<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>technologie Archives - Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/nl/tag/technologie/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/nl/tag/technologie/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastbuilddate>Sun, 26 Oct 2025 20:16:38 +0000</lastbuilddate>
	<language>nl-NL</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>technologie Archives - Oneytrust</title>
	<link>https://www.oneytrust.com/nl/tag/technologie/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</title>
		<link>https://www.oneytrust.com/nl/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Sun, 26 Oct 2025 20:16:36 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[gdpr]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[rgpd]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3427</guid>

					<description><![CDATA[<p>Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data. Its objectives: For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history,...</p>
<p>The post <a href="https://www.oneytrust.com/nl/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/">GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol class="wp-block-list">
<li><strong>The GDPR, a structured framework for data protection</strong></li>
</ol>



<p>Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data.</p>



<p>Its objectives:</p>



<ul class="wp-block-list">
<li>Strengthen the rights of European citizens.</li>



<li>To make companies more accountable in their use of data.</li>



<li>To harmonise rules within the European Union.</li>
</ul>



<p>For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history, etc.). The GDPR therefore requires a balance between security, performance and respect for individual freedoms.</p>



<ol start="2" class="wp-block-list">
<li><strong>A legacy of innovation and security with our historic CNIL authorisation</strong></li>
</ol>



<p>Long before the GDPR came into force, Oneytrust had already adopted this approach to compliance.</p>



<p>In fact, we benefited from <strong>a historic agreement (FIA-NET in 2005 and Oney Tech in 2013) with the CNIL, authorising the pooling of our customers&#8217; data, mainly in the e-commerce sector, subject to guarantees of privacy.</strong> Oneytrust has thus become the only French player to benefit from such extensive experience in data sharing, spanning more than 20 years.</p>



<p>This authorisation, developed in collaboration with the supervisory authority, has made it possible to:</p>



<ul class="wp-block-list">
<li>To significantly streamline the journey time for customers already known in our database,</li>



<li>To identify anomalies and fraud trends more effectively by relying on velocity and using our fraud experts to make decisions,</li>



<li>To protect both consumers and merchants,</li>



<li>while ensuring a high level of personal data security.</li>
</ul>



<p>This expertise was even <a href="https://www.cnil.fr/sites/default/files/atoms/files/cnil_livre_blanc_2-paiement.pdf">cited by the CNIL in its 2021 White Paper</a>, proof of the added value and pioneering nature of our approach.</p>



<ol start="3" class="wp-block-list">
<li><strong>A stronger internal GDPR culture</strong></li>
</ol>



<p>The implementation of the GDPR marked a new stage: beyond technical measures, we focused on fostering an internal culture of compliance.</p>



<p>At Oneytrust, every employee plays a role in data protection, thanks in particular to:</p>



<ul class="wp-block-list">
<li>mandatory annual training,</li>



<li>regular awareness campaigns and monthly newsletters,</li>



<li>the systematic involvement of our Data Protection Officer (DPO) and compliance team in our projects,</li>



<li>the implementation of a data protection impact assessment on all our projects that have a structural impact on personal data,</li>



<li>a continuous improvement process to adapt our practices to regulatory changes.</li>
</ul>



<p>This collective effort means that compliance is not only perceived as a legal and regulatory issue by our teams, but more as <strong>a shared value in our daily work, by design, and acts as a differentiating factor for Oneytrust in a landscape of anti-fraud players</strong>, many of whom are based outside Europe.</p>



<ol start="4" class="wp-block-list">
<li><strong>Enhanced security thanks to our membership of a major banking group</strong></li>
</ol>



<p>Our membership of the BPCE group, France&#8217;s second-largest banking group, imposes particularly high standards in terms of security and compliance. Banking institutions are subject not only to horizontal regulations but also to numerous sector-specific regulations due to the critical nature of their activities.</p>



<p>This is reflected in particular by Oneytrust&#8217;s active participation in the Oney group&#8217;s DPO community, where we share best practices and regulatory monitoring, the implementation and execution of ongoing internal controls (quarterly, half-yearly, annual) that require the commitment of all our teams, and the integration of banking standards into our contractual processes (GDPR annexes, security clauses). All this is coupled with advanced technical measures: regular security tests, data flow security, etc.</p>



