Virtual Card Fraud & Compliance Playbook

This section provides a high-trust guide for identifying, mitigating, and responding to fraud attempts in virtual card products. It draws from actual fraud patterns across emerging markets and global card infrastructure. It also outlines internal control policies, escalation workflows, and engineering safeguards to support compliant and resilient operations.


1.

Overview: Why Virtual Cards Attract Fraud

Virtual cards are inherently attractive to malicious actors for several reasons:

Instant issuance and low onboarding friction

Difficult-to-trace prepaid balances

Lack of 3D Secure or OTP in some schemes

Weak KYC practices at scale

Integration with crypto → pseudo-anonymity

Delayed detection (e.g., refund abuse, chargebacks)

These conditions require constant monitoring, clear enforcement policies, and engineered guardrails.


2.

Common Types of Card Fraud

2.1 Refund Abuse

Behavior: User tops up a card, uses it to pay, requests a refund from the merchant, receives the refund, then attempts to withdraw or reverse the top-up via internal or external payment methods.

Red Flags:

Multiple refunds to terminated cards

Refunds that don’t match any spend event

High refund velocity per user

Refund-to-top-up ratio > 50%

Unusually fast refund → withdrawal behavior

Preventive Measures:

Require successful transaction before refund credit

Freeze cards receiving unmatched refunds

Set refund velocity limits

Match merchant refund IDs to spend references


2.2 Card Cycling & Load Testing Abuse

Behavior: User creates and terminates multiple cards in short time intervals to test card limits, explore MCC behavior, or hide spend history.

Red Flags:

Multiple cards created and terminated in 24 hours

No successful spend but several declined attempts

Consistent use of test merchants (e.g., TikTok, Facebook Ads)

Cards issued under multiple email/phone aliases from same IP/device

Preventive Measures:

Limit max active cards per user

Enforce cooldown periods after card termination

Flag behavior with too many unsuccessful spend attempts

Use device fingerprinting to detect account duplication


2.3 Chargeback Fraud

Behavior: User makes a legitimate purchase, then falsely disputes it with the issuer, aiming to keep the goods and recover funds via chargeback.

Red Flags:

User history shows multiple chargebacks across merchants

Chargebacks for recurring digital subscriptions

Chargebacks with same merchant narrative repeatedly

Chargebacks filed shortly after spend without contacting support

Preventive Measures:

Require pre-authorization logging and webhook trail

Integrate with dispute management tools to gather evidence

Blacklist high-risk MCCs (dating, crypto, gambling)

Track chargeback rate per user + per merchant


2.4 Cross-Account Float Laundering

Behavior: Users use multiple card accounts to create top-up + refund loops in order to simulate transaction volume and move value across wallets or jurisdictions.

Red Flags:

Refunds processed to different account than spender

High cross-user referral activity followed by top-ups

IP/location mismatch between top-up, spend, and refund

Overlapping identifiers (phone, IP, device) across accounts

Preventive Measures:

Disable refund if spend did not originate from same user

Block or investigate refund → top-up loops

Monitor float flow graphs for cyclic patterns

Use graph-based detection for device/IP clustering


2.5 Compromised Merchant Testing

Behavior: Fraudsters test stolen card credentials (often virtual) at vulnerable or compromised merchants to validate usable cards for larger schemes.

Red Flags:

Transactions to test merchants like Apple, TikTok, gift card vendors

Declined attempts with MCC 6012, 6051, 7995 (money services, crypto)

Activity from known compromised merchant clusters

Frequent pre-auth reversals from same device

Preventive Measures:

Limit spend to known, verified MCCs

Monitor webhook volume from same merchant ID

Delay first card spend after creation if suspicious

Use third-party MCC fraud scoring


2.6 Collusion with Merchants

Behavior: Merchants collaborate with users to process fake transactions and refund them, simulating volume or laundering funds.

Red Flags:

High refund volume from a single merchant

Repeated small top-ups followed by full refunds

No reversal webhooks from the same merchant (non-standard behavior)

Card usage exclusively limited to a single MCC or merchant

Preventive Measures:

Monitor refund-to-settlement ratio per merchant

Onboard merchants with due diligence

Use reversal logic + evidence trail to validate activity

Set merchant risk scoring based on velocity and refund behavior


3.

Operational Safeguards

ControlDescription
Auto Freeze RulesFreeze card if 3+ declines without successful auth
Refund Validation EngineRequire matching transaction ID before refund is credited
KYC-Tiered LimitsCap top-up or spend per card/user based on identity verification
Webhook Integrity LoggingVerify every webhook is received and logged with signature
Velocity RulesDaily cap on number of top-ups, card creation, refunds, and spends per user
Referral Anomaly DetectionDetect if referred users are recycling funds or duplicating behavior

4.

Engineering Integration: Risk Layer Hooks

Risk scoring endpoint on card creation, top-up, and spend

Device fingerprint collected at card issuance

IP geolocation mismatch scoring

Silent ML flags passed to webhook handler for downstream routing

Audit trail for each declined, frozen, or refunded transaction


5.

