Back to Glossary

Card-Not-Present (CNP) Transaction

A Card-Not-Present (CNP) transaction is any payment where the physical card is not physically presented at the point of sale. Instead, the cardholder provides card details (Primary Account Number, expiry date, CVV) remotely through channels such as e-commerce websites, mobile applications, telephone orders, or mail orders.

Why CNP Transactions Present a Risk Challenge

CNP transactions account for the majority of payment card fraud. Unlike card-present transactions where the physical card can be inspected and chip technology (EMV) provides cryptographic authentication, CNP environments rely solely on data fields that can be compromised through data breaches, phishing, or account takeover.

Key challenges include:

  • No physical card verification: The merchant cannot inspect the card or verify the cardholder's identity in person.
  • Higher fraud rates: CNP fraud rates are substantially higher than card-present fraud due to the ease with which stolen card data can be used remotely.
  • Chargeback exposure: Merchants bear greater liability in CNP transactions. When a cardholder disputes a CNP transaction as unauthorized, the merchant often loses both the goods and the payment unless strong authentication was implemented.
  • Liability allocation complexity: Depending on authentication protocols used (such as 3D Secure), liability for fraudulent transactions may shift between issuer, acquirer, and merchant.
  • Higher interchange fees: Card networks typically charge higher interchange rates for CNP transactions to reflect the increased fraud risk.

For acquirers, Payment Facilitators (PayFacs), and Independent Sales Organizations (ISOs) supporting online merchants, CNP risk management is a core operational concern. Inadequate controls lead to elevated chargeback ratios, network fines, and potential loss of processing rights.

How to Manage CNP Transaction Risk

Effective CNP fraud prevention requires a layered approach combining authentication, transaction monitoring, and operational controls.

1. Implement Strong Customer Authentication (SCA)

Use 3D Secure 2 (3DS2) or equivalent protocols to authenticate the cardholder before authorizing the transaction. 3DS2 allows for risk-based authentication: low-risk transactions can proceed with frictionless flows, while higher-risk transactions trigger step-up challenges such as one-time passwords or biometric verification.

When properly implemented, 3DS2 shifts fraud liability from the merchant to the issuer (liability shift), significantly reducing chargeback risk.

2. Deploy Multi-Layered Verification Controls

Use a combination of technical controls at the point of transaction:

  • Card Verification Value (CVV/CVC): Require CVV entry to confirm the customer has access to the physical card or card data.
  • Address Verification Service (AVS): Match the billing address provided by the customer with the address on file at the issuing bank. Mismatches are a red flag for fraud.
  • Device fingerprinting: Collect device-level data (IP address, browser configuration, device ID) to identify returning customers and flag anomalies such as mismatched geolocation or high-risk devices.
  • Behavioral analytics: Monitor transaction patterns, velocity (e.g., multiple transactions in rapid succession), and changes in purchase behavior to detect account takeover or card testing.

3. Apply Risk-Based Transaction Decisioning

Not all CNP transactions carry equal risk. Use risk scoring models that incorporate:

  • Transaction amount and merchant category
  • Customer history and reputation
  • Device and geolocation signals
  • Time of day and velocity patterns

Route low-risk transactions through frictionless approval paths, while subjecting high-risk transactions to additional authentication or manual review. Machine learning models can be trained on historical fraud patterns to improve detection accuracy over time.

4. Monitor for Emerging Fraud Patterns

CNP fraud tactics evolve rapidly. Common patterns include:

  • Card testing: Fraudsters submit small-value transactions to verify stolen card numbers before making larger purchases.
  • Account takeover (ATO): Attackers compromise customer accounts and use saved payment methods to make fraudulent purchases.
  • Friendly fraud: Legitimate cardholders falsely dispute transactions to obtain refunds while retaining goods (chargeback abuse).

Establish automated alerts for unusual activity such as sudden spikes in declined transactions, geographic anomalies, or repeat failed authentication attempts.