<p>Oneytrust&#8217;s commitments reinforce the robustness of our systems and the trust placed in us by our customers, placing compliance by design at the heart of our decision-making processes and projects.</p>



<ol start="5" class="wp-block-list">
<li><strong>Data protection: a key lever in the fight against fraud</strong></li>
</ol>



<p>Trust is the cornerstone of the fight against fraud. Consumers and businesses alike must be assured that their data is protected, even in the most sensitive contexts.</p>



<p><strong>At Oneytrust, we consider compliance with the GDPR to be a strategic weapon</strong>. We see it as an opportunity: an opportunity to legitimise our role as a trusted intermediary, to ensure that the fight against fraud is conducted in a manner that respects individual freedoms and privacy, while also preparing for the future.</p>



<p>Indeed, with the proliferation of artificial intelligence applications, new challenges are emerging. In order to counter the increasingly widespread use of AI by fraudsters, it has become essential for those involved in the fight against fraud to increase their use of AI. This allows us to remain adaptable and effective in the face of these new fraud trends.</p>



<p>However, AI makes extensive use of data, particularly personal data, and requires continuous development of protection and compliance measures. This is why the CNIL (the French supervisory authority responsible for enforcing the GDPR) has already published several series of recommendations on the proper handling of personal data when using AI. These are new challenges that need to be fully taken into account by those involved in the fight against fraud!</p>



<p>In conclusion, for more than 25 years, Oneytrust has placed data protection at the heart of its anti-fraud measures. The GDPR should not be seen as a constraint, but rather as an opportunity to strengthen trust, protect our customers and guarantee ever more effective and responsible solutions.</p>



<p>In a context marked by the rise of artificial intelligence, this requirement has never been more essential. It guides our daily commitment: combining security, performance and respect for fundamental rights. <strong>Please do not hesitate to contact us if you have any questions about the security of our fraud prevention processes and solutions, including the protection of personal data!</strong></p><p>The post <a href="https://www.oneytrust.com/nl/gdpr-and-fraud-prevention-a-historic-and-strategic-commitment-for-oneytrust/">GDPR and fraud prevention: a historic and strategic commitment for Oneytrust</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MERLIN Network: the comeback!</title>
		<link>https://www.oneytrust.com/nl/merlin-network-the-comeback/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Tue, 14 Oct 2025 08:32:04 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[fraudnetwork]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[MERLIN]]></category>
		<category><![CDATA[reseaufraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2534</guid>

					<description><![CDATA[<p>A well-oiled fraud scheme It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank...</p>
<p>The post <a href="https://www.oneytrust.com/nl/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>A well-oiled fraud scheme</strong></p>



<p>It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer&#8217;s details and a stolen bank card to purchase the product from a legitimate retailer – one of our partners specialising in childcare products.</p>



<p><strong>The result:</strong> the customer receives their product, convinced they have got a good deal. But the retailer faces a bank dispute and will never be paid.</p>



<p><strong>Rapid detection, immediate response</strong></p>



<p>Thanks to a sudden spike in sales of this product, our models detected an anomaly: our analysts were immediately alerted.<strong> Expert rules were put in place for our teams in less than four hours! Less than 12 hours after detection, the network was neutralised.</strong> This efficiency is based on the synergy between our Data department and our Investigations unit.</p>



<ul class="wp-block-list">
<li><strong>Investigators</strong> analysed weak signals to reconstruct the modus operandi.</li>



<li><strong>Data analysts</strong> transformed these insights into enhanced security rules capable of blocking future attempts and monitoring network developments.</li>
</ul>



<p><strong>In-depth investigation: knowing your enemy</strong></p>



<p>The story does not end there. Our experts continued their investigation to gain an in-depth understanding of how the network operated:</p>



<ul class="wp-block-list">
<li><strong>Four ‘professional’ shops</strong> were identified on the marketplace, all registered under different company names – identity theft.</li>



