/nl/agentic-ai-what-you-need-to-know-in-2026/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Tue, 27 Jan 2026 15:50:50 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Agentic AI]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[fraud detection]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[fraude detection]]></category>
		<category><![CDATA[IA generation]]></category>
		<category><![CDATA[IA générative]]></category>
		<category><![CDATA[Intelligence artificielle]]></category>
		<category><![CDATA[lutte contre la fraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3706</guid>

					<description><![CDATA[<p>Agentic AI – autonomous systems that can observe, decide and act across multiple tools – is about to collide hard with European fraud and payments &#8211; on both sides of the fraud fight. For merchants and banks, the real story in 2026 won’t be “magic AI agents that make fraud disappear”, but a messy mix...</p>
<p>The post <a href="https://www.oneytrust.com/nl/agentic-ai-what-you-need-to-know-in-2026/">Agentic AI  &#8211; what you need to know in 2026 </a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Agentic AI – autonomous systems that can observe, decide and act across multiple tools – is about to collide hard with European fraud and payments &#8211; on both sides of the fraud fight. For merchants and banks, the real story in 2026 won’t be “magic AI agents that make fraud disappear”, but a messy mix of tougher regulation, smarter attackers, and more opaque vendor black boxes.&nbsp;</p>



<p>Across Europe <a href="https://info.merchantriskcouncil.org/hubfs/Documents/Reports/Fraud%20Reports/2025_Global_Fraud_and_Payments_Report.pdf">according the MRC</a> online merchants are already losing roughly 2.8% of revenue to fraud, with fraud representing about 3% of all orders. Identity fraud and account takeover are surging, fuelled in part by AI that can generate convincing fake identities and social-engineering scripts at scale according to UK fraud agency <a href="https://www.cifas.org.uk/newsroom/fraudscape-2025-6monthupdate">CIFAS</a>. Agentic AI simply supercharges that trend on both sides of the fence. </p>



<p>For merchants and finance companies though &#8211; there is a dilemma. Increasingly buyers and new customers will use AI to seek out and purchase goods and services,&nbsp;&nbsp;</p>



<p>From now you’ve basically got two new “customer segments” turning up in your data:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Legitimate agentic AI</strong> – shopping assistants, payment agents and aggregators acting on behalf of real people. </li>



<li><strong>Malicious agentic AI</strong> – computer-using agents hammering your sign-up flows, ID checks and checkouts at scale. </li>
</ul>



<p>The job for merchants and financial services providers is to work with their fraud detection companies to pick their way through this minefield. At Oneytrust we have been seeing this emerge over 2025 and like the rest of the world we anticipate a huge uptick in 2026.&nbsp;&nbsp;</p>



<p>So, what you do not want to block; agentic AI is already being used as a consumer interface for payments and shopping:&nbsp;</p>



<ul class="wp-block-list">
<li>A number of agentic AI options are <a href="https://www.ashurst.com/en/insights/ai-powered-payment-agents-the-next-payments-revolution/">emerging in Europe</a> like Mastercard “Agent Pay”, Visa “Intelligent Commerce”, Amazon “Buy for Me” and Google “Shop with AI”, where agents initiate payments within parameters set by the consumer </li>
</ul>



<ul class="wp-block-list">
<li>Payments players describe “agentic commerce” as AI agents that hold conditional permissions to shop and pay on a user’s behalf, functionally similar to cards-on-file or recurring payments but with a conversational UX and more decision-making according to Visa.  </li>
</ul>



<p>Regulators are behind the curve: PSD2 doesn’t mention AI, and even PSD3/PSR only references AI once for fraud prevention. But consumer agents are happening anyway.&nbsp;</p>



<p>For a merchant, that means some “bot traffic” is now high-value, compliant traffic (AI doing what a loyal customer asked it to do). These agents will often come from data-centre IPs, headless browsers or shared devices, and will reuse stored credentials and payment instruments &#8211; i.e. very similar to the bots you’ve spent so much time trying to deter.&nbsp;&nbsp;</p>



<p>If you block everything that looks like an agent, you’ll break this emerging channel and annoy the schemes, PSPs and big-tech partners driving it.&nbsp;</p>



<p><strong>How fraudsters are using agentic AI against merchants and banks </strong></p>



