{"id":86743,"date":"2025-07-29T15:44:03","date_gmt":"2025-07-29T19:44:03","guid":{"rendered":"https:\/\/chargebacks911.com\/?p=86743"},"modified":"2025-09-22T08:16:15","modified_gmt":"2025-09-22T12:16:15","slug":"presentation-attacks","status":"publish","type":"post","link":"https:\/\/chargebacks911.com\/presentation-attacks\/","title":{"rendered":"Presentation Attacks"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Protect Your Business From Biometric Spoofing, Fake Identity Documents, &amp; Other Presentation Attacks<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/chargebacks911.com\/biometric-payments\/\">Biometric payments<\/a>, like facial recognition and fingerprint identification, are becoming more popular. An estimated <a href=\"https:\/\/www.nmi.com\/about-us\/news\/old-habits-die-hard-whats-keeping-consumers-away-from-biometric-payments\/\" target=\"_blank\" rel=\"noopener\">36% of consumers<\/a> have used biometrics to pay for a purchase, and more than nine in 10 have at least heard of the technology.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Biometric payments are more secure than <a href=\"https:\/\/chargebacks911.com\/contactless-payment-fraud\/\">tapping<\/a>, <a href=\"https:\/\/chargebacks911.com\/emv-chip-cards\/\">inserting<\/a>, or swiping a card to pay. That\u2019s because authorizing a purchase using inherence factors \u2014 like facial features or fingerprints \u2014 are much harder to replicate or steal than knowledge or ownership factors, like a password or a physical payment card.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Despite these security benefits, biometric payments are not invulnerable to fraud. For example, sophisticated presentation attacks aimed specifically at biometric verification systems can cause a system to mistake fraudsters for legitimate users.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this article, we explore how presentation attacks work and discuss how they affect your business. We also offer practical strategies for detecting and preventing presentation attacks without alienating legitimate customers.<\/p>\n\n\n<div class=\"c-suggested-reading\"><div class=\"c-suggested-reading__inner\"><div class=\"c-suggested-reading__header\"><h3 class=\"c-suggested-reading__headline\">Recommended reading<\/h3><\/div><ul class=\"c-suggested-reading__items\"><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/business-email-compromise-statistics\/\" class=\"c-suggested-reading__link\">Business Email Compromise: Stats &amp; Financial Impact for <\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/clone-phishing\/\" class=\"c-suggested-reading__link\">What is Clone Phishing? How Scammers Mimic Trusted Parties<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/affiliate-fraud-detection\/\" class=\"c-suggested-reading__link\">Affiliate Fraud Detection: 13 Warning Signs to Stop Scammers<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/how-to-prevent-affiliate-fraud\/\" class=\"c-suggested-reading__link\">How to Prevent Affiliate Fraud: Top Tips for <\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/prevent-phishing-scams\/\" class=\"c-suggested-reading__link\">Our Top Tips to Prevent Phishing Scams<\/a><\/li><li class=\"c-suggested-reading__item\"><a href=\"https:\/\/chargebacks911.com\/how-to-identify-phishing-attacks\/\" class=\"c-suggested-reading__link\">Phishing Red Flags: How to Identify Scam Attacks in <\/a><\/li><\/ul><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Presentation Attack?<\/h2>\n\n\n\n<dl class=\"definition_box\" class=\"wp-block-cb911-block-library-definitions\"><div class=\"definition\"><div class=\"definition_top\"><h3><dt>Presentation Attack<\/dt><\/h3><p>[noun]\/pr\u0113 \u2022 zen \u2022 t\u0101 \u2022 SH\u0259n \u2022 \u0259 \u2022 tak\/<\/p><\/div><dd><p>A presentation attack occurs when a fraudster uses stolen photos, videos, identity documents, 3D masks, synthetic fingerprints, or deepfakes in an attempt to bypass a biometric security system and gain unauthorized access to a victim\u2019s account.<\/p><\/dd><\/div><\/dl>\n\n\n\n<p class=\"wp-block-paragraph\">Similar to a traditional <a href=\"https:\/\/chargebacks911.com\/ecommerce-fraud\/account-takeover-fraud\/\">account takeover (ATO) attack<\/a>, in which fraudsters gain access to a victim\u2019s account by compromising their username and password, a presentation attack is a specific type of identity theft that attempts to fool the biometric authentication process itself.