<li>Active since March 2024, they generated hundreds of orders, exclusively for educational games.</li>



<li>The fraud network manipulated the platform&#8217;s algorithms to push his products to the top of search results, notably by offering lower prices than others.</li>
</ul>



<p><strong>The result:</strong> <strong>a few hundred pounds in damages, but thousands of pounds in fraud prevented.</strong> Enhanced security rules, seasoned investigators, and fraudulent shops closed. A healthier marketplace.</p>



<p><strong>The return of the Merlin network</strong></p>



<p>In February 2025, the network returned, more cunning than ever. This time, it targeted two other partners via a new marketplace, with different products: small electrical appliances. The cat-and-mouse game lasted until May 2025, with the opening of fake shops, changes in products and targeted retailers.</p>



<p>This new round required:</p>



<ul class="wp-block-list">
<li><strong>Constant monitoring</strong>,</li>



<li><strong>Regular updates to security rules</strong>,</li>



<li><strong>Ongoing training for our investigators</strong>,</li>



<li>And above all, <strong>close collaboration with our merchant partners</strong>, who are fully committed to this fight.</li>
</ul>



<p><strong>How can you protect yourself against triangular fraud?</strong></p>



<p>Here are the key levers for anticipating and blocking this type of fraud:</p>



<ol class="wp-block-list">
<li><strong>User awareness</strong>: Inform buyers and sellers about warning signs: prices that are too low, suspicious contacts, unusual payment requests.</li>



<li><strong>Identity verification</strong>: Strengthen controls on platforms: supporting documents, cross-checks, etc.</li>



<li><strong>Transaction monitoring</strong>: Implement analysis tools to detect abnormal behaviour and weak signals.</li>
</ol>



<p>Triangular fraud is a growing threat. But with the right tools, constant vigilance and active collaboration between all e-commerce players, it can be effectively contained.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/merlin-network-the-comeback/">MERLIN Network: the comeback!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 2</title>
		<link>https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age-part-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 01 Oct 2025 15:13:36 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2529</guid>

					<description><![CDATA[<p>a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges...</p>
<p>The post <a href="https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol class="wp-block-list">
<li><strong>Multiple challenges</strong></li>
</ol>



<p><strong>a) Security and protection of citizens</strong></p>



<p><strong>The primary purpose of digital identity is protection</strong>. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks.</p>



<p><strong>b) Trust and fluidity of exchanges</strong></p>



<p>For a company, <strong>accepting a new customer involves a risk</strong>. Digital identity provides the necessary elements to establish a trust score: is this a real, consistent person who has been active for a long time? This trust then facilitates exchanges, reduces friction (simplified KYC, smooth user journey) and improves the customer experience.</p>



<p><strong>c) Sovereignty and independence</strong></p>



<p>Today, proving one&#8217;s identity online often involves major private players (connection via Google, Apple or Facebook). However, <strong>delegating this strategic function to a few companies poses a problem of sovereignty</strong>. European states are seeking to regain control in order to avoid excessive dependence and guarantee data protection.</p>



<p><strong>d) Inclusion and equal access</strong></p>



<p><strong>Digital identity must not become a factor of exclusion</strong>. People who are digitally excluded (the elderly, rural areas, vulnerable populations) must have access to simple and accessible solutions. Equity requires an inclusive design of these tools.</p>



<ol start="2" class="wp-block-list">
<li><strong>Future prospects</strong></li>
</ol>



<p>By 2030, digital identity could undergo three major developments:</p>



<p><strong>Increased standardisation</strong>: adoption of international standards enabling seamless recognition between countries and services.</p>



<p><strong>Biometric integration</strong>: enhanced association with biometric fingerprints (voice, face, fingerprint) to further secure access.</p>



<p><strong>Enhanced user control</strong>: emergence of solutions where users decide which elements of their identity to share, depending on the context (e.g. proving they are of legal age without revealing their date of birth).</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is no longer a technical curiosity. It has become the beating heart of digital societies. It protects, streamlines and empowers, but also raises questions about surveillance and sovereignty.</p>



