Second-party fraud

Second-party fraud occurs when a legitimate customer willingly shares their identity or account with a fraudster, either for financial gain or under coercion. Unlike first-party fraud (self-fraud) or third-party fraud (identity theft), second-party fraud involves a complicit party lending access.

About Second-party fraud

What is the difference between second-party and third-party fraud?

In second-party fraud, the victim is involved—intentionally or unintentionally. For example, someone might give their account to a friend who then conducts fraudulent activity. In third-party fraud, the perpetrator steals someone’s identity without their knowledge to commit fraud.

What are some examples of second-party fraud?

Examples include parents allowing children to open accounts with false information, individuals renting out their verified bank accounts (a practice known as “money muling”), or account holders letting fraudsters use their digital wallets in exchange for a fee. This type of fraud often blurs the line between victim and accomplice.

What are the most common challenges with this topic?

Second-party fraud is hard to detect because it uses real identities and verified accounts. Businesses may struggle to prove intent, making enforcement or legal action difficult. Traditional fraud detection systems may not flag these activities until significant damage has occurred, especially if the primary account holder continues to deny wrongdoing. ---

Secure verifications for every industry

We provide templated identity verification workflows for common industries and can further design tailored workflows for your specific business.