
Card-not-present fraud — usually shortened to CNP fraud — is any fraudulent transaction made without the physical card being presented to the merchant. The category includes anything paid for online, by phone, by mail, or by email. CNP fraud is a subset of payment-card fraud generally, but in the US, where the EMV liability shift in October 2015 drove down counterfeit card-present fraud, CNP has become the largest remaining fraud category by dollar value.
Federal Reserve Payments Study and Nilson Report figures put US CNP losses at well over 70 percent of total card-fraud losses by value, and the trend line keeps moving in one direction.
A phone payment looks superficially safer than an online payment because there's a human on the other end of the line. In fraud-detection terms, that human is mostly working blind. They can't see the card. They can't verify the cardholder. They can't check the device or browser fingerprint. They're listening to a stranger read out card numbers, and the controls available to them are largely after-the-fact — AVS results, CVV match, fraud-screen score.
That's why phone payments contribute disproportionately to CNP fraud loss for any US contact center that processes them. The fraud rate per transaction is typically two to four times higher than e-commerce.
Five patterns dominate US phone-payment fraud in 2026:
Account takeover with social engineering.The fraudster has obtained the cardholder's name, address, date of birth, and last few transactions from a separate breach (the supply of which never seems to dry up). They call the contact center claiming to be the cardholder, pass identity verification, and either change the registered shipping address (so future fraudulent online orders ship to them) or place a phone order with the new shipping address.
BIN testing through low-value transactions. The fraudster runs a series of small phone-payment transactions through different agents over a short window to identify cards that pass authorization. Sequential card numbers, similar amounts, geographically inconsistent billing addresses.
Refund fraud.The fraudster places a legitimate phone order using a stolen card, then calls back claiming the order didn't arrive and requests a refund to a different card or bank account. Combined with friendly fraud, this is the fastest-growing pattern in US e-commerce-adjacent contact centers.
Synthetic identity sign-up.A new account or recurring-payment mandate is set up using a constructed identity — real name and date of birth and address, but for different people. Per the Federal Reserve, synthetic identity is now the fastest-growing form of US financial fraud. Phone-payment flows that aren't tied to a strong identity verification step are particularly exposed.
Agent-side internal fraud. Less common but the most damaging per incident. An agent records or memorizes card details from inbound calls and uses them later. Almost always involves call recordings that captured DTMF tones or cards spoken aloud, which agents replay outside the contact-center environment.
The fifth pattern is the one DTMF masking eliminates entirely. The first four need operational and technical controls together.
The strongest single technical control against phone-payment CNP fraud is removing card data from the agent leg in the first place. If the agent never hears or sees the card details, internal fraud is structurally impossible and the call recording can't be replayed to harvest card data. That's what DTMF masking does — the customer keys their card details on their handset, the tones are intercepted before they reach the agent's audio, and the recording captures silence in place of card data.
Around DTMF masking, the standard CNP fraud control stack applies:
No single control catches everything. The combination matters more than any individual layer.
Three operational controls quietly do most of the work:
Agent training on social-engineering patterns. Most phone-payment account takeovers fail because an agent notices something off — caller hesitates on a security question, asks about transactions the cardholder would already know, gets aggressive when challenged on identity. Training agents on these patterns and giving them an explicit escalation path is more effective than any automated control.
Escalation thresholds. A high-value transaction or a change-of-address request should trigger a defined escalation pattern — call-back to the registered phone number, verification through a second channel, or referral to a fraud team. The threshold should be set at the level where false-positive friction is worth the avoided loss.
Chargeback feedback loops.When chargebacks come back from the issuer, the contact center needs to learn from them. Most contact centers treat chargebacks as a finance problem rather than a fraud-prevention signal. Closing this loop reduces fraud-detection blind spots and helps your team build a real picture of where you're actually losing money.
Paytia is a phone-payment security platform. The flagship product, DTMF masking, removes card data from the agent leg, the call recording, and the contact-center LAN — closing the internal-fraud surface area entirely and making the call-recording archive unable to be used as a card-harvesting source. Paytia has been PCI DSS Level 1 since founding — the highest tier, maintained through every revision of the standard. Up to 96 percent of contact-center PCI scope can be removed by routing card capture through Paytia, which means the controls listed above can be focused where they actually move fraud rates rather than spread thin across an oversized environment.
If you're sizing a CNP fraud prevention program for a US contact center and you're not sure where DTMF masking and secure phone payments fit, talk to Paytia. We'll walk through your current call leg in 30 minutes and tell you what's exposed and what isn't.
Used by British American Tobacco · Howard Kennedy · CITB · Clinical Partners · Trinity Hall College
Since 2016
Building secure payments
PCI DSS Level 1
Highest certification
99.99%
Platform uptime
£40M+
Transactions processed