<p>By understanding it, decision-makers and citizens have an essential lever for navigating a world where the virtual and the real are inseparable. Ultimately, <strong>digital identity is the identity card of the digital age: intangible but decisive, invisible but unavoidable</strong>.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 1</title>
		<link>https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 24 Sep 2025 12:38:47 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2518</guid>

					<description><![CDATA[<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and...</p>
<p>The post <a href="https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services.</p>



<p><strong>1 . Defining digital identity</strong>:</p>



<p>Unlike civil identity, which is established and certified by the state, digital identity takes many forms. It is based on four main dimensions:</p>



<ul class="wp-block-list">
<li><strong>Declarative data</strong>: surname, first name, email address, telephone number, address. This information is provided voluntarily, but can be misused/“imitated”.</li>



<li><strong>Technical fingerprints</strong>: each connected device generates a unique signature (IP address, configuration, sensors, time zones, cookies). These signals, invisible to the naked eye, become valuable clues for recognising a user.</li>



<li><strong>Behaviour</strong>: typing speed, connection times, location, frequency of service use. These elements are more difficult to falsify and constitute a behavioural signature that is almost biometric.</li>



<li><strong>Social and economic interactions</strong>: history of contact, payment and browsing data use. This data builds a coherent narrative… or, conversely, reveals inconsistencies typical of fraudulent events.</li>
</ul>



<ol start="2" class="wp-block-list">
<li><strong>An identity in flux</strong></li>
</ol>



<p>Unlike a national identity card, which is fixed at the time of issue, digital identity is dynamic. Every connection, every payment, every interaction enriches this digital portrait. This dynamic provides robustness – it is difficult to simulate a consistent digital life over time – but also raises ethical questions:</p>



<p>How much data should be collected without infringing on privacy?</p>



<p>How can we ensure that users retain control over their digital identity?</p>



<p>What safeguards should be put in place to prevent widespread surveillance?</p>



<p>The GDPR in Europe and the concept of ‘self-sovereign identity’ attempt to provide answers. But the balance between security, fluidity and respect for individual freedoms remains fragile.</p>



<ol start="3" class="wp-block-list">
<li><strong>Why has this concept become so important?</strong></li>
</ol>



<p>Two major trends explain its growing importance. .</p>



<ul class="wp-block-list">
<li><strong>Widespread digitalisation</strong>: smartphones have become our universal access point. From public services to healthcare, everything is now digital. Initiatives such as France Identité and the European eIDAS 2.0 regulation aim to create digital identities that are recognised at national and supranational level.</li>



<li><strong>A boom in 100% web-based crime</strong>: identity fraud is skyrocketing. The concept of ‘synthetic identity’ illustrates this trend. Fraudsters assemble pieces of real and invented data to create fake profiles capable of fooling traditional controls.</li>
</ul>



<p>In this context, the ability to assess the credibility of a digital identity is becoming strategic for banks, insurers, retailers and also for governments.</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is constantly evolving: shaped by our usage, regulated by legislation, scrutinised for its security and commercial value. But this dynamic is not without its challenges. In the second part, we will address the multiple issues it raises – security, trust, sovereignty, inclusion – and the prospects that could redefine our relationship with identity by 2030.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MERLIN network: anatomy of a triangular fraud</title>
		<link>https://www.oneytrust.com/nl/merlin-network-anatomy-of-a-triangular-fraud-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Thu, 18 Sep 2025 16:06:27 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2454</guid>

					<description><![CDATA[<p>What is triangular fraud? Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly...</p>
<p>The post <a href="https://www.oneytrust.com/nl/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading">What is triangular fraud?</h3>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="427" height="426" data-id="1702" src="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg" alt="" class="wp-image-1702" srcset="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg 427w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-400x399.jpg 400w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-12x12.jpg 12w" sizes="(max-width: 427px) 100vw, 427px" /></figure>
</figure>



<p>Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly and effectively.</p>



<p><strong>How triangular fraud works:</strong></p>



<p>The triangular fraud process can generally be broken down into four steps:</p>



