Blogs
>
Why PayFacs and ISOs Face VAMP Fees for Acquirer-Level Exposure They Didn't Create

Why PayFacs and ISOs Face VAMP Fees for Acquirer-Level Exposure They Didn't Create

When Acquirers Enter Visa's Monitoring Program, Downstream Partners Pay the Price. Here's How to Prove Your Merchants Aren't the Problem.
Noam Izhaki
Jan 20, 2026
Share:

Index

Some payment facilitators (PayFacs) and independent sales organizations (ISOs) are now receiving requests from their acquiring banks to pay fees related to Visa's Acquirer Monitoring Program (VAMP). In several recent cases we have reviewed, detailed transaction data shows a disconnect: the PayFac or ISO merchants are not the ones driving the acquirer's VAMP exposure.

This pattern is increasing. An acquirer enters VAMP monitoring, then allocates costs or remediation requirements downstream to PayFacs and ISOs in their portfolio. The problem is structural. VAMP is assessed at the acquirer's total card-not-present (CNP) portfolio level, not at the individual PayFac level. This creates a misattribution risk.

How VAMP Monitoring Works

VAMP is fundamentally a performance model, not a merchant category code (MCC) model. Visa monitors acquirers based on a count-based ratio calculated from CNP activity:

(TC40 fraud reports + TC15 dispute claims) ÷ TC05 settled transactions

VAMP ratio

VAMP Ratio Calculation

Count of Fraud Advices (TC40) plus Disputes (TC15), divided by the count of Sales Transactions (TC05).

VAMP Ratio = Count of [Fraud Advices (TC40) + Disputes (TC15)] ÷ Count of Sales Transactions (TC05)
TC40 Fraud Advices TC15 Disputes TC05 Sales Transactions

Visa also monitors card testing activity, known as enumeration, through authorization behavior patterns. This means an acquirer can be flagged for VAMP monitoring even when dispute ratios appear acceptable if there is detectable enumeration activity in the portfolio.

When an acquirer's ratio crosses Visa's threshold, the acquirer enters monitoring. Visa may impose penalties, require action plans, or in severe cases, restrict processing capabilities.

The challenge for PayFacs and ISOs is that they operate as a subset of the acquirer's total portfolio. If the acquirer is flagged, the acquirer may look downstream to allocate responsibility. However, VAMP metrics aggregate across all merchants processed by the acquirer, not just those onboarded through a specific PayFac or ISO.

Why PayFacs and ISOs Are Being Pulled In

In practice, we see acquirers taking one of two approaches when they enter VAMP:

  1. Blanket allocation:
    The acquirer distributes VAMP-related fees or requirements across all downstream partners, regardless of actual contribution to the metrics.
  2. Segment-based allocation:
    The acquirer attempts to identify which sub-portfolios are driving the ratio, but without granular data, this can still result in misattribution.

The second approach is more defensible, but only if the data is accurate. In cases we have reviewed, the actual drivers of VAMP exposure were legacy merchant portfolios, high-risk verticals processed directly by the acquirer, or other downstream partners with weaker underwriting standards.

Example: Timeline Misalignment

In one case we analyzed, an acquirer entered VAMP monitoring in Q2 2025. A PayFac partner had onboarded merchants starting in Q4 2024. The acquirer attributed a portion of VAMP costs to this PayFac.

When we examined the transaction data:

  • The PayFac's merchants contributed a small percentage of the acquirer's total CNP volume.
  • The TC40 and TC15 reports from this merchant set accounted for an even smaller percentage of the acquirer's total fraud and dispute count.
  • The acquirer's VAMP ratio had been deteriorating since Q1 2024, quarters before the PayFac onboarding began.

The ratio pressure was driven by existing merchants in unrelated verticals. The PayFac merchants were performing better than the portfolio average.

How to Demonstrate Non-Attribution

PayFacs and ISOs that are being asked to absorb VAMP costs should approach this with transaction-level evidence. The conversation needs to shift from assumptions to data.

1. Segmented Ratio Attribution

Break the acquirer's VAMP ratio into components:

  • TC40 fraud report count from your merchant portfolio
  • TC15 dispute claim count from your merchant portfolio
  • TC05 settled transaction count from your merchant portfolio

Calculate the ratio for your sub-portfolio and compare it to the overall acquirer ratio.
If your ratio is significantly below the acquirer's threshold, this is direct evidence that your merchants are not the source of VAMP pressure.

We recommend requesting monthly TC40, TC15, and TC05 reports segmented by merchant identification number (MID) from the acquirer.
Most acquirers have access to this data through their Visa reporting dashboards but do not proactively segment it.