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to presentation attacks, automated verification systems are particularly vulnerable. That\u2019s because a single high-quality deepfake or stolen ID can allow a fraudster to gain unauthorized access to a user\u2019s account, even if the attacker doesn\u2019t know the user\u2019s standard login information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Presentation Attacks Affecting Online Merchants<\/h2>\n\n\n\n<div class=\"c-category-alert c-category-alert--teal\">\n    <span class=\"c-category-alert--teal__icon\">\n        <object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2024\/09\/Time-Limit-Icon.png\" height=\"20\" aria-label=\"hourglass\"><\/object>\n  <\/span>\n    <span class=\"c-category-alert--teal__heading\">TL;DR<\/span>\n    <p class=\"c-category-alert--teal__description\">Fraudsters use forged or altered documents to create a seemingly legitimate identity that can pass automated checks. They can also use digital or physical artifacts to impersonate a legitimate user to fool liveness detection and facial recognition.<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Fraudsters use a number of sophisticated methods to trick biometric verification systems. In general, attacks can involve <a href=\"https:\/\/chargebacks911.com\/ecommerce-fraud\/biometric-spoofing\/\" title=\"Biometric Spoofing\" data-wpil-monitor-id=\"3105\">fake documents or biometric spoofing<\/a>.<\/p>\n\n\n\n<div class=\"c-icon-list\">\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/04\/NEW-ICONS-DuoTone-government-fraud.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Counterfeit Government IDs<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Fraudsters use sophisticated printing techniques to create fake driver\u2019s licenses or other government-issued IDs that look real enough to fool basic verification systems.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/10\/NEW-ICONS-DuoTone-eWallet-staged.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Altered Digital Documents<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Criminals doctor PDFs of utility bills or bank statements, creating fraudulent proof-of-address documents by altering names, addresses, or dates.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2019\/07\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update-228.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Manipulated Stock Photos<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Attackers use manipulated stock photos or publicly available images to circumvent facial recognition systems.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-ID.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Printed Photo Attacks<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Fraudsters present a high-resolution printed photo of the victim\u2019s face to the camera during a selfie verification step.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2020\/08\/NEW-ICONS-DuoTone-fraudster-stolen-account-takeover-pc-monitor.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Video Replay Attacks<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Attackers use stolen or publicly available video footage of a person to bypass liveness checks that require movement, such as head turning or blinking.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/07\/NEW-ICONS-DuoTone-fraud-imposter.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">3D Mask Replicas<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Sophisticated scammers may create realistic silicone masks or 3D-printed replicas of a victim\u2019s face to defeat more advanced biometric security measures.<\/p>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"c-shortcode-ebook c-shortcode-ebook--whitepaper\"><a href=\"https:\/\/chargebacks911.com\/chargeback-field-report\/\" class=\"c-shortcode-ebook__block\"><div class=\"c-shortcode-ebook__inner\"><div class=\"c-shortcode-ebook__graphics\"><div class=\"c-shortcode-ebook__graphics-inner\"><div class=\"c-shortcode-ebook__ipad\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/ebooks\/ipad--field-report.png\" alt=\"2022\" chargeback=\"\" field=\"\" report=\"\"\/>\n\t\t\t<\/div>\n\t\t\t<div class=\"c-shortcode-ebook__cover\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/ebooks\/cover--field-report.png\" alt=\"2022\" chargeback=\"\" field=\"\" report=\"\"\/>\n\t\t\t<\/div><\/div><\/div><div class=\"c-shortcode-ebook__content\"><span class=\"c-shortcode-ebook__title\"><span>A Real-World Look at<\/span> Chargeback Management<\/span><p class=\"c-shortcode-ebook__description\">Based on a survey of over 400 merchants, the report presents a comprehensive, cross-vertical look at the current state of chargebacks and chargeback management.