Skip to content

Payment Cloaking Scenarios

High-risk merchants employ a spectrum of evasion techniques, ranging from crude redirect methods to sophisticated, API-driven obfuscation networks.

This section dissects these methodologies, analyzing their technical architecture, detection signals, and risk scores.


🧬 Topology Classification

We categorize scenarios by complexity and obfuscation level.

Level 1: Direct Evasion (Low Complexity)

Level 2: Redirect & Masking (Medium Complexity)

Level 3: Network Obfuscation (High Complexity)


📊 Comparative Risk Analysis

ScenarioTechnical CostDetection DifficultyPrimary Risk
Single-SiteLowLowInstant Ban
Two-Site RedirectLowMediumReferrer Leaks
API CloakingMediumHighBehavioral Analysis
Bridge NetworkHighHighNetwork Clustering
Device CloakingHighVery HighSandbox Evasion

🧠 Risk Engine Capabilities

Modern PSPs (Stripe, Adyen, PayPal) utilize different layers of detection for these scenarios:

  • Stripe: Heavily relies on Shadow Crawling and JS Telemetry (Stripe.js) to fingerprint the origin page.
  • Adyen: Focuses on MCC Consistency and Shopper DNA (Graph Analysis).
  • PayPal: Uses massive historical data to detect Account Linking and Velocity Anomalies.

Start with: Single-Site High-Risk

Risk Science Documentation - Payment Cloaking & Evasion