5. Establish Clear Chargeback and Dispute Management Processes

Even with strong controls, some CNP fraud will result in chargebacks. Maintain detailed transaction records including timestamps, device data, authentication results, and proof of delivery. This evidence is critical for disputing invalid chargebacks (representment).

Track chargeback ratios by merchant and take corrective action before thresholds trigger network monitoring programs or penalties.

Example: CNP Risk in a Merchant Monitoring Context

An acquirer onboards an e-commerce merchant selling consumer electronics. During the underwriting phase, the acquirer notes the merchant operates solely online (100% CNP). Initial fraud checks show the merchant has implemented 3DS2 and AVS.

Three months post-boarding, the acquirer's monitoring system flags a spike in chargeback ratio (from 0.4% to 1.8% within two weeks). Investigation reveals:

  • A subset of transactions originated from high-risk geolocations not previously seen in the merchant's customer base.
  • Multiple chargebacks cite "card not present fraud" as the reason code.
  • The merchant had temporarily disabled 3DS2 to reduce cart abandonment, removing the liability shift.

The acquirer's risk team intervenes, requiring the merchant to re-enable 3DS2 and implement enhanced device fingerprinting. The chargeback ratio stabilizes within acceptable thresholds, avoiding further escalation.

This scenario illustrates how CNP risk manifests operationally and why continuous monitoring and enforcement of authentication controls are essential components of merchant monitoring and merchant underwriting programs.

Strategic Context: CNP and the Broader Payment Ecosystem

CNP transactions represent the primary revenue channel for online commerce, and their volume continues to grow. However, this growth brings systemic risk. Payment networks (Visa, Mastercard) have responded with increasingly stringent compliance requirements, including:

  • Mandatory Strong Customer Authentication in regions such as the European Economic Area (PSD2 SCA requirements).
  • Risk monitoring programs (e.g., Visa's Fraud Monitoring Program, Mastercard's Excessive Chargeback Program) that penalize acquirers and merchants with elevated fraud or chargeback rates.
  • Enhanced liability frameworks that shift responsibility for fraud based on authentication adoption.

For acquirers and PayFacs, CNP risk is not only a fraud issue but a regulatory and business continuity concern. Failure to manage CNP exposure can result in:

  • Network fines and increased assessments
  • Loss of merchant processing relationships
  • Reputational harm and difficulty attracting new merchant portfolios
  • Operational strain from chargeback disputes and fraud investigations

As CNP fraud tactics become more sophisticated (synthetic identity fraud, ATO at scale), payment providers must adopt adaptive risk management infrastructures that integrate real-time authentication, behavioral analysis, and transaction monitoring. This is where modern risk management infrastructure becomes critical.

Trusted by

Trusted by Leaders in the Payments Ecosystem

70%

Reduced manual efforts

49%

Improved review resolution time

30%

Increase in 
detected fraud

“We were able to downsize our compliance staff’s workload significantly, which allowed us to allocate the savings and workforce into more improvement projects.”

Shmulik Davar

VP Product at Fido

67%

Reduced Hiring Time

“Proactively navigating fintech regulations requires faster technology adoption. Next-gen compliance infrastructures should seamlessly integrate with existing and new systems and data sources.”

Ran Nachman

VP Regulation Solutions 
at eToro

67%

Reduced Hiring Time

“Proactively navigating fintech regulations requires faster technology adoption. Next-gen compliance infrastructures should seamlessly integrate with existing and new systems and data sources.”

Vicente Mederos

Head of Risk 

at Access Group

98%

Local Compliance

“User-friendly, reliable, and fast. It’s exactly what we needed to scale without adding complexity.”

Emily Rivera

Co-Founder

4.8 rating from 1.5k reviews

Author ImageAuthor ImageAuthor ImageAuthor Image

10+

Download from app store

Download for iOS

Ready to transform how your bank onboards, underwrites, and manages merchant risk?