<\/p><span class=\"c-btn c-btn--primary c-shortcode-ebook__btn\">Access the FREE Report<\/span><\/div><\/div><div class=\"c-shortcode-ebook__close\" data-shortcode-ebook-close=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\" fill=\"currentColor\"><path fill-rule=\"evenodd\" d=\"M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293 4.293a1 1 0 01-1.414-1.414L8.586 10 4.293 5.707a1 1 0 010-1.414z\" clip-rule=\"evenodd\"><\/path><\/svg><\/div><\/a><div class=\"c-shortcode-ebook__overlay\"><\/div><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">There are also hybrid approaches that combine document forgery with biometric spoofing to mount more convincing and difficult-to-detect attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For instance, an attacker may use a completely forged ID document and then use a deepfake or a manipulated video to pass a biometric system\u2019s corresponding selfie and liveness check. Or, fraudsters may get their hands on a legitimate identity document but physically or digitally alter the photo to match their own face or that of a <a data-wpil=\"url\" href=\"https:\/\/chargebacks911.com\/ecommerce-fraud\/synthetic-identity-theft\/\">synthetic identity<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Presentation Attacks Impact Your Business<\/h2>\n\n\n\n<div class=\"c-category-alert c-category-alert--teal\">\n    <span class=\"c-category-alert--teal__icon\">\n        <object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2024\/09\/Time-Limit-Icon.png\" height=\"20\" aria-label=\"hourglass\"><\/object>\n  <\/span>\n    <span class=\"c-category-alert--teal__heading\">TL;DR<\/span>\n    <p class=\"c-category-alert--teal__description\">Targets of presentation attacks will lose revenue, see higher operational costs, and may be subject to noncompliance penalties. They may also suffer long-term brand damage and even restrictions on their accounts.<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Every time a presentation attack occurs and a fraudster makes it through your biometric defenses, either at <a href=\"https:\/\/chargebacks911.com\/ecommerce-fraud\/new-account-fraud\/\">account creation<\/a> or checkout, you can expect to encounter immediate fraud losses that stem from fraudulent transactions and <a href=\"https:\/\/chargebacks911.com\/chargebacks\/\">chargebacks<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These losses are just the start. Also in store are long-term consequences that could dampen your revenue and harm your reputation. Specifically, you could experience:<\/p>\n\n\n\n<div class=\"c-icon-list\">\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/03\/NEW-ICONS-DuoTone-losing-money-flying.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Direct Financial Losses<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Successful presentation attacks directly lead to fraudulent purchases. Once the victim regains access to their account, they may dispute the unauthorized charges, resulting in <a href=\"https:\/\/chargebacks911.com\/chargeback-management\/chargeback-fees\/\">chargeback fees<\/a> that eat into your bottom line. You won\u2019t be able to challenge these chargebacks through representment, since they\u2019re filed for legitimate reasons.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/04\/NEW-ICONS-DuoTone-growth-money-bar-chart.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Increased Operational Costs<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">In the aftermath of a presentation attack, you\u2019re likely to invest in more sophisticated biometric verification tools. You may also choose to staff fraud analysts and personnel for manual review. While these are commendable measures, they don\u2019t come cheap and can result in higher operating expense growth.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/09\/NEW-ICONS-DuoTone-government-regulatory-money.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Serious Compliance Penalties<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">If you operate in a regulated industry, presentation attacks may earn the ire of regulators, who may impose significant fines and sanctions for inadequate Know Your Customer (KYC) and <a href=\"https:\/\/chargebacks911.com\/fraud-money-laundering-framl\/\">Anti-Money Laundering (AML)<\/a> procedures.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/07\/NEW-ICONS-DuoTone-rating-down.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Long-Term Brand Damage<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">If individual attackers or <a href=\"https:\/\/chargebacks911.com\/fraud-ring\/\">fraud rings<\/a> find your platform easy to exploit, your business can quickly gain a reputation as a soft target. Scammers will target you more often, which further damages customer trust and can deter legitimate users from signing up.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/04\/NEW-ICONS-DuoTone-money-in-hand.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Higher Processing Fees<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">A high fraud rate flags your business as risky to <a data-wpil=\"url\" href=\"https:\/\/chargebacks911.com\/banking\/payment-processing\/what-is-a-payment-processor\/\">payment processors<\/a>. As a result, you may face higher <a data-wpil=\"url\" href=\"https:\/\/chargebacks911.com\/banking\/payment-processing\/credit-card-processing-fees\/\">credit card processing fees<\/a>, have to <a href=\"https:\/\/chargebacks911.com\/merchant-account-reserve\/\">maintain an account reserve<\/a>, or even have your <a href=\"https:\/\/chargebacks911.com\/terminated-processing-agreement-and-closed-merchant-account\/\">merchant account frozen or terminated<\/a>.