Compliance Policies

PCI DSS: PAN/CVV must never be logged or displayed post-issuance

Refunds and chargebacks must retain full ledger trail for audit

Recordkeeping: Keep transaction logs for at least 5 years (jurisdiction-specific)

Card BIN use must adhere to scheme restrictions (e.g., no crypto for certain BINs)

Always respect issuing partner rules (some restrict gambling, betting, etc.)


6.

Fraud Investigation & Escalation Framework

Triage Flow :

Classify: refund abuse, chargeback, laundering, collusion

Retrieve: cardId, userId, cardUserReference, webhook log, spend/refund trace

Lock: freeze card or float if active

Review: device, IP, wallet, merchant pattern

Resolve: confirm fraud, initiate reversal or block

Report: log case with risk team and compliance

Escalation Triggers :

Refund volume exceeds 10% of top-ups per user in 24h

More than 5 failed attempts on new card

Chargebacks on same user across multiple cards

Card issued to IP flagged for device duplication


7.

Internal Fraud Analytics Dashboards (Recommended)

Refund volume by card status

MCC breakdown for top fraud events

BIN usage + risk categorization

Chargeback and reversal heatmap

Referral behavior graph with float movement

First-time spend vs long-term usage correlation


8.

Fraud Investigation Workflows & Case Examples

This section includes:

End-to-end walkthroughs of real-world fraud scenarios

Decision tree-style checklists

Templates for incident write-ups

Escalation protocols


Case 1: Refund Abuse on Terminated Card

Incident Summary:

User tops up $300

Spends $290 on Aliexpress

Terminates the card 15 minutes later

Two days later, Aliexpress processes a $290 refund

Funds are routed to master float

User contacts support asking where their refund is

Investigation Steps:

StepAction
1Fetch original card details and status (terminated)
2Check if virtualcard.transaction.refund or terminated.refund webhook exists
3Confirm refund was routed to company master float
4Trace reference ID to ledger — confirm posting date
5Match refund timestamp to original top-up time

Resolution:

Credit user wallet from float manually

Flag user if this pattern is repeated

Record case in exception ledger with: cardId, refundAmount, originalSpendRef, terminationTime


Case 2: Chargeback Loop Across Multiple Cards

Incident Summary:

User has 3 terminated cards

All cards used to pay Facebook Ads in small amounts ($10–$30)

Over 2 weeks, user files disputes for all transactions

Processor initiates chargebacks

Facebook provides no counter-evidence

Investigation Steps:

StepAction
1Fetch all transactions tied to userId across cards
2Identify merchant patterns — all MCC 7311 (advertising)
3Match timing between top-up → spend → dispute
4Check device/IP — identical across cards
5Confirm same business use case for all ads
6Review chat logs or user messages for prior complaints

Resolution:

Block user from issuing new cards

Blacklist device fingerprint

Log chargeback costs and adjust float accordingly

Notify issuer of abuse pattern (especially if repeated across other users)


Case 3: Unmatched Refund From Third-Party Merchant

Incident Summary:

Card receives $100 refund

No spend exists for the amount or from the same merchant

Refund is credited to card automatically

Same user attempts withdrawal 10 minutes later

Investigation Steps:

StepAction
1Check refund webhook: transaction.refund
2Search for matching spend with same reference or narrative — none found
3Check card creation date vs refund date — large time gap
4Review withdrawal request — matches refund amount
5Trace card top-up history — no matching inflow

Resolution:

Freeze card immediately

Flag refund as orphaned

Check if merchant system is compromised (collusion or refund error)

Report case to processor if it involves scheme-level merchant ID


Investigation Checklist (All Cases)

Use this flow for every fraud review:

A. Transaction Matching

Was there a successful spend before refund?

Does the merchant ID match?

Did the user file a chargeback or receive auto-refund?

Is the refund amount consistent?

B. Card Lifecycle Audit

What was the card status during spend/refund?

Was the card terminated before refund was issued?

Were there suspicious declines before the event?

C. User Behavior Analysis

How many cards has the user created?

Are there shared IPs or devices across accounts?

Does user exhibit high refund, chargeback, or termination velocity?

Has the user used blocked MCCs?

D. Network Patterns

Does the same merchant show up in other user fraud patterns?

Are similar chargeback narratives clustered by geography or currency?

Has this BIN shown high-risk ratios in other providers?


Response Protocol

SituationAction
Suspicious refund > $100Freeze card, initiate full transaction audit
Refund without matching spendLock card, escalate to processor
3+ chargebacks by same userBlock user, alert BIN sponsor
Refund-to-topup ratio > 70%Flag account for laundering review
Merchant collusion suspectedSuspend merchant access or MCC, report to compliance officer

9.

Tools Every Fraud Analyst Should Use

Card fetch endpoint

Transaction list by cardId or userId

Webhook logs with timestamps and signatures

Device fingerprinting (external or custom)

IP geolocation database

Internal ledger system for float tracking

Velocity rule alerting

Manual reversal & ledger post tool

BIN risk score database (if available)


10.

Final Notes for Training

Fraud is a dynamic adversary. Tools and tactics evolve. Train your teams to:

Prioritize explanation before escalation

Investigate user behavior, not just transactions

Think in graphs, not lists — fraud rarely happens in isolation

Combine engineering signals with financial insight

Maintain clean audit trails of decisions