<ol class="wp-block-list">
<li><strong>Creation of multiple identities</strong>: fraudsters begin by creating synthetic identities by combining real and fictitious information from real customer information received during purchases on their website. This allows them to generate credible buyer profiles that can interact with sellers without arousing suspicion.</li>



<li><strong>Ordering products</strong>: using these identities, fraudsters place orders with legitimate sellers. Payment is often made with stolen or misused credit cards.</li>



<li><strong>Reshipping products</strong>: the purchased products are shipped to intermediate addresses or directly to the ‘real customer’ depending on the method used. At this stage, fraudsters may also sell the stolen products to real buyers via online platforms at a reduced price.</li>



<li><strong>Cash-out</strong>: Fraudsters cash out payments from genuine buyers, while the original seller remains unpaid or faces a chargeback.</li>
</ol>



<p><strong>Why is triangular fraud effective?</strong></p>



<p>Triangular fraud is particularly effective because of its networked approach, which allows fraudsters to separate the elements of the transaction. The initial seller believes they are interacting with a legitimate buyer, while the final buyer thinks they are getting a product at a bargain price. This separation makes detection difficult, as individual transactions may appear legitimate because the information used is real, long-standing and sometimes even shows healthy activity. Traditional security rules are unable to detect these weak signals of fraud.</p>



<p><strong>The MERLIN network</strong></p>



<p>At Oneytrust, we are constantly detecting new fraudulent schemes. One of the most telling recent cases is that of a network we have named ‘Merlin’ because it used products from this brand to carry out its attacks. Detected in June 2024, this network perfectly illustrates the complexity and evolution of today&#8217;s threats.</p>



<p>It all started with <strong>an alert about unusual purchases</strong>: a sharp increase in orders for Merlin educational games, worth less than £100, from a partner specialising in childcare products. This sudden spike immediately caught our attention.</p>



<p>Our experts quickly spotted <strong>similarities between the orders</strong>, suggesting the existence of an organised network. However, certain elements were puzzling: the digital identities appeared reliable, and some profiles even belonged to real customers – but with a different email address. This was a clear sign of <strong>identity theft</strong>, which is rare for such small amounts.</p>



<p>To remove any doubt, we contacted the customers concerned. All confirmed their identity… but denied having made these purchases. The fraud was now certain. A thorough discussion with one of them revealed the key: he had indeed purchased the product, but on an online marketplace, not from our partner. The evidence provided enabled us to identify the fraudulent shop and understand the modus operandi: <strong>a triangular fraud</strong>.</p>



<p>Once the pattern had been established, our analysts listed <strong>the common signals associated with suspicious orders</strong> and created specific security rules. Thanks to these targeted actions, reinforced by direct checks with customers, we were able to block transactions linked to this network. <strong>The result: in less than 12 hours, the ‘Merlin’ network was neutralised.</strong></p>



<p>This case shows how essential <strong>the responsiveness and expertise of our teams are in stopping new fraud networks as soon as they emerge</strong>. And the story of ‘Merlin’ is only just beginning… we will tell you more very soon.</p><p>The post <a href="https://www.oneytrust.com/nl/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI at Oneytrust: technology at the heart of our DNA!</title>
		<link>https://www.oneytrust.com/nl/ai-at-oneytrust-technology-at-the-heart-of-our-dna/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 22 Aug 2025 07:02:41 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=1692</guid>

					<description><![CDATA[<p>1) Why AI has become essential in the fight against fraud The boom in language models and content generation tools has lowered the barriers to fraud: flawless phishing emails, carefully crafted fake profiles, synthetic identities that are more difficult to detect, industrialisation of fraud scenarios, reusable attack scripts. Static controls are no longer sufficient. We...</p>
<p>The post <a href="https://www.oneytrust.com/nl/ai-at-oneytrust-technology-at-the-heart-of-our-dna/">AI at Oneytrust: technology at the heart of our DNA!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading"></h3>



<p><strong>1) Why AI has become essential in the fight against fraud</strong></p>