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2018\/08\/NEW-ICONS-DuoTone-Lineal-IconsRECENT_DuoTone-Iconz-146.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Poor Customer Experience<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">When businesses overcompensate for security gaps with overly strict verification measures, it introduces unnecessary friction. This can frustrate and alienate legitimate customers and cause them to abandon the onboarding or checkout process.<\/p>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Detecting Presentation Attacks: Red Flags in Document Verification<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Subjecting identity documents submitted by users to manual review can help you uncover subtle signs of forgery or manipulation that automated systems might miss. Specifically, look for:<\/p>\n\n\n\n<div class=\"c-icon-boxes c-icon-boxes\">\n    <div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">Inconsistent Typography<\/h3>\n            <p class=\"c-icon-box__copy\">Mistakes like mixed fonts, incorrect character spacing, or misaligned text can signal that a document has been digitally altered.<\/p>\n        <\/div>\n    <\/div>\n\n    <div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">Missing Security Features<\/h3>\n            <p class=\"c-icon-box__copy\">Authentic government IDs contain security features like holograms, microprinting, and UV-reactive ink. The absence of these elements on a submitted document is a major red flag.<\/p>\n\n        <\/div>\n    <\/div>\n\n<div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">Digital Editing Artifacts<\/h3>\n            <p class=\"c-icon-box__copy\">Zooming in on a document can reveal pixelation, blurry areas around the photo or text, or \u201cdigital dust,\u201d all of which indicate that the image has been manipulated.<\/p>\n\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n<div class=\"c-custom-cta c-custom-cta--red\">\n    <div class=\"c-custom-cta__inner\">\n        \n        <div class=\"c-custom-cta__content\">\n            <h4 class=\"c-custom-cta__title\">New technologies present new threat vectors.<\/h4>\n            <p class=\"c-custom-cta__description\">Make sure you\u2019re protected.<\/p>\n            <a class=\"c-btn c-btn--primary c-custom-cta__btn\" data-open-demo-modal>Request a Demo<\/a>\n        <\/div>\n\n        <div class=\"c-custom-cta__graphics\">\n            <div class=\"c-custom-cta__graphics-inner\">\n                <div class=\"c-custom-cta__image\">\n                                    <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/cta\/cta--revenue-recovered.png\" alt=\"The Original End-to-End Chargeback Management Platform\"\/>\n                            <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Detecting Presentation Attacks: Behavioral Red Flags<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">How a potential user acts during the onboarding process can be just as telling as the documents they provide. Watch out for:<\/p>\n\n\n\n<div class=\"c-icon-boxes c-icon-boxes\">\n    <div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">Video Verification Reluctance<\/h3>\n            <p class=\"c-icon-box__copy\">A user who repeatedly fails, avoids, or shows hesitation during a live video verification step may be attempting to hide their actual face in order to set up a spoofing attack.<\/p>\n        <\/div>\n    <\/div>\n\n    <div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">Multiple Failed Attempts<\/h3>\n            <p class=\"c-icon-box__copy\">An account that has an unusually high number of failed biometric verification attempts may indicate that a fraudster is (unsuccessfully) testing various fake documents or spoofing methods.<\/p>\n\n        <\/div>\n    <\/div>\n\n<div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">Mismatched Data Points<\/h3>\n            <p class=\"c-icon-box__copy\">Cross-reference the information provided across all submitted documents and data fields. Inconsistencies in names, dates of birth, or addresses are strong indicators of fraud.<\/p>\n\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Detecting Presentation Attacks: Technical Red Flags<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Behind-the-scenes technical data can also provide a wealth of information that you can use to spot a presentation attack in progress. Look for:<\/p>\n\n\n\n<div class=\"c-icon-boxes c-icon-boxes\">\n    <div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">IP & Device Anomalies<\/h3>\n            <p class=\"c-icon-box__copy\">Use <a href=\"https:\/\/chargebacks911.com\/proxy-piercing\/\">proxy piercing tools<\/a> to check if the user\u2019s IP address matches their stated location. If the user is trying to mask their device\u2019s <a href=\"https:\/\/chargebacks911.com\/geolocation\/\">geolocation<\/a> or digital fingerprint, they could be trying to launch an attack.