Recover 4x more chargebacks and prevent up to 90% of incoming ones, powered by AI and a global network of 15,000 merchants.
P2P payments prioritize speed over reversibility, making them prime targets for fraud, especially Authorized Push Payment (APP) scams, where users willingly send money to fraudsters. Losses are surging. Billions are lost annually, and recovery is often impossible. Unlike cards, P2P lacks chargebacks and strong protections. Fraud thrives on instant settlement, social engineering, and fragmented ecosystems. Prevention must happen before payment: verify identities, delay fulfillment, and flag high-risk behavior with Chargeflow Prevent. As regulation tightens, platforms are adding friction, but liability still largely falls on users and merchants.
Peer-to-peer (P2P) systems emerged from a cultural convergence. A mobile-first generation's demand for speed. A post-recession distrust of traditional banks. And a sharing economy that normalized peer transactions.
By transforming the act of moving money into a seamless, social experience, these platforms stripped away the friction and formality of traditional finance. And the market rewarded the design. U.S. P2P mobile payment transaction value reached $2 trillion in 2025, with continued strong growth expected into 2026.
But where liquidity flows, risk compounds. The same speed and embedded trust that fueled adoption have also driven a surge in P2P fraud. Deloitte’s analysis of FTC data indicates that P2P fraud led to an estimated $8.3 billion in losses in 2024, with projections rising to $14.9 billion by 2028.
Because these apps mimic cash transactions between friends, they lack the protections inherent to credit cards. Scammers weaponize the platform’s speed to ensure that by the time the victim realizes what happened, the P2P fraud is complete. The money is already gone.
P2P fraud generally refers to a deceptive activity conducted through digital payment platforms that results in non-reversible financial loss. Unlike traditional payment fraud involving stolen cards, most P2P fraud centers on Authorized Push Payments (APP).
In APP scams, the victim is manipulated into voluntarily initiating and authorizing the transfer. The system functions as intended, but the recipient is a fraudster.
Because payments are authorized by the victim and settle instantly (or near-instantly), recovery is often impossible once funds leave the ecosystem. Platforms and banks frequently decline refunds for authorized transfers, treating them like irrevocable cash handoffs.
Platforms like Zelle, Venmo, Cash App, and PayPal are surging in popularity. At the same time, fraud is getting more professional. P2P fraud exploits fundamental vulnerabilities that distinguish it from traditional payment fraud:
The P2P fraud landscape is moving from opportunistic scams into organized criminal infrastructure. Here are some notable trends:
Fraudsters construct synthetic identities by combining real data stolen from breaches (e.g., a genuine SSN) with fabricated information (a fake name or altered address). These synthetic identities can evade automated KYC controls when verification relies primarily on document and data matching rather than behavioral context. Once established, these accounts become a reusable fraud tapestry.
A single synthetic identity can serve as a money mule endpoint for months across multiple fraud schemes before detection. The Federal Reserve has called synthetic identity fraud “the fastest-growing type of financial crime in the United States.”
Fraudsters now use publicly available templates to generate convincing forgeries of bank statements, utility bills, and incorporation certificates.
More sophisticated operations employ AI to create realistic-looking documents that pass automated verification. These fake documents enable account creation across multiple platforms. The rise of “template farms” and AI-generated documents means platforms can no longer rely exclusively on document verification.
Cifas reported a 26% increase in business accounts bearing money mule characteristics in 2020. This trend has persisted as overall money mule activity continues to grow, with over 34,000 suspected money mule cases reported in 2024 alone.
Fraudsters specifically seek business account holders because larger transaction volumes appear less suspicious than the same amount moving through personal accounts.
Zelle leads in dollar volume due to bank integration, with a reported average of $3.4 billion moved on Zelle every day in 2025, and a record 100 million bank and credit union accounts on Zelle in December 2025.
Reported fraud rates appear low (e.g., Zelle 0.02% of transactions per operator disclosure), but underreporting and low reimbursements for APP scams may mask real risks.
P2P apps often serve as primary off-ramps for high-loss scams, especially through bank transfers/crypto.
While the FTC did not break down scam categories by payment method and reports off-ramps (e.g., P2P apps, bank transfers, cryptocurrency) only in aggregate, it is clear that a significant portion of high-loss scams involve instant payment rails.
Ages shape P2P fraud exposure: Younger folks report higher victimization rates (digital/job access); older populations suffer high-value/per-incident losses (complex schemes).
