{"id":325916,"date":"2026-04-28T19:38:37","date_gmt":"2026-04-28T14:08:37","guid":{"rendered":"https:\/\/ebiztoday.news\/?p=325916"},"modified":"2026-04-28T19:38:37","modified_gmt":"2026-04-28T14:08:37","slug":"ai-powered-fraud-hides-inside-legitimate-transactions","status":"publish","type":"post","link":"https:\/\/ebiztoday.news\/index.php\/2026\/04\/28\/ai-powered-fraud-hides-inside-legitimate-transactions\/","title":{"rendered":"AI-Powered Fraud Hides Inside Legitimate Transactions"},"content":{"rendered":"<p><\/p>\n<div>\n<p>E-commerce is entering a brand new phase of fraud, where transactions that appear legitimate \u2014 valid accounts, correct details, even routine behavior \u2014 can mask coordinated attacks powered by synthetic identities and AI.<\/p>\n<p>From account takeovers (ATOs) to loyalty abuse, fraud now targets identity slightly than the purpose of sale, warned Dany Naigeboren, senior director of risk at fraud prevention company <a href=\"https:\/\/www.forter.com\" target=\"_blank\" rel=\"noopener\">Forter<\/a>.<\/p>\n<p>Fraud is not any longer breaking into systems \u2014 it\u2019s operating inside them.<\/p>\n<p>These attacks have gotten easier to execute, allowing smaller actors to operate with capabilities once limited to organized fraud rings.<\/p>\n<p>\u201cIt\u2019s an enormous game changer. Until now, online fraud has mostly involved sophisticated fraud syndicates with vast engineering resources,\u201d Naigeboren told the E-Commerce Times.<\/p>\n<p>To counter that threat, Forter uses AI to detect and forestall \u201cinvisible\u201d fraud across the complete customer journey, not only at checkout.<\/p>\n<p>Its global merchant network draws on data from over $1 trillion in transactions to enhance detection accuracy, reflecting a broader need for AI-driven systems to trace and stop increasingly difficult-to-detect attacks.<\/p>\n<h3>Digital Thieves Use AI Against Us<\/h3>\n<p>AI is lowering the barrier to entry for e-commerce fraud, allowing individuals with limited technical skills to execute attacks once limited to organized teams.<\/p>\n<figure id=\"attachment_178533\" aria-describedby=\"caption-attachment-178533\" style=\"width: 400px\" class=\"wp-caption alignleft\"><figcaption id=\"caption-attachment-178533\" class=\"wp-caption-text\"><span style=\"text-align: left; color: #222; font-weight: 600; font-size: 15px; font-family: Verdana, Arial; display: block; margin-top: 5px;\">Dany Naigeboren, Sr. Director of Risk at Forter<\/span><\/figcaption><\/figure>\n<p>\u201cWith two to a few hours of labor, anyone can grow to be proficient in conducting fraud online. And this manifests itself in quite a few ways,\u201d Naigeboren said.<\/p>\n<p>In lots of cases, the fraud not looks like an obvious attack. Compromised accounts, valid credentials, and routine purchasing behavior allow transactions to maneuver through ordering and payment systems without triggering traditional defenses.<\/p>\n<p>Attackers are increasingly bypassing merchant systems by targeting consumers directly, using account takeovers and similar schemes to operate inside legitimate user activity.<\/p>\n<p>AI tools also make it easier to perform social engineering and phishing attacks, helping fraudsters steal credentials and impersonate users at scale.<\/p>\n<p>\u201cWe\u2019re suddenly getting more emails targeting us to get information to conduct fraud online. That is one area that has modified immensely,\u201d he said.<\/p>\n<p>He added that AI is making fraud each easier to execute and more profitable, enabling attackers to deploy automated agents that scale these activities rapidly.<\/p>\n<h3>Fighting Fire With Fire<\/h3>\n<p>Forter\u2019s approach centers on identity \u2014 determining who&#8217;s behind each interaction and whether that intent is legitimate.<\/p>\n<p>\u201cThe best way we see it&#8217;s that to conduct fraud using sophisticated AI tools, you would like equally advanced systems to stop it,\u201d Naigeboren said.<\/p>\n<div class=\"text-center mb-3\">\n                    <!--ps: 39 crid: 11452:a-den-nice-apr-640x480-fwem2 cc:vn,th,id,iq s_c:11452,11449,11220 px:0--><\/p>\n<div class=\"cls-1777385315\">\n<div class=\"wa-ad-display-wrap wa-ads-39\" style=\"display: inline-block;\" data-adposition=\"39\" data-adname=\"ECT-STORY-1\" data-crid=\"11452\"><a href=\"\" onclick=\"ENN_ad_wo(11452,'17773853151070','460e5e754f'); return false; \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ectnews.com\/wp-content\/uploads\/sites\/6\/2026\/04\/dentsu-nice-apr-640x480-fwem2.jpg\" width=\"640\" height=\"480\" alt=\"NiCE leads the way in WEM\"><\/a> <\/div>\n<\/p><\/div>\n<p> <!--\/ps: 39 crid: 11452:a-den-nice-apr-640x480-fwem2 cc:vn,th,id,iq --><\/div>\n<p>While the platform is primarily utilized in e-commerce, it also supports hybrid models similar to buy online, pick up in store, where online identity signals extend into physical transactions.<\/p>\n<p>It provides real-time decisions that approve or decline transactions, reducing false declines while addressing account takeovers, fake accounts, payment fraud, and promotional abuse.<\/p>\n<h3>AI Redirects Fraud Toward Consumers<\/h3>\n<p>Naigeboren is seeing spikes in account takeovers and social engineering, with phishing and impersonation attacks growing more convincing and harder to detect.