<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>fraudnetwork Archives - Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/nl/tag/fraudnetwork/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/nl/tag/fraudnetwork/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastbuilddate>Tue, 14 Oct 2025 08:32:05 +0000</lastbuilddate>
	<language>nl-NL</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>fraudnetwork Archives - Oneytrust</title>
	<link>https://www.oneytrust.com/nl/tag/fraudnetwork/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>MERLIN Network: the comeback!</title>
		<link>https://www.oneytrust.com/nl/merlin-network-the-comeback/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Tue, 14 Oct 2025 08:32:04 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[fraudnetwork]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[MERLIN]]></category>
		<category><![CDATA[reseaufraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2534</guid>

					<description><![CDATA[<p>A well-oiled fraud scheme It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank...</p>
<p>The post <a href="https://www.oneytrust.com/nl/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>A well-oiled fraud scheme</strong></p>



<p>It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank card to purchase the product from a legitimate retailer – one of our partners specialising in childcare products.</p>



<p><strong>The result:</strong> the customer receives their product, convinced they have got a good deal. But the retailer faces a bank dispute and will never be paid.</p>



<p><strong>Rapid detection, immediate response</strong></p>



<p>Thanks to a sudden spike in sales of this product, our models detected an anomaly: our analysts were immediately alerted.<strong> Expert rules were put in place for our teams in less than four hours! Less than 12 hours after detection, the network was neutralised.</strong> This efficiency is based on the synergy between our Data department and our Investigations unit.</p>



<ul class="wp-block-list">
<li><strong>Investigators</strong> analysed weak signals to reconstruct the modus operandi.</li>



<li><strong>Data analysts</strong> transformed these insights into enhanced security rules capable of blocking future attempts and monitoring network developments.</li>
</ul>



<p><strong>In-depth investigation: knowing your enemy</strong></p>



<p>The story does not end there. Our experts continued their investigation to gain an in-depth understanding of how the network operated:</p>



<ul class="wp-block-list">
<li><strong>Four ‘professional’ shops</strong> were identified on the marketplace, all registered under different company names – identity theft.</li>



<li>Active since March 2024, they generated hundreds of orders, exclusively for educational games.</li>



<li>The fraud network manipulated the platform&#8217;s algorithms to push his products to the top of search results, notably by offering lower prices than others.</li>
</ul>



<p><strong>The result:</strong> <strong>a few hundred pounds in damages, but thousands of pounds in fraud prevented.</strong> Enhanced security rules, seasoned investigators, and fraudulent shops closed. A healthier marketplace.</p>



<p><strong>The return of the Merlin network</strong></p>



<p>In February 2025, the network returned, more cunning than ever. This time, it targeted two other partners via a new marketplace, with different products: small electrical appliances. The cat-and-mouse game lasted until May 2025, with the opening of fake shops, changes in products and targeted retailers.</p>



<p>This new round required:</p>



<ul class="wp-block-list">
<li><strong>Constant monitoring</strong>,</li>



<li><strong>Regular updates to security rules</strong>,</li>



<li><strong>Ongoing training for our investigators</strong>,</li>



<li>And above all, <strong>close collaboration with our merchant partners</strong>, who are fully committed to this fight.</li>
</ul>



<p><strong>How can you protect yourself against triangular fraud?</strong></p>



<p>Here are the key levers for anticipating and blocking this type of fraud:</p>



<ol class="wp-block-list">
<li><strong>User awareness</strong>: Inform buyers and sellers about warning signs: prices that are too low, suspicious contacts, unusual payment requests.</li>



<li><strong>Identity verification</strong>: Strengthen controls on platforms: supporting documents, cross-checks, etc.</li>



<li><strong>Transaction monitoring</strong>: Implement analysis tools to detect abnormal behaviour and weak signals.</li>
</ol>



<p>Triangular fraud is a growing threat. But with the right tools, constant vigilance and active collaboration between all e-commerce players, it can be effectively contained.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>