eCommerce Fraud Knowledge Guide

Bust-Out Fraud

  1. Articles
  2. eCommerce Fraud
  3. Bust-Out Fraud
  4. Common Bust-Out Fraud Tactics
Bust-Out Fraud

Knowledge Guide Chapters

  1. What is Bust-Out Fraud?
  2. Bust-Out Fraud: Statistics & Financial Impact
  3. Common Bust-Out Fraud Tactics
  4. Bust-Out Fraud Examples
  5. How to Identify Bust-Out Fraud
  6. How to Prevent Bust-Out Fraud

Common Bust-Out Fraud TacticsThe Fraudster’s Multi-Step Playbook

Brandon Figueroa | September 1, 2025 | 3 min read
Common Bust-Out Fraud Tactics

Examining How Bust-Out Fraud Works

Although the act of “busting out” is a final, dramatic event, the process of committing bust-out fraud is a long and sophisticated collection of tactics.

Each stage in the scam — from the use of synthetic identities at account creation to seemingly normal purchasing activity — is designed to cause financial institutions and merchants to let their guard down. In this chapter, I’m gonna highlight these tactics so that you understand how a bust-out scheme happens from start to finish.

Bust-Out Fraud

Scammers often look like legitimate cardholders... at least until they suddenly don’t. Take bust-out fraud, for instance. This happens when a scammer uses a synthetic identity to open up credit cards with issuing banks, build up a credit history, then max out the card and disappear.

How Does Bust-Out Fraud Happen?

TL;DR

Fraudsters establish seemingly legitimate credit histories by making small purchases and timely payments over several months. Once they've built trust and increased credit limits, they suddenly max out all available credit across multiple accounts before disappearing without payment.

To start the scam, the fraudster needs one or more active Social Security numbers. These can be obtained first-hand through phishing. They can also be purchased in bulk off the dark web.

Certain bust-out schemes target consumers who already have excellent credit scores. The criminal could pose as the legitimate cardholder, or create a “Frankenstein”  synthetic identity. In either case, the account is fleshed out by adding fake contact information. More sophisticated scams include additional props, like phony social media accounts.

The fraudster may also look for individuals who have no credit rating at all. Children are popular targets, as are deceased individuals. It’s obviously more difficult to open a new account without a credit history, but that’s almost inconsequential. Even if the application is denied, the very act of asking for credit establishes a new credit history attached to that Social Security number.

Did You Know?

One in 50 children become victims of identity theft every year. In fact, children may be at even greater risk of identity theft than adults.

While a blank credit record will usually not satisfy Visa or Mastercard, it may be enough for the fraudster to open a department store or gas station charge account. The brand, type, and spending limit of the card aren’t important. Simply having an open account is enough to launch the scam. 

Once the account is established, the fraudster will go about nurturing and legitimizing it by making purchases and paying off the balance in full each month. Doing so helps earn them a reputation as a dependable, responsible borrower. Ironically, purchases and timely payments on each new card paint the fraudster as a lower credit risk.

Using “Cash Cycling” to Facilitate Bust-Out Scams

TL;DR

Fraudsters may use “cash-cycling” tactics, shifting debt between cards or loans to create the illusion of legitimate activity. This allows them to maintain access to funds and credit while having no intention of ever repaying what they owe.

At first glance, all these purchases may appear to be a financial investment in the scam. That’s not necessarily the case, though. The fraudster may be engaging in some form of “cash-cycling,” such as charging things on Card A, then taking advantage of interest-free transfer offers on Card B to pay off the original debt. 

The money stays in the criminal’s “network” while simultaneously helping them show activity on multiple cards. The fraudster may even go so far as to apply for a car loan or purchase a  high ticket item on a Buy Now, Pay Later plan. Of course, the buyer has no intention of repaying the lender.

Bust-out is just one of dozens of fraud types.

A comprehensive, multi-tiered management strategy is the best way to protect your revenue. Learn more.

Request a Demo
The Original End-to-End Chargeback Management Platform

Common Bust-Out Fraud Tactics

TL;DR

Common tactics used to create bust-out fraud include synthetic identities, address manipulation, authorized user exploitation, business account fraud, and account takeover.

By now, you should have gotten the core idea behind bust-out fraud. But, there are a lot of specific tactics that scammers can deploy to try and make sure you don’t pick up on their activity.

Understanding these common tactics can help merchants and financial institutions alike to recognize warning signs before it’s too late:

Synthetic Identity Creation

Criminals combine real and fabricated personal information to create entirely new identities that pass initial verification checks. These synthetic personas are used to open multiple credit accounts, often going undetected for months while building substantial debt loads.

Address Manipulation

Fraudsters can use mail forwarding services, temporary addresses, or accomplices’ addresses to establish accounts, then quickly change addresses to delay detection. This tactic makes it difficult for creditors to locate them when payments stop and creates confusion in tracking systems.

Authorized User Exploitation

Scammers add synthetic or stolen identities as authorized users on a pre-established account to build a credit profile as quickly as possible. They then use these newly credible profiles to open additional accounts before executing the bust-out across their entire portfolio.

Business Account Fraud

Criminals establish fake businesses with fabricated credentials to open commercial credit lines and merchant accounts. They process fraudulent transactions or max out business credit before vanishing, leaving behind shell companies with no recoverable assets.

Account Takeover Bust-Outs

Fraudsters gain control of existing accounts through credential theft or social engineering, then rapidly increase credit limits and max out available funds. This method leverages the established trust and credit history of legitimate account holders for immediate high-value theft.

Next Chapter

Bust-Out Fraud Examples

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form