<\/p>\n        <\/div>\n    <\/div>\n\n    <div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">Reverse Image Matches<\/h3>\n            <p class=\"c-icon-box__copy\">Running a reverse image search on a user\u2019s profile picture or submitted documents can reveal if the image is a stock photo or has been stolen from another source online. Any match or near match should raise an immediate red flag.<\/p>\n\n        <\/div>\n    <\/div>\n\n<div class=\"c-icon-box c-icon-box--two c-box-glow--red\">\n        <div class=\"c-icon-box__inner\">\n\n            <div class=\"c-icon-box__icon\">\n                <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2023\/06\/NEW-ICONS-DuoTone-red-flag.svg\" alt=\"Red Flag\"\/>\n            <\/div>\n\n            <h3 class=\"c-icon-box__title c-icon-box__title--center\">File Metadata Analysis<\/h3>\n            <p class=\"c-icon-box__copy\">The metadata of an uploaded image file can contain clues of manipulation. For instance, metadata showing that the file was recently saved in an editing program like Adobe Photoshop is highly suspicious.<\/p>\n\n        <\/div>\n    <\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Fraud Prevention Technologies That Stop Presentation Attacks<\/h2>\n\n\n\n<div class=\"c-category-alert c-category-alert--teal\">\n    <span class=\"c-category-alert--teal__icon\">\n        <object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2024\/09\/Time-Limit-Icon.png\" height=\"20\" aria-label=\"hourglass\"><\/object>\n  <\/span>\n    <span class=\"c-category-alert--teal__heading\">TL;DR<\/span>\n    <p class=\"c-category-alert--teal__description\">Sophisticated liveness detection can defeat basic presentation attacks. You can also try to validate documentation, and ask for multiple forms of identification.<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Investing in the right technology is an important first line of defense against presentation attacks. Your goal here is to build a system that can intelligently differentiate between genuine users and sophisticated fakes without creating excessive friction for legitimate users.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Consider the following technologies:<\/p>\n\n\n\n<div class=\"c-icon-list\">\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2018\/08\/NEW-ICONS-DuoTone-Lineal-Icons-Scams_DuoTone-Iconz-145.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Liveness Detection Solutions<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/chargebacks911.com\/liveness-detection\/\">Liveness detection<\/a>, which ranges from $0.10 to $1 per check, can be used to confirm that a user is physically present (i.e. \u201clive\u201d) during biometric verification. Active liveness checks require users to perform actions like blinking or turning their head, which adds friction but is often more accurate.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On the other hand, passive liveness detection systems analyze imperceptible cues from a standard selfie or video in the background. This approach provides a more seamless user experience, though it can come at the cost of accuracy.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/07\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update-218.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Document Verification Services<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">Modern document verification services use AI to instantly check for signs of digital tampering. The most robust solutions, though, go a step further by cross-referencing document information against issuing databases to confirm authenticity. While highly accurate, these services may be limited by the lack of database access in some jurisdictions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Before you select a document verification vendor, make sure to understand your provider\u2019s level of coverage and their fallback methods.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"c-icon-list__item\"><div class=\"c-icon-list__icon\"><object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2021\/12\/Device-Verification-DuoTone-Lineal-Icons_DuoTone-Iconz-copy-37.svg\" type=\"image\/svg+xml\"><\/object><\/div><div class=\"c-icon-list__content\"><h3 class=\"c-icon-list__title\">Multi-Factor Verification Approaches<\/h3><div class=\"c-icon-list__text\">\n<p class=\"wp-block-paragraph\">The strongest defense combines biometrics with other signals. This multi-factor approach enriches a biometric check with behavioral analytics, <a href=\"https:\/\/chargebacks911.com\/device-fingerprinting\/\">device fingerprints<\/a>, and <a href=\"https:\/\/chargebacks911.com\/velocity-checks\/\">velocity checks<\/a> to gain a more accurate picture of whether the user is legitimate or not.