<p>Several trends are showing up in European and global reporting:&nbsp;</p>



<p>Credential stuffing &amp; ATO with Computer-Using Agents (CUAs).&nbsp;</p>



<p>According to <a href="https://pushsecurity.com/blog/how-new-ai-agents-will-transform-credential-stuffing-attacks/">a report by Push Security</a>,  OpenAI “Operator”-style CUAs shows they can log in to arbitrary web apps, read pages, click buttons and handle full flows like a human – but at bot scale. That lets attackers spray stolen credentials across thousands of sites and then perform in-app actions once they get in. </p>



<p>AI-scaled phishing and social engineering feeding into payments.&nbsp;</p>



<p><a href="https://www.europeanpaymentscouncil.eu/sites/default/files/kb/file/2025-12/EPC162-24%20v2.0%202025%20Payments%20Threats%20and%20Fraud%20Trends%20Report_0.pdf">The European Payments Council’s</a> 2025 threats report flags AI-generated phishing and deepfakes as a key enabler of APP fraud and impersonation scams, making language barriers vanish. </p>



<p>Account opening and synthetic ID at industrial scale.&nbsp;</p>



<p><a href="https://www.biocatch.com/blog/agentic-ai-the-next-wave-of-attacks">Financial-crime specialists</a> warn that agentic AI will be used to flood banks’ online onboarding with highly consistent, multi-step new account applications, reusing and recombining stolen or synthetic identity elements. </p>



<p>Payment fraud “speedruns”.&nbsp;</p>



<p><a href="https://www.biocatch.com/blog/agentic-ai-the-next-wave-of-attacks">Arkose Labs</a> talk about agents that skip normal browsing, go straight to high-value endpoints (card testing, gift cards, BNPL, high-ticket items), and adapt in real time if they hit friction. </p>



<p>Your ID and fraud stack is going to see AI agents trying to open accounts and make purchases 24/7, some benign, some absolutely not.&nbsp;</p>



<p><strong>Why classic bot defences aren’t enough </strong></p>



<p>The nasty twist, well-summed up by one recent fraud blog, is that beneficial and malicious agentic AI are technically indistinguishable at first glance. Both:&nbsp;</p>



<ul class="wp-block-list">
<li>Run in browsers or CUAs that move the mouse, scroll and click like humans. </li>



<li>Can introduce jitter into timings and keystrokes. </li>



<li>Can respect (or deliberately emulate) your UX flows. </li>
</ul>



<p>Old-school bot rules – “data-centre IP = block”, “too fast = bot”, “no mouse = bot” – are blunt instruments here and will kill legitimate payment agents along with attackers. You have to stop thinking “bot vs human” and start thinking in terms of intent and pattern at the identity, device and journey level&nbsp;</p>



<p><strong>How to tell good agents from bad ones </strong></p>



<p>For merchants and banks using an ID+fraud provider like Oneytrust, the detection strategy for this use case looks roughly like this.&nbsp;</p>



<p>Treat “agent” as its own identity class&nbsp;</p>



<p>First step is to explicitly model agent traffic:&nbsp;</p>



<p>Tag sessions where the user agent, device behaviour or integration pattern clearly indicates an AI or automation layer.&nbsp;</p>



<p>Maintain separate risk baselines for:&nbsp;</p>



<p>Human sessions&nbsp;</p>



<p>First-party agents (your own app’s automation)&nbsp;</p>



<p>Trusted third-party agents (big-tech payments, official partners and the new AI purchase agents listed above)&nbsp;</p>



<p>Unknown / suspicious agents&nbsp;</p>



<p>Legitimate agents tend to be stable over time – same provider, similar IP ranges, same small set of identities, and predictable timing &#8211; the same as legitimate people. Malicious agents show sprawl across identities, merchants and institutions &#8211; mimicking their fraudster creators.&nbsp;&nbsp;</p>



<p>Identity and data-level coherence&nbsp;</p>



<p>This is where your digital-identity layer comes into its own, <a href="https://www.oneytrust.com/it/industry/digital-identity/">Oneytrust’s own positioning is crystal clear</a>: as generative AI, deepfakes and synthetic ID fraud rise, static KYC checks are turning into security liabilities. D-Risk ID focuses on the contextual coherence of identity data (phone, email, device, address, etc.) and can cross-validate against a consortium of live, validated identities from major European retailers and banks. </p>



<p>Against agentic AI&nbsp;</p>



<p><a href="https://www.paymentsdive.com/news/how-agentic-ai-could-turbocharge-fraud-payments/804562/">Legitimate agents</a> will mostly reuse known, well-behaved identities: long history, normal spend patterns, consistent device history, strong matches in consortia data. </p>



<p>Malicious agents trying to mass-open accounts or test stolen identities will produce:&nbsp;</p>