<p><br>The boom in language models and content generation tools has lowered the barriers to fraud: flawless phishing emails, carefully crafted fake profiles, synthetic identities that are more difficult to detect, industrialisation of fraud scenarios, reusable attack scripts. Static controls are no longer sufficient. <strong>We need systems that are capable of learning, detecting weak signals, and continuously evolving.</strong> AI is not a gadget: it is essential for detecting anomalies, linking scattered events, and responding in real time without hindering legitimate processes.</p>



<p><strong>2) Oneytrust&#8217;s AI toolkit</strong></p>



<p><br>Over the years, <strong>Oneytrust has built a range of scores to analyse digital events, identify fraud patterns and prioritise actions. Our scores aggregate more than 200 signals and are based on a shared database covering more than 15 million consumers, authorised by the CNIL (French Data Protection Authority) in 2013 — well before the GDPR.</strong><br>Beyond fraud at a given moment, we observe velocity: how a user, payment method, device (phone, PC, etc.) or email address behaves over time. This intelligent memory makes it possible to streamline the journey of good customers (controlled reuse of acquired trust) and tighten the noose on risks (accumulation of clues, inconsistencies, anomalies). Our rule engines remain adaptive: we add, adjust and remove rules as trends evolve, to keep pace with changing attacks without compromising the customer experience.</p>



<p><strong>3) Humans + AI: augmented expertise, not automated</strong></p>



<p><br><strong>AI identifies, humans understand.</strong> Our investigators and fraud experts play a particularly crucial role in challenging alerts, contextualising cases, and revealing emerging patterns that models have not yet learned (low volumes, ambiguous signals, attacker innovations). This feedback loop feeds the models, improves the rules, and ensures an explainable decision. In particularly sensitive situations, human arbitration protects the customer relationship, avoids false positives, and maintains trust.</p>



<p><strong>4) A strategy to acculturate our employees to Generative AI</strong></p>



<p><br>As soon as ChatGPT was released in 2022, we quickly decided <strong>to train our teams in the use of generative AI to increase speed, operational efficiency and quality on non-sensitive tasks</strong>: writing, summarising, analysis assistance, preparing deliverables, etc. As part of the BPCE Group, we have access to the secure MAIA portal, which allows our employees to access reference models (e.g. GPT-4o, Mistral, Gemini) in a safe and ethical environment. In our training courses and with the help of our Generative AI Ambassadors, we emphasise the importance of maintaining a critical perspective on the results generated by AI (systematic verification, non-disclosure of sensitive information, traceability of uses): the aim is to accelerate useful production, not to automate indiscriminately.</p>



<p><strong>5) Governance &amp; compliance: already prepared for the AI Act!</strong></p>



<p><br>Because many of our customers are regulated (banks, fintechs, e-merchants), we have long since implemented the safeguards expected by sector regulators: <strong>model documentation, decision logging and auditability, data quality, continuous monitoring, and human supervision.</strong> The AI Act, which has just come into force, reinforces these requirements: we anticipated this framework and are aligning our work with the BPCE Group&#8217;s compliance approach. In concrete terms, this means: system mapping, model risk management, periodic controls, proportionate explainability and team acculturation. Our ambition is to meet deadlines without slowing down useful innovation.</p>



<p><br>In conclusion, let us consider that the fight against fraud is a movement, not something static. AI enables earlier detection, better explanation and faster action — provided it is governed, complemented by humans and integrated without disrupting the user experience. At Oneytrust, it is this winning trio — <strong>high-performance models, committed experts and solid compliance</strong> — that transforms a shifting threat into a sustainable competitive advantage.</p>



<p><strong>Would you like to learn more about the expertise of our models, which combine more than 200 types of data and velocities, and benefit from Oneytrust&#8217;s Data Consortium with more than 15 million digital identities to secure your customer journeys without losing conversions?</strong> <a href="https://www.oneytrust.com/fr/contact/">Contact us.</a></p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/ai-at-oneytrust-technology-at-the-heart-of-our-dna/">AI at Oneytrust: technology at the heart of our DNA!</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>