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These signals can be aggregated into a <a href=\"https:\/\/chargebacks911.com\/fraud-scoring\/\">fraud score<\/a>, which can allow your team to selectively apply stricter verification procedures to profiles that appear high-risk. This allows you to focus your efforts on suspicious users while minimizing friction for the rest of your customers.<\/p>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Building a Presentation Attack Response Plan<\/h2>\n\n\n\n<div class=\"c-category-alert c-category-alert--teal\">\n    <span class=\"c-category-alert--teal__icon\">\n        <object data=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2024\/09\/Time-Limit-Icon.png\" height=\"20\" aria-label=\"hourglass\"><\/object>\n  <\/span>\n    <span class=\"c-category-alert--teal__heading\">TL;DR<\/span>\n    <p class=\"c-category-alert--teal__description\">When a presentation attack occurs, respond immediately by blocking the account, preserving evidence, and documenting the event for law enforcement and your bank. Once the threat is contained, analyze the incident to strengthen fraud prevention measures, address vulnerabilities, and decide whether legal action is worth pursuing.<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">The moment you detect a presentation attack, you\u2019ll need to act quickly to contain the fallout. After the immediate threat is neutralized, you\u2019ll want to shift towards making long-term strategic improvements.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You\u2019ll first want to establish an immediate action protocol. This involves instantly blocking the suspicious account, preserving all associated data \u2014 including the fraudulent documents, IP logs, and device fingerprints \u2014 and documenting a timeline of the event. This minute-by-minute evidence can help you file thorough incident reports with both local law enforcement agencies and your <a href=\"https:\/\/chargebacks911.com\/the-acquiring-bank\/\">acquiring bank<\/a>.<\/p>\n\n\n\n<div class=\"c-shortcode-ebook c-shortcode-ebook--guide\"><a href=\"https:\/\/ad.chargebacks911.com\/50-insider-tips-for-preventing-chargebacks\/\" class=\"c-shortcode-ebook__block\" target=\"_blank\"><div class=\"c-shortcode-ebook__inner\"><div class=\"c-shortcode-ebook__graphics\"><div class=\"c-shortcode-ebook__graphics-inner\"><div class=\"c-shortcode-ebook__ipad\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/ebooks\/ipad--insider-tips.png\" alt=\"50\" insider=\"\" tips=\"\" for=\"\" preventing=\"\" more=\"\" chargebacks=\"\"\/>\n\t\t\t<\/div>\n\t\t\t<div class=\"c-shortcode-ebook__cover\">\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/themes\/CB911\/assets\/img\/shortcodes\/ebooks\/cover--insider-tips.png\" alt=\"50\" insider=\"\" tips=\"\" for=\"\" preventing=\"\" more=\"\" chargebacks=\"\"\/>\n\t\t\t<\/div><\/div><\/div><div class=\"c-shortcode-ebook__content\"><span class=\"c-shortcode-ebook__title\"><span>50 Insider Tips for<\/span> Preventing More Chargebacks<\/span><p class=\"c-shortcode-ebook__description\">In this exclusive guide, we outline the 50 most effective tools and strategies to reduce the overall number of chargebacks you receive.<\/p><span class=\"c-btn c-btn--primary c-shortcode-ebook__btn\">Get the FREE guide<\/span><\/div><\/div><div class=\"c-shortcode-ebook__close\" data-shortcode-ebook-close=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\" fill=\"currentColor\"><path fill-rule=\"evenodd\" d=\"M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l-4.293 4.293a1 1 0 01-1.414-1.414L8.586 10 4.293 5.707a1 1 0 010-1.414z\" clip-rule=\"evenodd\"><\/path><\/svg><\/div><\/a><div class=\"c-shortcode-ebook__overlay\"><\/div><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Afterwards, you\u2019ll want to move from incident response to strategic analysis. Have your fraud and risk management staff work collaboratively to analyze the attack pattern, identify vulnerabilities, and update fraud triggers and verification rules.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For example, if your biometric security system was defeated by a high-quality 3D mask, you may need to upgrade your liveness detection service.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As for whether to pursue legal action or simply write off the loss, you\u2019ll want to closely consider the amount lost and the strength of your evidence before you make any moves. After all, a lawsuit can be a resource-intensive endeavor with no guarantee of recovery\u2026and you may not even know who the fraudster is at all.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices for Presentation Attack Prevention<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">A resilient anti-fraud strategy relies on a combination of technology, process, and people. These best practices can help you create a robust defense that adapts to new threats without introducing unnecessary friction.