2. Enumeration Signal Isolation

Card testing (enumeration) is a distinct VAMP trigger. It involves automated scripts testing stolen card numbers through small authorization attempts.
Visa detects this through patterns such as:

  • High authorization-to-settlement ratio
  • Repeated declines on the same card range
  • Multiple low-value authorizations in short time windows

Demonstrate whether confirmed enumeration activity is occurring on your merchant set or elsewhere in the acquirer portfolio. This typically requires authorization-level data, not just settlement data.

In one case we reviewed, an acquirer flagged a marketplace platform for enumeration activity. The platform's authorization decline rate was within industry norms for their vertical.
The actual enumeration was traced to a separate merchant group processing digital goods with an elevated decline rate and clear bot traffic signatures.

3. Merchant-Level Risk Mechanics

Show that your merchants do not exhibit the operating patterns that typically drive VAMP exposure:

  • Low refund friction: Clear refund policies, responsive customer service, low forced reversal rates.
  • Clear fulfillment evidence: Tracking numbers, delivery confirmation, service completion records.
  • Stable volume patterns: Predictable transaction volume without sudden spikes or drops.
  • Strong authorization velocity controls: Limits on repeated authorization attempts, device fingerprinting, behavioral analysis.
  • Minimal account takeover (ATO) exposure: Multi-factor authentication, session monitoring, anomaly detection on login patterns.

These controls are measurable. We look for evidence such as refund-to-sale ratios below 5%, chargeback rates below 0.50%, and authorization retry limits enforced at the gateway level.
Merchants with strong risk mechanics are statistically less likely to generate TC40 and TC15 reports.

4. Time Alignment Analysis

Overlay the acquirer's VAMP ratio deterioration timeline with your merchant onboarding dates. If the ratio worsened before your merchants began processing, or if the deterioration rate did not change after onboarding, this supports non-attribution.

Request month-over-month VAMP ratio data from the acquirer. Compare:

  • Ratio 6 months before your onboarding
  • Ratio at onboarding
  • Ratio 3 months post-onboarding
  • Ratio at current date

If the slope of deterioration remains constant or improves post-onboarding, your merchants are not the driver.


Example: Authorization Velocity Analysis

In another case, a PayFac was asked to implement additional enumeration controls after their acquirer entered VAMP. We analyzed authorization patterns across the PayFac's merchant portfolio:

  • Average authorizations per unique card: 1.8 per day
  • Authorization retry rate after initial decline: 8%
  • Velocity blocks triggered: less than 0.1% of transactions

These metrics indicated normal consumer behavior, not card testing activity. When the acquirer examined their full portfolio, they identified a different merchant segment with:

  • Average authorizations per unique card: 47 per day
  • Authorization retry rate: 73%
  • Clear patterns of sequential card number testing

The enumeration pressure was concentrated in merchants the PayFac had not onboarded.

What This Means in Practice

PayFacs and ISOs should not be absorbing VAMP-related penalties simply because they exist in an acquirer's portfolio. Responsibility needs to follow measurable contribution, not convenience.

When the conversation is grounded in TC40, TC15, TC05, and authorization-level enumeration data, the allocation discussion changes. Acquirers that operate with transparency and segmented reporting can identify the actual sources of VAMP pressure. Those that do not often default to blanket allocation, which penalizes well-performing partners.

We recommend that PayFacs and ISOs:

  • Request segmented VAMP data as part of their acquirer agreement.
  • Include data access clauses in processing contracts to enable ratio attribution.
  • Monitor their own sub-portfolio VAMP metrics proactively, before entering a dispute.
  • Maintain evidence of merchant risk controls, fulfillment practices, and fraud prevention measures.

This is not a theoretical exercise. In cases we have reviewed, teams that bring transaction-level data to VAMP allocation discussions have successfully challenged unwarranted fees. Those that rely on aggregate assurances or reputation are more likely to absorb costs they did not create.

Operationalizing Attribution

The attribution model described here requires infrastructure. Risk teams need:

  • Real-time access to TC40, TC15, and TC05 counts at the MID level.
  • Authorization attempt monitoring to detect enumeration patterns.
  • Merchant-level risk scoring that tracks refund rates, chargeback rates, and fulfillment quality.
  • Historical trend analysis to overlay onboarding timelines with ratio deterioration.

Most acquirers do not provide this level of reporting by default. PayFacs and ISOs that build or integrate these capabilities are better positioned to defend against misattributed VAMP costs.

Ballerine's Role

Building a VAMP attribution case requires organized merchant data and clear documentation of risk controls. Ballerine provides merchant risk infrastructure that helps PayFacs and ISOs maintain visibility into their merchant portfolios.

Our platform supports merchant monitoring and partner oversight, helping risk teams analyze merchant business models, track policy compliance, and identify potential violations. While we do not calculate VAMP ratios or provide TC40/TC15 data (which comes from card schemes and acquirers), we help organize merchant-level evidence that can support attribution discussions.