Overall, 41% or 4 in 10 U.S. adults have lost money or information to some form of fraud; 84% of U.S. consumers have used a P2P payment app at least once.
The regulatory landscape for P2P has shifted from guidance to heavy penalties. For merchants, this signals that platforms may soon implement more aggressive (and potentially disruptive) fraud filters to satisfy regulators.
Under this pressure, platforms have improved buyer dispute processes and refunds while imposing stricter controls, holds, and restrictions on merchant accounts to curb high-risk activity and reduce fraud exposure.
UK APP fraud losses reached £485.2 million in 2023 and surged 12% the first half of 2025 to £257.5 million despite coordinated industry prevention efforts.
The UK’s Payment System Regulator had implemented mandatory reimbursement rules for APP scams. This shifted liability from victims to payment providers under defined conditions. This policy shift is significant not only for consumer protection but also for measurement. When reimbursement is mandatory and reporting is standardized, incentives to minimize or obscure fraud volumes are reduced.
These centralized regulatory reporting requirements in the United Kingdom provide one of the clearest available views into the scale of authorized payment fraud in a mature instant-payment ecosystem.
P2P Fraud and P2P Scams refer to deceptive activities on peer-to-peer payment platforms. The terms are generally used loosely or interchangeably to mean the same thing in everyday talk. Nevertheless, financial institutions, regulators, such as the CFPB, and fraud experts draw a clear distinction between the two concepts. The primary yardstick is the authorization, whether the victim knowingly approved the transfer or not.
This authorization footnote is vital because it directly affects recovery chances under U.S. laws like the Electronic Fund Transfer Act (EFTA) and Regulation E:
P2P platforms have reported a mix of unauthorized fraud (account takeovers) and authorized scams (tricked transfers). As expressed in previous sections, scams often exploit urgency, trust, or “mistakes.” Common P2P fraud and scams include:
A scammer sends you money “by mistake” (often through a stolen card), then asks you to refund the excess or return it. But days or weeks later, the original payment gets reversed by the platform or bank because:
A scammer poses as your bank, government agency, utility company, or loved one in distress, claiming urgent issues and urges you to send money through P2P to resolve the issue or secure funds.
This could happen on sites like Facebook Marketplace or Craigslist, with a buyer insisting on P2P payment for goods. They may overpay and request a refund, send payment from a stolen or compromised account, or use fake payment confirmations.
Once you hand over the item, the payment reverses as fraudulent, leaving you without the goods or the money.
Fake emails/texts impersonating your app or bank trick you into sharing login details, verification codes, or clicking malicious links. Once scammers capture your credentials, they gain full access to your account and initiate unauthorized transfers, drain linked bank accounts, or request money from your contacts, all without your knowledge.
The scammer pretends to be from your bank or P2P platform’s fraud department, claims there’s suspicious activity, and instructs you to send money to yourself or transfer funds to a ‘secure’ account to verify your identity or protect your money.
The account they provide is actually controlled by the scammer. Your bank will never ask you to send money to verify your identity.
Scammers build trust over time through online relationships (romance), promises of high returns (investment), or fake employment opportunities (jobs), then request P2P funds for ‘emergencies,’ ‘investment fees,’ ‘shipping costs,’ or ‘work expenses.’
Victims send money voluntarily, believing the relationship, opportunity, or job is real. These patterns persist, with social media being the major origin of many scams.
P2P scams thrive due to a confluence of factors, including, but not limited to:
P2P platforms collapsed the mental friction that traditionally protected consumers during financial transactions. When paying by check or card, there’s an implicit pause: writing out amounts, reviewing statements, and waiting for clearing.
P2P eliminated that cognitive buffer. The action feels more like sending a text than transferring money. This perception gap is what fraudsters exploit.
Research shows victims of P2P scams often describe feeling they were just helping or handling something quickly. The interface design, casual, social, and frictionless, undermines the financial gravity of the action.
By the time the brain registers this as a significant transaction, the send button has already been pressed.
Traditional payment systems verify the recipient's legitimacy through institutional relationships. When you pay a merchant with a credit card, the card network has vetted that merchant, assigned them a merchant ID, and monitors transaction patterns.
P2P platforms verify identity at account creation. However, it never verifies relationship legitimacy at transaction time.
