Fraud challengesBeta
Learn about fraud challenges, an additional layer of verification for authorizations.
Turn on fraud challenges to:
- Minimize accidental blocks on transactions that appear fraudulent, but are in fact legitimate
- Conduct additional verification on authorizations Stripe deems high risk
- Conduct additional verification on authorizations you determine require it
Fraud challenges allow your cardholders to retry non-fraudulent transactions that would otherwise be blocked by fraud controls. When fraud challenges are enabled and a transaction is declined for fraud, Stripe sends the cardholder an SMS message. They can verify whether the transaction was fraudulent by replying to the message. All cardholders with an associated phone number can use fraud challenges.
Before you begin
- Make sure you’re collecting phone numbers for your cardholders
- Enable fraud challenges in your card issuing settings
High-risk transactions
Stripe blocks transactions above a certain risk level. The risk level of a transaction is determined by the network you’re using. High-risk authorizations are identified by a value of suspected_
in the request_history.reason field, and won’t trigger issuing.
webhooks when declined.
Fraud challenge flow
Stripe starts sending fraud challenges on high-risk authorizations as soon as you enable the feature in your card issuing settings.
You can see fraud challenge activity with the Authorizations API. Declined authorizations that were fraud-challenged have a value in the fraud_challenges field. Subsequent authorizations that the cardholder verifies as genuine have a value of true
in the verified_by_fraud_challenge field.
The following shows an example of a fraud-challenged and declined authorization:
{ "id": "iauth_1CmMk2IyNTgGDVfzFKlCm0gU", "object": "issuing_authorization", "approved": false, ... "fraud_challenges": [{ "channel": "sms", "status": "pending" }] }
This example shows a subsequent authorization that has been verified by the cardholder:
{ "id": "iauth_1CmMk28Jx923VfJJwMCejmX", "object": "issuing_authorization", "approved": true, ... "verified_by_fraud_challenge": true }
Note
Verified, genuine authorizations trigger issuing_
webhooks. If you use real-time authorization, consider verified_
when deciding whether to approve an authorization. If your cardholder has explicitly confirmed a transaction as genuine, we recommend that you don’t apply any of your own risk controls.
To use fraud challenges, make sure that:
- The phone number associated with your cardholder is valid and correct
- Existing transaction decline logic in any
issuing_
webhook handler doesn’t conflict with fraud challengesauthorization. request
Cardholder flow
Your cardholders might receive a challenge and contact your company’s customer service to learn more. Make sure your internal teams are prepared to answer questions that they might receive from your customers about these challenges.
When a cardholder receives a fraud challenge, they can override the declined transaction by verifying that the suspicious transaction is legitimate and initiated by them. Fraud challenges are only available to cardholders with an associated phone number.
The cardholder verifies the override with a one-time SMS prompt with the following language:
Did you attempt a [amount] transaction at [merchant]? Reply YES if you did, or NO if not. Reply STOP to opt out
If the cardholder replies “YES”, they receive the following:
Thanks, please wait a moment and try again.
To complete the purchase, the cardholder needs to initiate the transaction a second time. After retrying, they won’t receive the SMS prompt, and Stripe will not block the transaction for being high-risk. If the cardholder instead replies “NO”, they receive the following:
This transaction was declined. We recommend you cancel your card and request a new one. Review your account for other suspicious transactions.
Cardholders can reply “STOP” to opt out of fraud challenges, and “START” to opt back in again.
Trigger fraud challenges yourself
To send fraud challenges on authorizations that haven’t been blocked by Stripe, use real-time authorization webhooks. To trigger challenges in scenarios where you detect spending that appears suspicious and want additional verification (for example, a cardholder using their card out of the country), decline the issuing_
webhook and include the send_
field with the ["sms"]
value.
Here’s an example of how to trigger a fraud challenge in a webhook response:
Fraud challenges that you trigger yourself in webhook responses are sent even if the automatic sending of fraud challenges is disabled in your Issuing settings.
Fraud challenges for Connect platforms
If you use Connect with Stripe Issuing, turning on fraud challenges enables it for all cardholders across all connected accounts.
Availability
Fraud challenges are only available to cardholders with phone numbers in the following countries. Attempts to send fraud challenges to other phone numbers, or to cardholders who are physically outside of these countries, won’t be delivered.
- United Kingdom (+44)
- United States (+1)
Fraud challenges that can’t be delivered because of an unsupported country code have a status of undeliverable
.
Testing
Fraud challenge text messages are not sent to cardholders in test mode. To help you integrate with fraud challenges, Stripe provides helper APIs for simulating a fraud challenge flow, including sending and responding to a challenge.
Step 1: Challenge a high-risk test mode authorization
Use helper APIs to create a test mode authorization. The risk level of the authorization you create is controllable: you can create a high-risk authorization by overriding the default risk assessment with a high fraud risk level.
This authorization will be declined, with a reason
of suspected_
in its request_history. If fraud challenges are turned on, then a fraud challenge is created for this high-risk test mode authorization. See Before you begin for the steps required to turn on fraud challenges.
Alternatively, you can test fraud challenges by issuing a challenge yourself. To induce a fraud challenge in test mode, create a test mode authorization without a risk assessment override, and then respond to an issuing_
webhook. This method does not require fraud challenges to be turned on in your Issuing settings. Read more about how to trigger fraud challenges yourself in webhook responses.
Step 2: Simulate a response to the fraud challenge
After inducing a test mode fraud challenge, you can simulate a cardholder’s response using another helper API. Call the test mode fraud challenge response method, passing the ID of the authorization you created in step 1, and a confirmed
parameter.
Provide confirmed=true
to simulate the cardholder responding “yes, I made this transaction, and it isn’t fraudulent”. Provide confirmed=false
to simulate a response of “no, I did not make this transaction, it is fraudulent”.
Step 3: Try the high-risk authorization again
If you simulated a response of “yes, I made this transaction” (confirmed=true
), then you can try the high-risk test mode authorization again. This time, the authorization shouldn’t be declined, because you have simulated a scenario where the cardholder has indicated that the original, declined transaction is actually legitimate.
This new authorization shouldn’t be declined for suspected_
, and instead be approved. It might also be declined for other reasons (such as an insufficient test mode balance), look at the authorization’s request_history to learn more.
Additionally, this new authorization’s verified_by_fraud_challenge field will be true
. This indicates that the cardholder has previously completed a fraud challenge for a similar authorization (as simulated in step 2).
If you’re triggering fraud challenges yourself in a issuing_
webhook handler, then pay attention to the verified_
field. Stripe recommends that you don’t trigger a fraud challenge on authorizations that have been verified by a previous fraud challenge.