Teams use our tools to document merchant risk mechanics, track fulfillment practices, and maintain audit trails that demonstrate portfolio quality. This type of structured merchant data can be relevant when discussing responsibility for acquirer-level VAMP exposure.

Learn more about our merchant monitoring and partner oversight capabilities.

Related Questions

Reeza Hendricks

Some payment facilitators (PayFacs) and independent sales organizations (ISOs) are now receiving requests from their acquiring banks to pay fees related to Visa's Acquirer Monitoring Program (VAMP). In several recent cases we have reviewed, detailed transaction data shows a disconnect: the PayFac or ISO merchants are not the ones driving the acquirer's VAMP exposure.

This pattern is increasing. An acquirer enters VAMP monitoring, then allocates costs or remediation requirements downstream to PayFacs and ISOs in their portfolio. The problem is structural. VAMP is assessed at the acquirer's total card-not-present (CNP) portfolio level, not at the individual PayFac level. This creates a misattribution risk.

How VAMP Monitoring Works

VAMP is fundamentally a performance model, not a merchant category code (MCC) model. Visa monitors acquirers based on a count-based ratio calculated from CNP activity:

(TC40 fraud reports + TC15 dispute claims) ÷ TC05 settled transactions

VAMP ratio

VAMP Ratio Calculation

Count of Fraud Advices (TC40) plus Disputes (TC15), divided by the count of Sales Transactions (TC05).

VAMP Ratio = Count of [Fraud Advices (TC40) + Disputes (TC15)] ÷ Count of Sales Transactions (TC05)
TC40 Fraud Advices TC15 Disputes TC05 Sales Transactions

Visa also monitors card testing activity, known as enumeration, through authorization behavior patterns. This means an acquirer can be flagged for VAMP monitoring even when dispute ratios appear acceptable if there is detectable enumeration activity in the portfolio.

When an acquirer's ratio crosses Visa's threshold, the acquirer enters monitoring. Visa may impose penalties, require action plans, or in severe cases, restrict processing capabilities.

The challenge for PayFacs and ISOs is that they operate as a subset of the acquirer's total portfolio. If the acquirer is flagged, the acquirer may look downstream to allocate responsibility. However, VAMP metrics aggregate across all merchants processed by the acquirer, not just those onboarded through a specific PayFac or ISO.

Why PayFacs and ISOs Are Being Pulled In

In practice, we see acquirers taking one of two approaches when they enter VAMP:

  1. Blanket allocation:
    The acquirer distributes VAMP-related fees or requirements across all downstream partners, regardless of actual contribution to the metrics.
  2. Segment-based allocation:
    The acquirer attempts to identify which sub-portfolios are driving the ratio, but without granular data, this can still result in misattribution.

The second approach is more defensible, but only if the data is accurate. In cases we have reviewed, the actual drivers of VAMP exposure were legacy merchant portfolios, high-risk verticals processed directly by the acquirer, or other downstream partners with weaker underwriting standards.

Example: Timeline Misalignment

In one case we analyzed, an acquirer entered VAMP monitoring in Q2 2025. A PayFac partner had onboarded merchants starting in Q4 2024. The acquirer attributed a portion of VAMP costs to this PayFac.

When we examined the transaction data:

  • The PayFac's merchants contributed a small percentage of the acquirer's total CNP volume.
  • The TC40 and TC15 reports from this merchant set accounted for an even smaller percentage of the acquirer's total fraud and dispute count.
  • The acquirer's VAMP ratio had been deteriorating since Q1 2024, quarters before the PayFac onboarding began.

The ratio pressure was driven by existing merchants in unrelated verticals. The PayFac merchants were performing better than the portfolio average.

How to Demonstrate Non-Attribution

PayFacs and ISOs that are being asked to absorb VAMP costs should approach this with transaction-level evidence. The conversation needs to shift from assumptions to data.

1. Segmented Ratio Attribution

Break the acquirer's VAMP ratio into components:

  • TC40 fraud report count from your merchant portfolio
  • TC15 dispute claim count from your merchant portfolio
  • TC05 settled transaction count from your merchant portfolio

Calculate the ratio for your sub-portfolio and compare it to the overall acquirer ratio.
If your ratio is significantly below the acquirer's threshold, this is direct evidence that your merchants are not the source of VAMP pressure.

We recommend requesting monthly TC40, TC15, and TC05 reports segmented by merchant identification number (MID) from the acquirer.
Most acquirers have access to this data through their Visa reporting dashboards but do not proactively segment it.

2. Enumeration Signal Isolation

Card testing (enumeration) is a distinct VAMP trigger. It involves automated scripts testing stolen card numbers through small authorization attempts.
Visa detects this through patterns such as:

  • High authorization-to-settlement ratio
  • Repeated declines on the same card range
  • Multiple low-value authorizations in short time windows

Demonstrate whether confirmed enumeration activity is occurring on your merchant set or elsewhere in the acquirer portfolio. This typically requires authorization-level data, not just settlement data.

