Finic
All field notes

Fraud Strategy

The most expensive fraud event is the one you haven't named yet

Rules and models are useful once a pattern has a name. Organized fraud rings make money before that.

Jason Fan
6 min read

Fraud programs are strongest after the pattern is obvious

Most fraud stacks are built to get better after a pattern has already hurt someone. A rule is written after investigators understand the pattern. A model improves after the label exists. A playbook gets cleaner after operations has handled the case a few dozen times.

That is useful work. It is also reactive work. The expensive window is the period before the pattern has a name inside your organization, when a coordinated ring is still being treated as a handful of unrelated cases.

If you only measure how well your controls stop known fraud, you miss the part of the job that matters most: finding the thing your stack is not looking for yet.

Organized rings exploit the gap between first occurrence and first detection

This gap is getting easier for criminals to exploit. FinCEN said on November 13, 2024 that it had seen an increase in suspicious activity reporting describing the suspected use of deepfake media in fraud schemes beginning in 2023 and continuing in 2024. That matters because identity attacks are becoming cheaper to manufacture and harder to dismiss early.1

TransUnion's H1 2026 fraud report made the same point from a different angle. The overall suspected digital fraud rate declined to 3.8% in 2025, but account takeover, account creation fraud, consumer-reported scams, and breach severity still accelerated. That is what a harder fraud environment looks like: less noisy in aggregate, more dangerous at the edge.2

The FBI's Internet Crime Complaint Center also warned on November 25, 2025 that it had received more than 5,100 complaints tied to account takeover fraud through impersonation of financial institution support, with losses above $262 million since January 2025. FTC data added a broader consumer view: reported fraud losses reached more than $12.5 billion in 2024.34

Why reactive controls miss ring behavior

A single account often looks ordinary in isolation. The pattern shows up one layer higher: shared devices, repeated profile edits, unusual dispute timing, copy-and-paste language in support chats, or small clusters of profiles moving in lockstep.5

Rules engines are good at catching known patterns one event at a time. Case queues are good at helping people resolve the alerts that already exist. Neither is designed to continuously ask whether separate low-signal events belong to the same coordinated entity set.5

That is why fraud teams can feel busy and still be late. The workflow is optimized for handling alerts, not for discovering the hidden network that should have generated the alert in the first place.

A discovery layer should do four things

The answer is not to throw away rules, models, or your case system. The answer is to add a discovery layer that is explicitly responsible for finding what the rest of the stack has not named yet.5

  • Search across structured and unstructured data instead of waiting for a single threshold breach.
  • Link entities into networks through shared identifiers, behavior, timing, and external signals.
  • Build an evidentiary case that an investigator can audit, not just a score with no explanation.
  • Turn the finding into durable detection so the next version of the pattern is harder to monetize.

Measure the work before and after money movement

Fraud teams usually have no trouble counting alerts, but alert volume is a weak proxy for whether discovery is working. A better measurement system asks how much loss you prevented before money moved and how much labor you saved by deflecting bad activity before it became a case.

At Finic, we scope pilots around two operating metrics: average loss per entity per fraud event and savings per alert deflected. The point is not to create prettier dashboards. The point is to know whether you are finding fraud earlier enough for the economics to change.5

Earlier detection is not just a speed metric. It is the difference between documenting a ring after the losses and interrupting it while the opportunity is still small.

The first question to ask

A good fraud team already knows its false-positive rate, model lift, and queue times. The harder question is this: how much visibility do you have into organized fraud activity before it shows up as losses, disputes, or account takeover investigations?

If the honest answer is 'not much,' the next system you add should not be another layer that waits for labeled history. It should be a layer built to discover the unlabeled pattern while it is still early.

References

Sources

  1. 1FinCEN alert on deepfake fraud targeting financial institutionsPublished November 13, 2024.
  2. 2TransUnion H1 2026 Top Fraud Trends reportPublished April 16, 2026.
  3. 3FBI IC3 alert on account takeover via impersonation of financial institution supportPublished November 25, 2025.
  4. 4FTC Consumer Sentinel Network Data Book 2024Published March 10, 2025.
  5. 5Finic company source of truthInternal source: COMPANY.md updated May 6, 2026.