<ul class="wp-block-list">
<li>Many first-seen identities in a short window. </li>



<li>Weak or no matches to real identity graphs. </li>



<li>Synthetic patterns (odd name/email combos, phone/email geography mismatch, disposable infrastructure). </li>
</ul>



<p>Your scoring should treat “new identity + agent session” as high-risk by default, unless the identity is clearly rooted in your consortium / historical data. The truth is that legitimate agents actually resemble patterns and identities of legitimate users. Phew!&nbsp;</p>



<p>Additionally, legitimate payment agents will often come from a small, stable fleet of devices with clear, contractual relationships. You can whitelist those patterns progressively once you’re confident they’re clean.&nbsp;</p>



<p>On-site behaviour&nbsp;</p>



<p>This is where malicious agentic AI really gives itself away.&nbsp;</p>



<p>Tell-tale patterns for malicious agents&nbsp; jump straight from entry to login/signup/payment without any browsing or hesitation; no content exploration, just form-filling. They can over-index on voucher/code entry, BNPL, gift cards, high-limit products – anything with a better payout per second. Again, they behave in very similar patterns to human fraudsters &#8211; just with greater velocity.&nbsp;&nbsp;</p>



<p>By contrast, legitimate consumer agents do read product content, compare options and respect user preferences set upstream. They often return to the same merchants and categories repeatedly, with low dispute/chargeback rates over time. You can create a pattern that recognises and allows good behaviour and agents just as you do for good buyers. &nbsp;</p>



<p>In short, your fraud stack should be able to distinguish “agent that behaves like a long-term customer proxy” versus “agent that behaves like a credential-stuffing script with a UI”.&nbsp;</p>



<ol class="wp-block-list">
<li><strong>Don’t outlaw automation; classify it. </strong></li>
</ol>



<p>Build explicit support for “trusted agent” traffic in your risk models instead of treating all non-human sessions as hostile.&nbsp;</p>



<p><strong>2. Tie everything back to a real identity. </strong></p>



<p>Lean hard on identity-graph and consortium data: if an agent is acting for identities you can’t anchor in the real world, raise the bar sharply. Talk to Oneytrust about our graph networks. &nbsp;</p>



<p><strong>3. Use adaptive friction, not blanket blocks. </strong></p>



<p>For “new identity + agent + high-risk product”, default to extra verification: stronger SCA, additional ID checks, or out-of-band confirmation. <a href="https://www.techradar.com/pro/eu-clamps-down-on-online-fraud-and-hidden-fees-affecting-online-payment-platforms">EU rules under PSD3/PSR</a> are anyway pushing PSPs towards stronger screening and liability for impersonation fraud – merchants can ride that wave </p>



<p><strong>4. Align with EBA remote-onboarding guidance </strong></p>



<p>The <a href="https://www.eba.europa.eu/publications-and-media/press-releases/eba-publishes-guidelines-remote-customer-onboarding">EBA’s remote</a> onboarding guidelines demand robust, risk-sensitive processes for online account opening, including impersonation and ID-forgery controls. That’s your mandate to deploy deeper behavioural and identity checks on agent-driven account creation without breaking legitimate customers. </p>



<p><strong>5. Instrument and rate-limit flows that agents love </strong></p>



<p>Sign-up, login, password reset, payment-instrument addition and high-risk product applications should have fine-grained rate limits and anomaly detection specifically tuned for I have tidied up the document by standardizing the titles and headers, removing all numbering, and cleaning up the content based on your instructions.</p><p>The post <a href="https://www.oneytrust.com/nl/agentic-ai-what-you-need-to-know-in-2026/">Agentic AI  &#8211; what you need to know in 2026 </a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>E-commerce returns: between operational challenges and the risk of fraud, how Reversys and Oneytrust are reinventing reverse logistics</title>
		<link>https://www.oneytrust.com/nl/retour-ecommerce-defis-fraude-reversys-oneytrust/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Tue, 13 Jan 2026 08:50:04 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[fraude au retour]]></category>
		<category><![CDATA[fraude sur internet]]></category>
		<category><![CDATA[gestion des retours]]></category>
		<category><![CDATA[return abuse]]></category>
		<category><![CDATA[return fraud]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3641</guid>

					<description><![CDATA[<p>The operational challenge: managing the complexity of returns Each return involves several parties: customer service, warehouse, carrier. Too often, these systems operate in silos, leading to delays, errors and a poor customer experience. A parcel dropped off at a collection point may remain invisible to customer service, generating calls, frustration and late refunds. This is...</p>
<p>The post <a href="https://www.oneytrust.com/nl/retour-ecommerce-defis-fraude-reversys-oneytrust/">E-commerce returns: between operational challenges and the risk of fraud, how Reversys and Oneytrust are reinventing reverse logistics</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>The operational challenge: managing the complexity of returns</strong></p>