<\/p>\n<p>Quite than targeting merchant systems directly, many fraudsters now deal with consumers, using compromised accounts to maneuver through e-commerce workflows with fewer controls.<\/p>\n<p>In practice, that may mean a legitimate account placing what appears to be a routine order \u2014 but one initiated by an attacker using stolen credentials.<\/p>\n<p>\u201cIt\u2019s often easier and more lucrative to focus on consumers directly,\u201d Naigeboren said.<\/p>\n<p>AI also enables attackers to deploy automated agents that scale these tactics, reducing the necessity for technical expertise while increasing attack volume.<\/p>\n<p>At the identical time, retailers face rising \u201cfriendly fraud,\u201d where legitimate-looking customers abuse policies, promotions, and chargebacks.<\/p>\n<p>The challenge, Naigeboren noted, is determining intent \u2014 whether a user is making a legitimate purchase or attempting to game the system.<\/p>\n<p>Forter addresses this in real time and thru post-transaction evaluation of returns and chargebacks, which remain amongst essentially the most difficult areas to administer.<\/p>\n<h3>How Forter Differs From Competitors<\/h3>\n<p>Effective fraud detection is determined by combining real-time signals with historical context to grasp user behavior.<\/p>\n<p>Most systems evaluate transactions in isolation. Forter as a substitute connects behavior across interactions, linking activity across sessions, devices, and transactions to construct a unified view of every user.<\/p>\n<div class=\"text-center mb-3\">\n                    <!--ps: 39 crid: 11452:a-den-nice-apr-640x480-fwem2 cc:vn,th,id,iq s_c:11452,11449,11220 px:0--><\/p>\n<div class=\"cls-1777385315\">\n<div class=\"wa-ad-display-wrap wa-ads-39\" style=\"display: inline-block;\" data-adposition=\"39\" data-adname=\"ECT-STORY-1\" data-crid=\"11452\"><a href=\"\" onclick=\"ENN_ad_wo(11452,'17773853158132','460e5e754f'); return false; \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ectnews.com\/wp-content\/uploads\/sites\/6\/2026\/04\/dentsu-nice-apr-640x480-fwem2.jpg\" width=\"640\" height=\"480\" alt=\"NiCE leads the way in WEM\"><\/a> <\/div>\n<\/p><\/div>\n<p> <!--\/ps: 39 crid: 11452:a-den-nice-apr-640x480-fwem2 cc:vn,th,id,iq --><\/div>\n<p>That permits the platform to evaluate risk on the identity level, as a substitute of counting on individual transactions or single touchpoints.<\/p>\n<p>\u201cTraditional fraud detection systems are siloed. They appear at one or two data points at a single touchpoint. Modern fraud prevention needs a holistic, identity-centric view over multiple touchpoints similar to checkout, returns, promotions, and logins,\u201d he said.<\/p>\n<h3>The Way forward for Fraud Prevention<\/h3>\n<p>E-commerce fraud is expanding rapidly, with recent attack methods emerging faster than traditional defenses can adapt.<\/p>\n<p>\u201cThere is no such thing as a single silver bullet. The hot button is holistic visibility into interactions and identities. Detection and protection systems have to be AI-driven and repeatedly learning, not static rule sets,\u201d Naigeboren said.<\/p>\n<p>As AI agents increasingly transact on behalf of users, the central challenge is identifying who \u2014 or what \u2014 is behind each interaction.<\/p>\n<p>In some cases, those interactions may look indistinguishable from legitimate customer behavior, with automated agents browsing, adding items to carts, and completing purchases without obvious signs of fraud.<\/p>\n<p>Distinguishing between human users and AI-driven activity stays inconsistent across systems, often counting on fragmented signals or indirect detection methods.<\/p>\n<p>\u201cAs AI agents handle more checkouts and logins, it becomes essential to tie each agent\u2019s activity back to a verifiable underlying human identity,\u201d he said \u2014 a requirement that&#8217;s quickly becoming central to modern fraud prevention.<\/p>\n<\/p><\/div>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>E-commerce is entering a brand new phase of fraud, where transactions that appear legitimate \u2014 valid accounts, correct details, even routine behavior \u2014 can mask coordinated attacks powered by synthetic identities and AI. From account takeovers (ATOs) to loyalty abuse, fraud now targets identity slightly than the purpose of sale, warned Dany Naigeboren, senior director [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":325917,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[3641,2859,18620,20277,3472],"class_list":["post-325916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-aipowered","tag-fraud","tag-hides","tag-legitimate","tag-transactions"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts\/325916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/comments?post=325916"}],"version-history":[{"count":2,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts\/325916\/revisions"}],"predecessor-version":[{"id":325919,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/posts\/325916\/revisions\/325919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/media\/325917"}],"wp:attachment":[{"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/media?parent=325916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/categories?post=325916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ebiztoday.news\/index.php\/wp-json\/wp\/v2\/tags?post=325916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}