<\/p>\n\n\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Use Risk-Based Verification<\/h3>\n    <p>Apply friction proportional to risk. For low-value transactions, simple verification may suffice. However, high-risk activities like large purchases or account changes should trigger step-up verification procedures requiring a government ID and a selfie.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Guide Your Users<\/h3>\n    <p>Provide clear, simple on-screen instructions and visual guides for selfie and document capture. This can help reduce user error, minimize frustration, and improve the accuracy of your verification system.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Empower Your Team<\/h3>\n    <p>Your customer service staff is a valuable human firewall. Train them to spot subtle red flags of social engineering and recognize patterns in user complaints that could indicate a new presentation attack tactic.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Plan for Edge Cases<\/h3>\n    <p>Automated systems aren\u2019t foolproof. Establish a clear and efficient manual review protocol and ensure that a human fraud expert is kept in the loop for high-value or ambiguous cases.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Balance Security & Sales<\/h3>\n    <p>Excessive friction can kill conversions. Use analytics to monitor where users drop off in your signup or purchase funnel so that you can identify the sweet spot where you maximize conversions while minimizing fraud.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Test Your Defenses<\/h3>\n    <p>Regularly prepare your team for live attacks. Test your own verification systems by attempting to bypass them with common presentation attack methods to proactively identify and patch vulnerabilities before fraudsters strike.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Diversify Your Vendors<\/h3>\n    <p>Relying on a single verification vendor can create a single point of failure and lead to provider lock-in. A multi-vendor strategy \u2014 where you use one provider for document analysis and another for liveness detection \u2014 can help you create a more resilient, layered, and potentially cost-effective defense.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Know Your Tolerance<\/h3>\n    <p>Fraud prevention involves tradeoffs, so you\u2019ll need to decide on how many false positives you\u2019re willing to accept for every one fraudster you stop. Your risk tolerance level should directly inform how strictly you configure your verification tools.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Optimize Verification Flows<\/h3>\n    <p>Continuously A\/B test your verification sequence and user interface. You might discover that asking for a document scan before a selfie improves completion rates, or that a different call-to-action significantly reduces drop-offs.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Explain the \u201cWhy\u201d<\/h3>\n    <p>Briefly explain to users why you are asking for verification, and frame it as a necessary step to protect their account and personal data. Honest communication can help build trust and improve verification completion rates.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Provide Alternatives<\/h3>\n    <p>If a legitimate user fails an automated check, don\u2019t automatically reject them. Offer an alternative path, such as a brief live video call with a support agent, to retain high-value customers who you may otherwise lose out on.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Consider Geographic Nuances<\/h3>\n    <p>Government-issued IDs vary significantly in format and security features across different states or countries. If you do business globally, make sure your verification provider can accurately process a wide range of local, regional, and national documents to avoid incorrectly rejecting legitimate customers.<\/p>\n    <\/div>\n<\/div>\n\n<div class=\"c-small-icon-list\">\n    <div class=\"c-small-icon-list__icon\">\n        <img decoding=\"async\" src=\"https:\/\/chargebacks911.com\/wp-content\/uploads\/2022\/08\/NEW-ICONS-DuoTone-Lineal-Icons-July2022-Update.svg\" alt=\"Tip\"\/>\n    <\/div>\n<div class=\"c-small-icon-list__content\">\n    <h3>Optimize for Mobile<\/h3>\n    <p>Most users will complete verification on a mobile device. Design your capture experience with a mobile-first mindset, ensuring camera overlays, real-time feedback, and upload speeds are fully optimized for a smooth on-the-go process.<\/p>\n    <\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">The technology that scammers use to impersonate others is evolving fast. Presentation attacks are only going to get more sophisticated with time. That means you have to step up your presentation attack detection game if you\u2019re going to stand any chance of fighting back.