<p>Each return involves several parties: customer service, warehouse, carrier. Too often, these systems operate in silos, leading to delays, errors and a poor customer experience. A parcel dropped off at a collection point may remain invisible to customer service, generating calls, frustration and late refunds.</p>



<p>This is where <a href="https://reversys.fr/">Reversys</a> comes in. Its collaborative SaaS platform puts an end to this fragmentation by orchestrating the entire return flow, from online declaration to refund. It centralises information for all parties, ensures consistency of operations and offers unprecedented agility. E-merchants can customise their policies: immediately refund a VIP customer as soon as the parcel is dropped off, or wait for verification for a high-value product. This orchestration transforms returns into a strategic lever, capable of boosting satisfaction and loyalty.</p>



<p><strong>A rapidly growing phenomenon: return fraud</strong></p>



<p>But behind the operational complexity lies an even greater danger: fraud. With payments becoming more secure, fraudsters have shifted their attacks to returns. This phenomenon, known as <strong>return abuse</strong>, takes various forms: returns of used or worn products under the pretext of a defect, requests for refunds for products received but declared as undelivered, or exploitation of free or extended return policies.</p>



<p>The figures are clear and show a worrying trend. In 2023, <strong>13.7% of returns were deemed fraudulent, an increase of more than 10% in one year</strong>, according to Datadome. In 2024, <strong>40% of retailers reported being victims of return abuse</strong>, according to the 2025 Global Fraud and Payments Report by Visa / Cybersource.</p>



<p>What is even more worrying is that the majority of companies are not prepared. In 2021, <strong>nine out of ten companies feared an increase in the risk of fraud and cybercrime</strong>, but <strong>six out of ten had not allocated a specific budget to deal with it</strong> (Fevad/Euler Hermes). In other words, the threat is known, but the means to counter it remain insufficient.</p>



<p><strong>The answer: the Reversys x Oneytrust alliance</strong></p>



<p>To meet this dual challenge – operational and security – <a href="https://reversys.fr/article_partenariat-reversys-oneytrust-logistique-inverse-fraude/"><strong>Reversys and Oneytrust</strong> have joined forces</a>. Together, they offer a unique solution that combines intelligent orchestration and predictive risk analysis.</p>



<p>Reversys streamlines and personalises reverse logistics, while Oneytrust, the European leader in e-commerce fraud prevention, brings its expertise in behavioural scoring and proactive detection. As soon as a return is declared, Oneytrust assesses the risk in real time. Reversys uses this information to adjust its strategy: immediate refunds for reliable customers, enhanced checks for high-risk profiles, and selection of the most secure or economical carrier depending on the context.</p>



<p>This approach drastically reduces fraud while guaranteeing a premium experience for honest customers. It gives e-merchants back control over their returns, transforming a process often perceived as a constraint into a lever for performance and profitability.</p>



<p><strong>Did you know?</strong></p>



<p>By integrating Oneytrust&#8217;s reliability with Reversys&#8217; returns management, e-merchants can anticipate risks even before the parcel reaches the warehouse, thereby protecting their turnover and reputation.</p>



<p><strong>Is your company prepared to tackle return fraud?</strong> Discover how Reversys and Oneytrust can transform your reverse logistics ! <a href="https://www.oneytrust.com/fr/retour-ecommerce-defis-fraude-reversys-oneytrust/">Discover the solutions offered by Reversys</a>.</p><p>The post <a href="https://www.oneytrust.com/nl/retour-ecommerce-defis-fraude-reversys-oneytrust/">E-commerce returns: between operational challenges and the risk of fraud, how Reversys and Oneytrust are reinventing reverse logistics</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cookies: a marketing ally… but also a loophole for fraud</title>
		<link>https://www.oneytrust.com/nl/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 10 Dec 2025 16:39:57 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[cookies]]></category>
		<category><![CDATA[cybercirminalite]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[marketing]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3634</guid>

					<description><![CDATA[<p>Why are cookies such a prime target? The impact on your brand Examples of techniques used by fraudsters How to protect your digital ecosystem? ConclusionCookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can...</p>
<p>The post <a href="https://www.oneytrust.com/nl/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/">Cookies: a marketing ally… but also a loophole for fraud</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Why are cookies such a prime target?</strong></p>



