The $47B Problem — Card-Not-Present Fraud in the Age of Instant Payments

Insight article image — card-not-present fraud scale —

The $47 billion figure represents estimated global card-not-present fraud losses for 2025, per Nilson Report projections. That's not chargebacks. That's not the operational cost of fraud management programs. That's the direct loss value of transactions where a card credential was used without the physical card or the cardholder's authorization — predominantly in e-commerce and API-based payment flows.

The number has been climbing for years, but the slope steepened sharply with the broader rollout of instant payment rails. The relationship between instant payments and CNP fraud isn't coincidental. It's structural.

Why instant payments change the fraud equation

Traditional card payments involve a settlement window — typically one to three business days before funds actually move. That window creates an opportunity for fraud detection to catch a suspicious transaction before it finalizes. A hold, a review flag, a call to the cardholder — all of these are possible inside the settlement gap.

Instant payment rails close that window entirely. RTP (Real-Time Payments), FedNow, and equivalent real-time schemes in the UK and EU process transactions in seconds. Once an authorized payment leaves an account, reversal requires the receiving institution's cooperation, which ranges from slow to impossible depending on where the funds land. Account-to-account fraud, push payment fraud, and certain categories of CNP fraud exploiting card-to-account fund flows have all grown significantly since real-time rails became widely accessible.

The detection window isn't shrinking — it's gone. You either catch it before authorization or you don't catch it at all.

The anatomy of a CNP fraud operation

Large-scale CNP fraud isn't individual criminals typing stolen card numbers into checkout forms. The operations are industrialized. Here's how a typical mid-tier CNP operation runs in 2025-2026:

Data sourcing. Compromised card data is acquired through a combination of large breach datasets (available on criminal marketplaces for fractions of a cent per record), phishing kit deployments targeting cardholders directly, and skimmer operations at physical POS terminals that feed card data to a central collection point. A mid-tier operation might be working with a rolling inventory of 50,000 to 200,000 card records at any given time.

Validation. Before attempting high-value transactions, operators run micro-authorization checks — typically $0.00 or $1.00 authorization holds — against payment processors with lax controls. This separates live cards from dead ones and identifies issuer response patterns. Validation is usually fully automated.

Cashing out. Validated cards are used to purchase digital goods (gift cards, cryptocurrency, software licenses), high-resale physical goods (electronics, jewelry), or directly fund mule accounts via card-linked transfers. Digital goods are preferred because there's no shipping address mismatch risk and no physical delivery to intercept.

Monetization. Purchased assets are sold through gray-market resellers or transferred out through layered accounts. At this point, recovery is essentially impossible.

The entire cycle — from card validation to cash-out — can run in under 20 minutes for a well-optimized operation. That's faster than most human review queues even begin processing.

Where detection fails

The standard detection signals for CNP fraud — billing/shipping address mismatch, velocity on card number, device anomaly — are well-known to fraud operators. They're also increasingly bypassed.

Residential proxy services provide legitimate-looking IP addresses, often from the same city as the cardholder's billing address. Device fingerprinting is circumvented using virtual machines pre-loaded with real browser profiles harvested from compromised consumer machines. Shipping addresses are handled through freight forwarder networks that provide US or EU receiving addresses for subsequent forwarding — eliminating the country mismatch signal entirely.

What doesn't get bypassed easily: behavioral patterns at the transaction level, cross-merchant velocity that requires visibility across issuers, and timing patterns relative to card compromise date. These require data and model infrastructure that individual merchants and most issuers don't have on their own.

The network effect problem

A card that was compromised in a breach gets used across multiple merchants. Each merchant's fraud system sees one transaction against one card. None of them can see the other transactions against the same card happening simultaneously or in rapid sequence.

This is why CNP fraud that looks like isolated events at the merchant level is actually coordinated at the network level. The only detection layer with the data to see the coordination is one that has visibility across merchants and issuers — which means either card network-level monitoring or a detection system with cross-merchant data sharing.

At Detectiv, one of the signals we use in CNP scoring is cross-merchant velocity computed across our customer base. A card that appears in two unrelated merchant transactions within a 90-second window is flagged for elevated scrutiny regardless of whether either individual transaction looks suspicious in isolation. That signal alone catches a meaningful percentage of automated CNP operations that would otherwise clear merchant-level rules.

The merchant liability shift and its unintended consequences

Post-EMV liability shift moved chargeback responsibility for card-present fraud to merchants not supporting chip. The same logic extended to CNP hasn't played out as cleanly. 3DS2 (3-D Secure 2.x) provides a liability shift for authenticated CNP transactions, but adoption is uneven and friction concerns have kept many large merchants on lighter authentication flows.

The practical result: a significant portion of CNP fraud liability still sits with issuers, who have limited visibility into merchant-side signals. Merchants who could reduce their fraud exposure through better authentication often don't, because the liability isn't theirs. This misalignment of incentives means the ecosystem as a whole tolerates more CNP fraud than it would if liability were more precisely allocated.

That structural problem isn't something any single detection system fixes. But it does make the case for detection infrastructure that operates above the merchant level — at the issuer or network layer — where both the liability and the cross-merchant data actually sit.

What $47 billion means operationally

For a fraud operations team at a bank or payment platform, the macro number matters less than the per-transaction exposure in their specific portfolio. CNP fraud loss rates vary considerably by merchant category, customer segment, and payment channel. Gift card transactions run at 5-10x the fraud rate of standard e-commerce. Crypto-linked purchases are higher still. International transactions into certain corridors have loss rates that make them nearly uninsurable through standard fraud provisions.

The teams that are managing CNP fraud effectively right now are not just doing better detection — they're doing better segmentation. They understand which segments of their transaction volume carry the highest CNP risk and have applied proportionally heavier controls to those segments, accepting more friction in exchange for materially lower loss rates in the categories that drive most of their exposure.

That segmentation work requires granular, category-level fraud data — something that takes time to build and requires the right analytical infrastructure to interrogate. The banks that have it are performing measurably better on CNP loss rates. The ones still working from aggregate fraud rates are flying with limited instruments.

Get CNP fraud under control

Detectiv's cross-merchant detection layer catches the coordinated patterns that single-merchant systems can't see.

Request a Demo