<\/p>\n\n\n\n<div class=\"c-shortcode-faq\" data-shortcode-faq=\"true\" class=\"wp-block-cb911-block-library-faq\"><div class=\"c-shortcode-faq__inner\"><h2 class=\"c-shortcode-faq__heading joli-heading\" id=\"faqs\">FAQs<\/h2><div class=\"c-shortcode-faq__items\">\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">What\u2019s the difference between a presentation attack and identity theft?<\/h3><p class=\"c-shortcode-faq__answer\">A presentation attack is a specific type of identity theft where a fraudster attempts to evade a biometric verification system. In other words, all presentation attacks involve identity theft, but not all forms of identity theft are presentation attacks.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">How common are presentation attacks in eCommerce?<\/h3><p class=\"c-shortcode-faq__answer\">Although there are no reliable statistics on the frequency of presentation attacks in particular, it\u2019s estimated that broader identity theft is the fastest-growing facing eCommerce merchants today. Data from the Federal Trade Commission (FTC) reveals that identity theft grew 30% year-over-year between 2022 and 2023.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">Do I need biometric verification to prevent presentation attacks?<\/h3><p class=\"c-shortcode-faq__answer\">Yes. In addition to standard biometric verification, you\u2019ll also need to enhance your biometric systems with presentation attack detection (PAD) capabilities, such as passive or active liveness detection tools.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">What\u2019s the minimum verification I should require?<\/h3><p class=\"c-shortcode-faq__answer\">At a minimum, eCommerce merchants should require phone and email verification. If you sell expensive or fraud prone goods and services, you may wish to implement higher minimum security standards at account creation, which may require users to provide a government-issued identity document, along with a selfie, at onboarding.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">How do deepfakes factor into presentation attacks?<\/h3><p class=\"c-shortcode-faq__answer\">Fraudsters can use deepfakes to bypass biometric authentication systems at account creation or login by using AI-generated media to impersonate the victim.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">Can presentation attacks lead to chargebacks?<\/h3><p class=\"c-shortcode-faq__answer\">Yes. Presentation attacks can lead directly to chargebacks via fraudulent purchases, which attackers make after gaining unauthorized access to a victim\u2019s account and payment information.<\/p><\/div><\/div>\n\n\n<div class=\"c-shortcode-faq__item\" data-shortcode-faq-item=\"true\" class=\"wp-block-cb911-block-library-faq-item\"><div class=\"c-shortcode-faq__item-inner\"><div class=\"c-shortcode-faq__icons\"><div class=\"c-shortcode-faq__icons-inner\"><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--minus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><div class=\"c-shortcode-faq__icon c-shortcode-faq__icon--plus\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M20 12H4\"><\/path><\/svg><\/div><\/div><\/div><h3 class=\"c-shortcode-faq__question\">Should small merchants worry about presentation attacks?<\/h3><p class=\"c-shortcode-faq__answer\">Yes. Small merchants should worry about presentation attacks, since they are just as vulnerable to these attacks as larger eCommerce sellers.<\/p><\/div><\/div>\n\n<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<h2 class=\"wp-block-heading\">Protect Your Business From Biometric Spoofing, Fake Identity Documents, &amp; Other Presentation Attacks<\/h2>\n<p>Biometric payments, like facial recognition and fingerprint identification, are becoming more popular. An estimated 36% of consumers have used biometrics to pay for a purchase,<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/chargebacks911.com\/presentation-attacks\/\" title=\"Presentation Attacks\">Read More<\/a><\/div>\n","protected":false},"author":9192231,"featured_media":87200,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[54],"tags":[43,107,70],"class_list":["post-86743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ecommerce-fraud","tag-fraud","tag-third-party","tag-types"],"acf":[],"_links":{"self":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts\/86743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/users\/9192231"}],"replies":[{"embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/comments?post=86743"}],"version-history":[{"count":10,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts\/86743\/revisions"}],"predecessor-version":[{"id":93841,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/posts\/86743\/revisions\/93841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/media\/87200"}],"wp:attachment":[{"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/media?parent=86743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/categories?post=86743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chargebacks911.com\/wp-json\/wp\/v2\/tags?post=86743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}