<ul class="wp-block-list">
<li><strong>Easy to hijack</strong>: A stolen cookie can be enough to steal someone&#8217;s online identity.</li>



<li><strong>Rich in sensitive data</strong>: Usernames, sessions, preferences… all this information can be exploited for targeted attacks.</li>



<li><strong>Invisible to the user</strong>: Most internet users are unaware of the scope of the information stored, which facilitates fraud.</li>
</ul>



<p><strong>The impact on your brand</strong></p>



<ul class="wp-block-list">
<li><strong>Advertising fraud</strong>: Falsified cookies artificially inflate impressions and clicks, distorting your KPIs and increasing your costs.</li>



<li><strong>Session hijacking</strong>: Hackers can access customer accounts, generating fraudulent transactions.</li>



<li><strong>Reputational damage</strong>: A vulnerability exploited via cookies can damage your image and your GDPR compliance.</li>
</ul>



<p><strong>Examples of techniques used by fraudsters</strong></p>



<ul class="wp-block-list">
<li><strong>Session sniffing</strong>: Interception of cookies on unsecured websites.</li>



<li><strong>XSS injection</strong>: Malicious scripts to steal cookies.</li>



<li><strong>CSRF</strong>: Fraudulent actions performed without the user&#8217;s knowledge.</li>



<li><strong>Predictable credentials</strong>: Exploitation of weak algorithms to guess sessions.</li>
</ul>



<p><strong>How to protect your digital ecosystem?</strong></p>



<ul class="wp-block-list">
<li><strong>Proactive monitoring</strong>: Detecting anomalies in cookie-related behaviour.</li>



<li><strong>Advanced anti-fraud solutions</strong>: Identifying falsified or cloned cookies.</li>



<li><strong>Awareness and transparency</strong>: Informing your users and building trust.</li>
</ul>



<p><strong>Conclusion</strong><br>Cookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can impact customer confidence, distort your metrics and damage your image.</p>



<p><br>To remain competitive and protect your digital ecosystem, it is essential to take a proactive approach: secure your customer journeys, integrate anti-fraud solutions, and inform your users. <strong>Protecting cookies means protecting your business and your reputation.</strong></p>



<p><br><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Contact us to secure your customer journeys and build trust in your services.</p><p>The post <a href="https://www.oneytrust.com/nl/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/">Cookies: a marketing ally… but also a loophole for fraud</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Synthetic identities: the invisible fraud that costs billions</title>
		<link>https://www.oneytrust.com/nl/synthetic-identities-the-invisible-fraud-that-costs-billions/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 26 Nov 2025 16:50:02 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[identitesynthetique]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[syntheticidentity]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3621</guid>

					<description><![CDATA[<p>What is a synthetic identity? Unlike traditional identity theft, where the fraudster steals an entire real identity, a synthetic identity is a hybrid combination. It combines authentic data (in the United States, this is the social security number, while elsewhere it is usually the national identity document, date of birth and postal address) with invented...</p>
<p>The post <a href="https://www.oneytrust.com/nl/synthetic-identities-the-invisible-fraud-that-costs-billions/">Synthetic identities: the invisible fraud that costs billions</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>What is a synthetic identity?</strong></p>



<p>Unlike traditional identity theft, where the fraudster steals an entire real identity, <strong>a synthetic identity is a hybrid combination</strong>. It combines <strong>authentic data</strong> (in the United States, this is the social security number, while elsewhere it is usually the national identity document, date of birth and postal address) with <strong>invented information</strong> (usually contact details). This combination creates a seemingly coherent profile, especially when only the so-called authentic data is verified/analysed (as in a banking KYC process, for example).</p>



<p>As a result, traditional systems, which are often calibrated to validate an identity by digitising traditional practices (‘your papers, please’), miss the mark.</p>



<p><strong>Why institutions are vulnerable ?</strong><br>Fraudsters exploit the trust placed in partially accurate data. In the United States, with a valid official ID or minimal credit history, synthetic identities pass the initial verification stages. <strong>The fraudster can then ‘mature’ their identity</strong>: open a bank account, take out small loans, make regular payments… until they obtain a solid credit rating. This patience pays off: once credibility is established, the fraudster takes out a larger loan and then disappears. This is known as ‘bust-out fraud’.</p>



<p><br>The cost is considerable: across the Atlantic, synthetic identity fraud already accounts for several billion dollars in losses each year, according to estimates by major firms. In Europe, the figures are beginning to follow the same trend, particularly with the rise of 100% digital processes.</p>



