High RISK actions
Action | Type | Description |
Account | Change | Protects from attempts to modify details such as emails, phone numbers, addresses, language settings, or notification settings. Fraudsters may update account details in order to ship goods to themselves and intercept confirmation and authorization notifications. |
Delete | Protects from attempts to delete accounts. Fraudsters may delete accounts they’ve taken over in order to remove data trails that implicate or draw attention to them or to harass and abuse individuals or groups. | |
Suspend | Protects consumers from fraudsters who attempt to harass and abuse them by temporarily suspending their accounts. | |
Export | Download | Protects against the exfiltration of potentially sensitive information. Fraudsters may do this in order to uncover passwords, acquire building blocks for synthetic IDs, steal valuable intellectual property, or even gather potential blackmail material. |
Lead | Identity Check | The lead contact details are authentic |
Privacy | Delete | Protects against malicious attempts to delete information, exploiting the right-to-delete commonly provided by privacy regulations such as GDPR and CCPA. Bad actors who have taken over an account may ask to delete that account (or select data associated with it) in order to harm the account owner, eliminate incriminating history, or damage the reputation of the businesses that control and process the data. |
Disclose | Protects private information from attempts to acquire personal information by exploiting the right-to-disclose commonly provided by privacy regulations such as GDPR and CCPA. The right-to-disclose provides consumers with access related to their accounts that aren’t necessarily available otherwise. Bad actors, having taken over an account, may request this information and use it to carry out fraud schemes. | |
Profile | Seller | Protects established, trusted marketplace sellers from malicious profile updates on accounts that have been taken over. It may also catch synthetic identities and prevent them from selling non-existent goods. Cyber-criminals may collude, creating or taking over both buyer and seller accounts and then posting fake reviews in order to influence unsuspecting consumers into buying from the fraudulent buyer. |
Purchase | Digital.Credit | Credits/points for in-app purchases |
Digital.Giftcard | Allow good customers to buy gift cards that may be exchanged for goods. Fraudsters may take over accounts to purchase gift cards. Or, they may use synthetic identities with stolen credit card information. The fraudster then uses or sells the cards, which enable the transfer of credit without a direct connection to the stolen funds. | |
Digital.Marketplace | Secures purchases in online marketplaces for independent sellers and buyers. Fraudsters may take over accounts to purchase goods and change the email address and phone number so that they receive any messages with download links. Or, they may use synthetic identities to buy goods with stolen credit card information. Sellers and buyers may also collude to manipulate demand and price. | |
Digital.Product | Enables legitimate consumers to buy digital goods such as games and software. Fraudsters may use synthetic identities to buy products with stolen credit card information, download them and then delete the accounts. Or, they may take over established accounts, and update personal information, including email and phone, in order to intercept communications such as access instructions or purchase confirmations. | |
Digital.Subscription | Ensures good customers can subscribe to online services. Fraudsters may use synthetic identities with stolen credit card information or gift cards to reduce audit trails. They must provide legitimate email addresses where they will receive crucial communications, including activation. Digital: Subscription evaluates the trustworthiness of account, billing, and device information, including their connectivity which helps reveal synthetic identities. | |
Digital.Ticket | Protects ticket purchases, such as for events and travel. Fraudsters may take over accounts and use their funds to buy tickets. They may also create accounts for synthetic identities in order to buy tickets using stolen credit card information. | |
Physical.Delivered | Physical good purchase, delivered in person by a courier (Food Delivery) | |
Physical.Marketplace | Safeguards in-person purchases at marketplaces. A bad actor may purchase physical items using stolen credit cards, or with gift cards bought with stolen funds. They may also use their phones as payment devices via digital wallets that they have connected to stolen cards or other funds. | |
Physical.Pickedup | Safeguards in-person purchases at marketplaces. A bad actor may purchase physical items using stolen credit cards, or with gift cards bought with stolen funds. They may also use their phones as payment devices via digital wallets that they have connected to stolen cards or other funds. | |
Physical.Shipped | Assesses the trustworthiness of physical addresses for in-person purchases. In-store systems can send address information to Pipl Trust, which examines the information, including its connections and any associated risk signals. | |
Rental | Protects from the rental of goods using a false identity and payment information. Fraudsters may create accounts using synthetic or stolen identities and then use stolen credit card information in order to rent goods. If they are approved, they may steal the goods—which may be high-value, such as cars. Pipl weighs the trustworthiness of the identity information and many other factors such as device characteristics for online orders. | |
Share | Account | Catches attempts by multiple people to use the same credentials for a single site. While some sites and apps allow multiple users within a family, household, or another group, account-sharing frequently falls outside of terms of service. For example, sharing may be limited by geographic restrictions. For example, if an account is typically accessed by members of a household located in the United States, but another user consistently logs into the account from Europe, this may be suspicious. |
Signup | Marketplace.Seller | Protects from malicious attempts to gain access to marketplace sites as sellers. Using synthetic identities, fraudsters who establish digital storefronts may collude with fraudulent seller accounts to artificially influence reviews or manipulate pricing and demand. |
Subscribe | Protects from bad actors who subscribe to paid social media sites with the express goal of abusing them. Fraudsters may use social engineering methods to gather sensitive personal information about other members. They may spread misinformation or seek to disrupt otherwise stable communities. Pipl Trust confirms trustworthiness before you grant access, for example by detecting attempts to synthesize fake identities. | |
Trial | Protects from bad actors who sign up for trials for any type of site or application. Pipl Trust confirms trustworthiness before you grant access, for example by detecting attempts to synthesize fake identities. |