A platform knows User A is sending $X to User B. It cannot know whether User B is actually User A’s landlord, a romance scammer, or a money mule recruited last week. The transaction clears based on authentication (is this really User A sending?), not authorization context (should User A be sending to User B?).
This void is now beginning to close as the March 2026 Nacha mandates force banks to shift from 'identity-only' verification to 'behavioral context' monitoring.
Most P2P fraud goes unreported. Victims cite embarrassment, perceived futility, or uncertainty about where to report. This underreporting creates a measurement problem that obscures the true scale and enables platforms to publish low rates that don’t reflect victim experience.
Fraud data is fragmented across banks, platforms, regulators, and law enforcement, meaning no single institution sees the full lifecycle of a scam.
Even when scams are identified, enforcement faces jurisdictional and resource constraints. A scammer in Southeast Asia uses a U.S.-based P2P platform to deceive a victim in Texas.
Funds pass through money mules in three states before being redirected to cryptocurrency in another country. Which agency has jurisdiction? Which has the resources to pursue a $3,500 loss when processing the case costs more?
Fraudsters understand this. They keep the individual losses below felony thresholds, operate across jurisdictions, and move money quickly enough that by the time law enforcement responds, the trail is cold.
Whether a victim is refunded depends more on circumstances than policy. Was it unauthorized fraud or an authorized scam? Which platform was used? Which bank? Did the victim report before a given period? Can they prove they didn’t authorize the P2P fraud?
This inconsistency creates perverse incentives. Victims learn that claiming unauthorized offers better odds of reimbursement, while platforms respond by tightening reimbursement criteria. The cycle continues.
Given the call for oversight, P2P platforms are progressively deploying multiple fraud detection systems to identify fraud before funds exit the system. Examples include:
Despite this, authorized scams are harder to catch pre-send, as they mimic legitimate user activity.
Here are some recommended pre-transaction controls merchants can implement for risk mitigation in P2P fraud environments:
This list is non-exhaustive. In most authorized P2P transfers, liability rests with the sender, not the system. If a transaction feels rushed, unusual, or involves someone with sketchy details, the safest bet is not to send.
No legitimate entity will penalize you for taking time to verify. Scammers, however, count on you not taking that time.
Train staff to recognize merchant-targeted scams:
Even then, authorized APP transfers remain difficult to reverse. This reality reinforces why P2P fraud mitigation must focus on pre-send interventions rather than post-loss remediation.
The regulatory landscape is shifting from voluntary measures to mandatory accountability. Current key efforts include:
P2P platforms revolutionized payments with unmatched speed and social ease. Yet their frictionless UX has exposed merchants to irreversible fraud risks and shoppers to easy manipulation. They have historically had minimal seller protections, unlike card networks’ safeguards.
As fraud surges and regulatory pressure mounts (CFPB penalties, Nacha 2026 “False Pretenses” monitoring), institutions are tightening controls, extending holds, and prioritizing buyer disputes. This increasingly resembles the known chargeback risks, where merchants are often guilty until proven innocent.
To minimize exposure, you must now treat P2P like digital checks. Add a 24-48 hour settlement buffer, apply clear “PURCHASE” labels, and maintain robust audit trails (screenshots, purchase proofs). Documentation is your strongest defense against freezes and reversals.
Ultimately, specialized tools help close the P2P fraud loopholes scammers exploit. Chargeflow Prevent excels here. The AI-powered post-purchase fraud detection blocks high-risk orders before fulfillment, cutting disputes by up to 90%. Scan your first 1,000 transactions free: visit chargeflow.io/products/prevent today!
Recover 4x more chargebacks and prevent up to 90% of incoming ones, powered by AI and a global network of 15,000 merchants.
Chargeflow collects data from dozens of third party signals, automatically. This allows for much more coverage and much better win rates because the evidence submitted is much more comprehensive and compelling.
Chargeflow collects data like order info, customer messages, and payment details. It builds a full dispute case for you, so you don’t have to lift a finger.
Yes! Chargeflow works with 50+ payment processors. That means one tool for all your chargebacks, no matter how you process payments.
You only pay a percentage of the revenue we help you recover. No upfront fees, no subscriptions — just success-based pricing.
Yes. Chargeflow is SOC 2 Type 2, GDPR, and ISO certified. We use top security standards to keep your data safe.
Have a question? We’re here to help. Just hit the chat button to initiate a conversation with support.