<p><strong>The limitations of traditional approaches</strong><br>Traditional controls – document verification, historical scoring, ad hoc analysis of events or transactions – struggle to detect these hybrid profiles. Weak signals (email username, telephone number attributes, presence of ‘digital footprints’) can only be detected through rare expertise. Furthermore, current regulations focus almost exclusively on KYC compliance. However, control and fraud prevention are two distinct things. The former encompasses all the characteristics/steps that allow access to a service… but because all of this is exposed, it also makes it possible to understand and therefore circumvent the measures.</p>



<p><strong>Towards a new approach to detection</strong><br>Faced with this threat, companies must change their paradigm. The future lies in solutions capable of:</p>



<ul class="wp-block-list">
<li>Going beyond ‘declarative’ data by being able to add additional information.</li>



<li>Cross-reference dynamic signals (browsing behaviour, machine fingerprint, location) with static identity attributes.</li>



<li>Detect relational inconsistencies between different identities: shared telephone numbers, recycled addresses, accounts linked to the same device.</li>



<li>Use artificial intelligence to analyse massive volumes of data/information in real time and identify patterns invisible to the human eye.</li>
</ul>



<p>These approaches transform detection: moving from simple documentary/contextual validation to a holistic and behavioural view of the user.</p>



<p><strong>A strategic challenge for digital players</strong><br>Synthetic identities are not a marginal phenomenon: they <strong>directly threaten profitability, regulatory compliance and customer trust. </strong>For banks, e-merchants and insurers, investing in advanced prevention technologies is no longer an option: it is <strong>a condition for survival in the digital economy.</strong></p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/synthetic-identities-the-invisible-fraud-that-costs-billions/">Synthetic identities: the invisible fraud that costs billions</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</title>
		<link>https://www.oneytrust.com/nl/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Sun, 26 Oct 2025 20:16:36 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[gdpr]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[rgpd]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3427</guid>

					<description><![CDATA[<p>Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data. Its objectives: For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history,...</p>
<p>The post <a href="https://www.oneytrust.com/nl/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/">GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol class="wp-block-list">
<li><strong>The GDPR, a structured framework for data protection</strong></li>
</ol>



<p>Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data.</p>



<p>Its objectives:</p>



<ul class="wp-block-list">
<li>Strengthen the rights of European citizens.</li>



<li>To make companies more accountable in their use of data.</li>



<li>To harmonise rules within the European Union.</li>
</ul>



<p>For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history, etc.). The GDPR therefore requires a balance between security, performance and respect for individual freedoms.</p>



<ol start="2" class="wp-block-list">
<li><strong>A legacy of innovation and security with our historic CNIL authorisation</strong></li>
</ol>



<p>Long before the GDPR came into force, Oneytrust had already adopted this approach to compliance.</p>



<p>In fact, we benefited from <strong>a historic agreement (FIA-NET in 2005 and Oney Tech in 2013) with the CNIL, authorising the pooling of our customers&#8217; data, mainly in the e-commerce sector, subject to guarantees of privacy.</strong> Oneytrust has thus become the only French player to benefit from such extensive experience in data sharing, spanning more than 20 years.</p>



<p>This authorisation, developed in collaboration with the supervisory authority, has made it possible to:</p>



<ul class="wp-block-list">
<li>To significantly streamline the journey time for customers already known in our database,</li>



<li>To identify anomalies and fraud trends more effectively by relying on velocity and using our fraud experts to make decisions,</li>



<li>To protect both consumers and merchants,</li>



<li>while ensuring a high level of personal data security.</li>
</ul>



<p>This expertise was even <a href="https://www.cnil.fr/sites/default/files/atoms/files/cnil_livre_blanc_2-paiement.pdf">cited by the CNIL in its 2021 White Paper</a>, proof of the added value and pioneering nature of our approach.</p>



<ol start="3" class="wp-block-list">
<li><strong>A stronger internal GDPR culture</strong></li>
</ol>



<p>The implementation of the GDPR marked a new stage: beyond technical measures, we focused on fostering an internal culture of compliance.</p>



<p>At Oneytrust, every employee plays a role in data protection, thanks in particular to:</p>



<ul class="wp-block-list">
<li>mandatory annual training,</li>



<li>regular awareness campaigns and monthly newsletters,</li>



<li>the systematic involvement of our Data Protection Officer (DPO) and compliance team in our projects,</li>



<li>the implementation of a data protection impact assessment on all our projects that have a structural impact on personal data,</li>



