CNP Fraud Prevention

Card-not-present fraud — how it works and how contact centres prevent it

Card-not-present fraud is the dominant fraud vector for any business taking payments over the phone. The card is not physically present, the cardholder is not physically present, and the fraudster has the same surface area to work with as a legitimate customer. The controls that prevent CNP fraud are different from the controls that prevent in-store fraud, and the patterns contact centres see day-to-day are different again. Below: what CNP fraud actually is, why phone payments sit at the centre of it, the patterns to watch for, and the technical and operational controls that work.

What CNP fraud actually is

Card-not-present fraud — usually shortened to CNP fraud — is any fraudulent transaction made without the physical card being presented to the merchant. The category includes anything paid for online, by phone, by post, or by email. CNP fraud is a subset of payment-card fraud generally, but in markets where chip-and-PIN has driven down counterfeit and lost-or-stolen card-present fraud, CNP has become the largest remaining fraud category by value.

UK Finance figures put CNP losses at around 80 per cent of total card-fraud losses by value. A similar pattern holds in the US, where CNP fraud overtook card-present fraud after the 2015 EMV liability shift.

Why phone payments sit in CNP territory

A phone payment looks superficially safer than an online payment because there's a human on the other end of the line. In fraud-detection terms, that human is mostly working blind. They cannot see the card. They cannot verify the cardholder. They cannot check the device or browser fingerprint. They are listening to a stranger read out card numbers, and the controls available to them are largely after-the-fact — AVS results, CVV match, fraud-screen score.

This is why phone payments contribute disproportionately to CNP fraud loss for any contact centre that processes them. The fraud rate per transaction is typically two to four times higher than e-commerce.

The fraud patterns contact centres see most

Five patterns dominate phone-payment fraud in 2026:

Account takeover with social engineering.The fraudster has obtained the cardholder's name, address, date of birth, and last few transactions from a separate breach. They call the contact centre claiming to be the cardholder, pass identity verification, and either change the registered address (so future fraudulent online orders ship to them) or place a phone order with the new shipping address.

BIN testing through low-value transactions. The fraudster runs a series of small phone-payment transactions through different agents over a short window to identify cards that pass authorisation. Sequential card numbers, similar amounts, geographically inconsistent billing addresses.

Refund fraud.The fraudster places a legitimate phone order using a stolen card, then calls back claiming the order didn't arrive and requests a refund to a different card or bank account.

Synthetic identity sign-up.A new account or recurring-payment mandate is set up using a constructed identity — real name, real date of birth, real address, but for different people. Phone-payment flows that aren't tied to a strong identity verification step are particularly exposed.

Agent-side internal fraud. Less common but the most damaging per incident. An agent records or memorises card details from inbound calls and uses them later. Almost always involves call recordings that captured DTMF tones or cards spoken aloud, which agents replay outside the contact-centre environment.

The fifth pattern is the one DTMF masking eliminates entirely. The first four require operational and technical controls together.

The technical controls that work

The strongest single technical control against phone-payment CNP fraud is removing card data from the agent leg in the first place. If the agent never hears or sees the card details, internal fraud is structurally impossible and the call recording cannot be replayed to harvest card data. This is what DTMF masking does — the customer keys their card details on their handset, the tones are intercepted before they reach the agent's audio, and the recording captures silence in place of card data.

Around DTMF masking, the standard CNP fraud control stack applies:

No single control catches everything. The combination matters more than any individual layer. For the broader compliance context behind these controls, see our overview of PCI DSS v4.0.1 for contact centres.

The operational controls that matter

Three operational controls quietly do most of the work:

Agent training on social-engineering patterns. Most phone-payment account takeovers fail because an agent notices something off — caller hesitates on the maiden name question, asks about transactions the cardholder would already know, gets aggressive when challenged on identity. Training agents on these patterns and giving them an explicit escalation path is more effective than any automated control.

Escalation thresholds. A high-value transaction or a change-of-address request should trigger a defined escalation pattern — call-back to the registered phone number, verification through a second channel, or referral to a fraud team. The threshold should be set at the level where false-positive friction is worth the avoided loss.

Chargeback feedback loops. When chargebacks come back from the issuer, the contact centre needs to learn from them. Most contact centres treat chargebacks as a finance problem rather than a fraud-prevention signal. Closing this loop reduces fraud-detection blind spots.

Where Paytia fits

Paytia is a phone-payment security platform. The flagship product, DTMF masking, removes card data from the agent leg, the call recording, and the contact-centre LAN — closing the internal-fraud surface area entirely and making the call-recording archive unable to be used as a card-harvesting source. Paytia has been PCI DSS Level 1 since founding — the highest tier, maintained through every revision of the standard. Up to 96 per cent of contact-centre PCI scope can be removed by routing card capture through Paytia, which means the controls listed above can be focused where they actually move fraud rates rather than spread thin across an oversized environment.

If you're sizing a CNP fraud prevention programme for a contact centre and you're not sure where DTMF masking and secure phone payments fit, talk to a Paytia specialist. We can walk through your current call leg in 30 minutes and tell you what's exposed and what isn't.

FAQ

Frequently asked questions

What does CNP fraud stand for?
CNP stands for "card not present." CNP fraud is any payment-card fraud where the physical card is not presented to the merchant — most often online, by phone, by post, or by email transactions.
Why is phone payment a high CNP fraud risk?
Phone agents work mostly blind on fraud signals. They can't see the card, the cardholder, or any device or browser fingerprint. The available controls are mostly after-the-fact authorisation results. The fraud rate per phone transaction is typically two to four times higher than the e-commerce equivalent.
Does DTMF masking prevent CNP fraud?
DTMF masking eliminates the agent-side internal fraud pattern (where agents capture and replay card details) and prevents call recordings from being used as a card-harvesting source. It does not prevent external CNP fraud — for that, AVS, CVV verification, 3D Secure 2, tokenisation, velocity rules, and operational controls work in combination.
What are the most common CNP fraud patterns in contact centres?
Account takeover with social engineering, BIN testing through low-value transactions, refund fraud, synthetic identity sign-up, and agent-side internal fraud. The first four require combined technical and operational controls; the fifth is structurally eliminated by DTMF masking.
How do 3D Secure, AVS, and CVV checks fit into CNP fraud prevention?
They sit alongside one another. 3D Secure 2 catches account-takeover patterns by pushing authentication to the cardholder's device. AVS catches geographic mismatches in billing addresses. CVV verification catches stolen-card-number-without-card-back-of-physical-card scenarios. None of them catch agent-side internal fraud — only DTMF masking does that.

Used by British American Tobacco · Howard Kennedy · CITB · Clinical Partners · Trinity Hall College

Since 2016

Building secure payments

PCI DSS Level 1

Highest certification

99.99%

Platform uptime

£40M+

Transactions processed