In one case we reviewed, an acquirer flagged a marketplace platform for enumeration activity. The platform's authorization decline rate was within industry norms for their vertical.
The actual enumeration was traced to a separate merchant group processing digital goods with an elevated decline rate and clear bot traffic signatures.

3. Merchant-Level Risk Mechanics

Show that your merchants do not exhibit the operating patterns that typically drive VAMP exposure:

  • Low refund friction: Clear refund policies, responsive customer service, low forced reversal rates.
  • Clear fulfillment evidence: Tracking numbers, delivery confirmation, service completion records.
  • Stable volume patterns: Predictable transaction volume without sudden spikes or drops.
  • Strong authorization velocity controls: Limits on repeated authorization attempts, device fingerprinting, behavioral analysis.
  • Minimal account takeover (ATO) exposure: Multi-factor authentication, session monitoring, anomaly detection on login patterns.

These controls are measurable. We look for evidence such as refund-to-sale ratios below 5%, chargeback rates below 0.50%, and authorization retry limits enforced at the gateway level.
Merchants with strong risk mechanics are statistically less likely to generate TC40 and TC15 reports.

4. Time Alignment Analysis

Overlay the acquirer's VAMP ratio deterioration timeline with your merchant onboarding dates. If the ratio worsened before your merchants began processing, or if the deterioration rate did not change after onboarding, this supports non-attribution.

Request month-over-month VAMP ratio data from the acquirer. Compare:

  • Ratio 6 months before your onboarding
  • Ratio at onboarding
  • Ratio 3 months post-onboarding
  • Ratio at current date

If the slope of deterioration remains constant or improves post-onboarding, your merchants are not the driver.


Example: Authorization Velocity Analysis

In another case, a PayFac was asked to implement additional enumeration controls after their acquirer entered VAMP. We analyzed authorization patterns across the PayFac's merchant portfolio:

  • Average authorizations per unique card: 1.8 per day
  • Authorization retry rate after initial decline: 8%
  • Velocity blocks triggered: less than 0.1% of transactions

These metrics indicated normal consumer behavior, not card testing activity. When the acquirer examined their full portfolio, they identified a different merchant segment with:

  • Average authorizations per unique card: 47 per day
  • Authorization retry rate: 73%
  • Clear patterns of sequential card number testing

The enumeration pressure was concentrated in merchants the PayFac had not onboarded.

What This Means in Practice

PayFacs and ISOs should not be absorbing VAMP-related penalties simply because they exist in an acquirer's portfolio. Responsibility needs to follow measurable contribution, not convenience.

When the conversation is grounded in TC40, TC15, TC05, and authorization-level enumeration data, the allocation discussion changes. Acquirers that operate with transparency and segmented reporting can identify the actual sources of VAMP pressure. Those that do not often default to blanket allocation, which penalizes well-performing partners.

We recommend that PayFacs and ISOs:

  • Request segmented VAMP data as part of their acquirer agreement.
  • Include data access clauses in processing contracts to enable ratio attribution.
  • Monitor their own sub-portfolio VAMP metrics proactively, before entering a dispute.
  • Maintain evidence of merchant risk controls, fulfillment practices, and fraud prevention measures.

This is not a theoretical exercise. In cases we have reviewed, teams that bring transaction-level data to VAMP allocation discussions have successfully challenged unwarranted fees. Those that rely on aggregate assurances or reputation are more likely to absorb costs they did not create.

Operationalizing Attribution

The attribution model described here requires infrastructure. Risk teams need:

  • Real-time access to TC40, TC15, and TC05 counts at the MID level.
  • Authorization attempt monitoring to detect enumeration patterns.
  • Merchant-level risk scoring that tracks refund rates, chargeback rates, and fulfillment quality.
  • Historical trend analysis to overlay onboarding timelines with ratio deterioration.

Most acquirers do not provide this level of reporting by default. PayFacs and ISOs that build or integrate these capabilities are better positioned to defend against misattributed VAMP costs.

Ballerine's Role

Building a VAMP attribution case requires organized merchant data and clear documentation of risk controls. Ballerine provides merchant risk infrastructure that helps PayFacs and ISOs maintain visibility into their merchant portfolios.

Our platform supports merchant monitoring and partner oversight, helping risk teams analyze merchant business models, track policy compliance, and identify potential violations. While we do not calculate VAMP ratios or provide TC40/TC15 data (which comes from card schemes and acquirers), we help organize merchant-level evidence that can support attribution discussions.

Teams use our tools to document merchant risk mechanics, track fulfillment practices, and maintain audit trails that demonstrate portfolio quality. This type of structured merchant data can be relevant when discussing responsibility for acquirer-level VAMP exposure.

Learn more about our merchant monitoring and partner oversight capabilities.