<li>a continuous improvement process to adapt our practices to regulatory changes.</li>
</ul>



<p>This collective effort means that compliance is not only perceived as a legal and regulatory issue by our teams, but more as <strong>a shared value in our daily work, by design, and acts as a differentiating factor for Oneytrust in a landscape of anti-fraud players</strong>, many of whom are based outside Europe.</p>



<ol start="4" class="wp-block-list">
<li><strong>Enhanced security thanks to our membership of a major banking group</strong></li>
</ol>



<p>Our membership of the BPCE group, France&#8217;s second-largest banking group, imposes particularly high standards in terms of security and compliance. Banking institutions are subject not only to horizontal regulations but also to numerous sector-specific regulations due to the critical nature of their activities.</p>



<p>This is reflected in particular by Oneytrust&#8217;s active participation in the Oney group&#8217;s DPO community, where we share best practices and regulatory monitoring, the implementation and execution of ongoing internal controls (quarterly, half-yearly, annual) that require the commitment of all our teams, and the integration of banking standards into our contractual processes (GDPR annexes, security clauses). All this is coupled with advanced technical measures: regular security tests, data flow security, etc.</p>



<p>Oneytrust&#8217;s commitments reinforce the robustness of our systems and the trust placed in us by our customers, placing compliance by design at the heart of our decision-making processes and projects.</p>



<ol start="5" class="wp-block-list">
<li><strong>Data protection: a key lever in the fight against fraud</strong></li>
</ol>



<p>Trust is the cornerstone of the fight against fraud. Consumers and businesses alike must be assured that their data is protected, even in the most sensitive contexts.</p>



<p><strong>At Oneytrust, we consider compliance with the GDPR to be a strategic weapon</strong>. We see it as an opportunity: an opportunity to legitimise our role as a trusted intermediary, to ensure that the fight against fraud is conducted in a manner that respects individual freedoms and privacy, while also preparing for the future.</p>



<p>Indeed, with the proliferation of artificial intelligence applications, new challenges are emerging. In order to counter the increasingly widespread use of AI by fraudsters, it has become essential for those involved in the fight against fraud to increase their use of AI. This allows us to remain adaptable and effective in the face of these new fraud trends.</p>



<p>However, AI makes extensive use of data, particularly personal data, and requires continuous development of protection and compliance measures. This is why the CNIL (the French supervisory authority responsible for enforcing the GDPR) has already published several series of recommendations on the proper handling of personal data when using AI. These are new challenges that need to be fully taken into account by those involved in the fight against fraud!</p>



<p>In conclusion, for more than 25 years, Oneytrust has placed data protection at the heart of its anti-fraud measures. The GDPR should not be seen as a constraint, but rather as an opportunity to strengthen trust, protect our customers and guarantee ever more effective and responsible solutions.</p>



<p>In a context marked by the rise of artificial intelligence, this requirement has never been more essential. It guides our daily commitment: combining security, performance and respect for fundamental rights. <strong>Please do not hesitate to contact us if you have any questions about the security of our fraud prevention processes and solutions, including the protection of personal data!</strong></p><p>The post <a href="https://www.oneytrust.com/nl/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/">GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MERLIN Network: the comeback!</title>
		<link>https://www.oneytrust.com/nl/merlin-network-the-comeback/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Tue, 14 Oct 2025 08:32:04 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[fraudnetwork]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[MERLIN]]></category>
		<category><![CDATA[reseaufraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2534</guid>

					<description><![CDATA[<p>A well-oiled fraud scheme It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank...</p>
<p>The post <a href="https://www.oneytrust.com/nl/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>A well-oiled fraud scheme</strong></p>



<p>It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank card to purchase the product from a legitimate retailer – one of our partners specialising in childcare products.</p>



<p><strong>The result:</strong> the customer receives their product, convinced they have got a good deal. But the retailer faces a bank dispute and will never be paid.</p>



<p><strong>Rapid detection, immediate response</strong></p>



<p>Thanks to a sudden spike in sales of this product, our models detected an anomaly: our analysts were immediately alerted.<strong> Expert rules were put in place for our teams in less than four hours! Less than 12 hours after detection, the network was neutralised.</strong> This efficiency is based on the synergy between our Data department and our Investigations unit.</p>



<ul class="wp-block-list">
<li><strong>Investigators</strong> analysed weak signals to reconstruct the modus operandi.</li>



<li><strong>Data analysts</strong> transformed these insights into enhanced security rules capable of blocking future attempts and monitoring network developments.</li>
</ul>



