UK Scam Pattern · Updated 2026-04

Triangle fraud on marketplaces

In triangle fraud, a fraudster buys goods from a genuine seller using stolen card data, then resells to a genuine buyer. Both end up as victims — the seller faces a chargeback, the buyer may hold stolen goods.

37%
of Brits scammed on a marketplace
Experian
73%
of UK purchase fraud starts on FB Marketplace
TSB
18%
of victims recover any money
Cifas
£85k
APP reimbursement cap (Oct 2024)
PSR

Free download. iOS & Android. UK-first.

Triangle fraud uses stolen card data to simultaneously victimise a genuine seller and a genuine buyer. The fraudster buys from the seller with a stolen card, sells the goods to an unsuspecting buyer for cash, and disappears before the chargeback lands. Both parties lose: the seller loses goods and payment; the buyer may legally hold stolen property. Use SilentID Trust Passport to verify who you are transacting with before goods change hands.

What is the triangle fraud marketplace scam?

Triangle fraud is one of the more sophisticated UK marketplace fraud patterns precisely because neither the seller nor the buyer suspects anything unusual until after the transaction completes. The fraudster occupies the central point of a three-way transaction: they purchase goods from a genuine seller using stolen card or account data, then immediately resell those goods to a genuine buyer for cash or a legitimate payment, before the original payment is reversed by chargeback.

The result: the genuine seller loses their goods and has their payment clawed back. The genuine buyer has paid real money for goods that were technically purchased fraudulently — which in some circumstances means they hold property that could be reclaimed by the real cardholder or retailer. Action Fraud receives reports of this pattern across Facebook Marketplace, Vinted, Depop, and Gumtree.

How does triangle fraud on marketplaces work?

  1. 01

    Fraudster identifies a genuine listing

    A seller lists a high-value item — phone, laptop, designer goods, games console — at a fair market price. The fraudster selects it as a target.

  2. 02

    Purchase is made using stolen card data

    The fraudster pays using a compromised card or account. The payment looks legitimate to the seller. Platforms process it and may even confirm it.

  3. 03

    Goods are collected or delivered quickly

    The fraudster pushes for fast collection or express shipping, because they need the goods in hand before the stolen card is flagged and the transaction reversed.

  4. 04

    Fraudster resells to genuine buyer

    They list the item — often slightly below market to shift it quickly — and sell it to a genuine buyer for cash or a legitimate payment.

  5. 05

    Original cardholder files chargeback

    When the real cardholder sees the transaction, they dispute it. The chargeback reverses the payment from whoever received it — which may be the platform or the seller's account.

  6. 06

    Seller has neither goods nor money

    Goods were released. Payment was reversed. The fraudster has clean cash from the buyer, the genuine buyer may hold goods with a legal complication, and the seller has nothing.

What should you do if you suspect triangle fraud?

  • As a seller: for high-value items, use PIN Pickup through SilentID — both sides are identity-verified through Trust Passport, making it significantly harder to transact under a stolen identity.
  • If a chargeback arrives on a transaction you believed was legitimate, report it to Action Fraud on 0300 123 2040 and provide all transaction evidence.
  • As a buyer: if you have purchased goods that you later discover may have been bought with stolen card data, report to Action Fraud and, if the goods are traceable, to the original retailer. Acting immediately protects your position.
  • Document everything — messages, payment confirmations, shipping records, and communications are all evidence for Action Fraud and for your bank’s APP fraud reimbursement claim.

How does SilentID reduce triangle fraud risk?

Trust Passport requires biometric identity verification from both parties before a PIN Pickup transaction completes. This creates a real-identity record of who conducted the transaction — something that is extremely difficult for a fraudster to fake at scale. For in-person marketplace sales, the combination of a verified identity on both sides and a payment held in escrow until physical handover significantly raises the cost and complexity of triangle fraud compared to unverified payment methods.

7 warning signs of triangle fraud on marketplaces

Triangle fraud is sophisticated — these signals apply whether you are the seller or the buyer in the chain.

  1. You are buying — the seller's price is very competitive but their profile is thin

    A triangle fraudster is spending stolen money, so they may price items aggressively to move them fast. A very new, thin profile selling multiple high-value items at competitive prices is a risk flag.

  2. You are selling — buyer pays from an unfamiliar card or account type

    Triangle fraud often involves a commercial prepaid card, a name that does not match the platform profile, or a rapid payment at an unusual time. These are signs the payment may be from a compromised card.

  3. Buyer insists on faster-than-normal posting or collection

    The fraudster needs the goods in their hands before the stolen card's owner reports the card lost or before the chargeback window allows the real cardholder to reclaim the money.

  4. A chargeback arrives weeks after you sold and dispatched goods

    The real cardholder disputes the charge when they see their statement. The chargeback claws back the sale amount from the platform or from you — leaving you with no goods and no money.

  5. The buyer in a resale chain disappears after chargeback lands

    If you are the middle buyer in a triangle, the person you bought from may have already been paid legitimately (with stolen funds) — meaning the chargeback falls on a different party in the chain.

  6. Platform flags the transaction for review shortly after completion

    Vinted and Depop in particular have automated card-fraud signals. If a platform puts a hold on a completed transaction, do not release goods until the hold is lifted and payment is confirmed real.

  7. Multiple items purchased from you in a single session

    A fraudster spending stolen card credit wants to maximise the value extracted before detection. Buying several high-value items at once is a pattern consistent with card-fraud purchasing.

Frequently asked questions

Triangle fraud involves three parties: a genuine seller, a genuine buyer, and a fraudster in the middle. The fraudster buys from the genuine seller using stolen card data, receives the goods, and resells them to the genuine buyer for cash. The original cardholder then files a chargeback, and the genuine seller loses both their goods and the payment. In some variants, the genuine buyer also loses money or receives stolen goods with legal consequences.
Available now

Verify identity — not just payment

Download SilentID. Trust Passport verifies both sides before any money moves. Triangle fraud requires anonymous parties — Trust Passport removes anonymity.

100% passwordless. UK-based. GDPR-native.

·

Reviewed by the SilentID editorial team. We update each guide quarterly with new UK fraud data.