<p><strong>In-depth investigation: knowing your enemy</strong></p>



<p>The story does not end there. Our experts continued their investigation to gain an in-depth understanding of how the network operated:</p>



<ul class="wp-block-list">
<li><strong>Four ‘professional’ shops</strong> were identified on the marketplace, all registered under different company names – identity theft.</li>



<li>Active since March 2024, they generated hundreds of orders, exclusively for educational games.</li>



<li>The fraud network manipulated the platform&#8217;s algorithms to push his products to the top of search results, notably by offering lower prices than others.</li>
</ul>



<p><strong>The result:</strong> <strong>a few hundred pounds in damages, but thousands of pounds in fraud prevented.</strong> Enhanced security rules, seasoned investigators, and fraudulent shops closed. A healthier marketplace.</p>



<p><strong>The return of the Merlin network</strong></p>



<p>In February 2025, the network returned, more cunning than ever. This time, it targeted two other partners via a new marketplace, with different products: small electrical appliances. The cat-and-mouse game lasted until May 2025, with the opening of fake shops, changes in products and targeted retailers.</p>



<p>This new round required:</p>



<ul class="wp-block-list">
<li><strong>Constant monitoring</strong>,</li>



<li><strong>Regular updates to security rules</strong>,</li>



<li><strong>Ongoing training for our investigators</strong>,</li>



<li>And above all, <strong>close collaboration with our merchant partners</strong>, who are fully committed to this fight.</li>
</ul>



<p><strong>How can you protect yourself against triangular fraud?</strong></p>



<p>Here are the key levers for anticipating and blocking this type of fraud:</p>



<ol class="wp-block-list">
<li><strong>User awareness</strong>: Inform buyers and sellers about warning signs: prices that are too low, suspicious contacts, unusual payment requests.</li>



<li><strong>Identity verification</strong>: Strengthen controls on platforms: supporting documents, cross-checks, etc.</li>



<li><strong>Transaction monitoring</strong>: Implement analysis tools to detect abnormal behaviour and weak signals.</li>
</ol>



<p>Triangular fraud is a growing threat. But with the right tools, constant vigilance and active collaboration between all e-commerce players, it can be effectively contained.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 2</title>
		<link>https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age-part-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 01 Oct 2025 15:13:36 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2529</guid>

					<description><![CDATA[<p>a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges...</p>
<p>The post <a href="https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol class="wp-block-list">
<li><strong>Multiple challenges</strong></li>
</ol>



<p><strong>a) Security and protection of citizens</strong></p>



<p><strong>The primary purpose of digital identity is protection</strong>. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks.</p>



<p><strong>b) Trust and fluidity of exchanges</strong></p>



<p>For a company, <strong>accepting a new customer involves a risk</strong>. Digital identity provides the necessary elements to establish a trust score: is this a real, consistent person who has been active for a long time? This trust then facilitates exchanges, reduces friction (simplified KYC, smooth user journey) and improves the customer experience.</p>



<p><strong>c) Sovereignty and independence</strong></p>



<p>Today, proving one&#8217;s identity online often involves major private players (connection via Google, Apple or Facebook). However, <strong>delegating this strategic function to a few companies poses a problem of sovereignty</strong>. European states are seeking to regain control in order to avoid excessive dependence and guarantee data protection.</p>



<p><strong>d) Inclusion and equal access</strong></p>



<p><strong>Digital identity must not become a factor of exclusion</strong>. People who are digitally excluded (the elderly, rural areas, vulnerable populations) must have access to simple and accessible solutions. Equity requires an inclusive design of these tools.</p>



<ol start="2" class="wp-block-list">
<li><strong>Future prospects</strong></li>
</ol>



<p>By 2030, digital identity could undergo three major developments:</p>



<p><strong>Increased standardisation</strong>: adoption of international standards enabling seamless recognition between countries and services.</p>



<p><strong>Biometric integration</strong>: enhanced association with biometric fingerprints (voice, face, fingerprint) to further secure access.</p>



<p><strong>Enhanced user control</strong>: emergence of solutions where users decide which elements of their identity to share, depending on the context (e.g. proving they are of legal age without revealing their date of birth).</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is no longer a technical curiosity. It has become the beating heart of digital societies. It protects, streamlines and empowers, but also raises questions about surveillance and sovereignty.</p>



<p>By understanding it, decision-makers and citizens have an essential lever for navigating a world where the virtual and the real are inseparable. Ultimately, <strong>digital identity is the identity card of the digital age: intangible but decisive, invisible but unavoidable</strong>.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>