Digital Lending Platform Stops a Synthetic Identity Bust-Out Campaign Before First Disbursement

Executive Summary

Synthetic identity fraud is the fastest-growing financial crime in the United States. Unlike account takeover, which targets real people’s existing accounts, synthetic identity fraud exploits the onboarding process itself, combining real and fabricated identity attributes to create borrower profiles that pass automated KYC and credit checks, establish account history, and ultimately execute bust-out events that generate losses with no recoverable asset. For digital lenders with streamlined, low-friction onboarding, the structural exposure is significant. 

This case study examines how a digital lending platform integrated Constella’s identity intelligence API into its onboarding risk workflow and identified a coordinated 340-application synthetic identity campaign before a single dollar was disbursed, generating an estimated $4.2 million in fraud loss avoidance and producing attribution intelligence sufficient for a consolidated Suspicious Activity Report filing. 

The Challenge: The Onboarding Blind Spot 

The platform’s onboarding flow was designed for conversion: minimal friction, fast decisioning, and a credit model that optimized approval rates while maintaining acceptable loss ratios. Applicants submitted name, Social Security Number, date of birth, contact details, and income information. The platform’s KYC process verified document authenticity and ran credit bureau checks. Applications passing these controls moved to automated underwriting. 

What the platform could not see was the external identity history of the submitted attributes. The credit bureau check verified that a Social Security Number had credit history. It could not determine whether the email address, phone number, or physical address submitted alongside that SSN had ever been associated with that identity in any verified context, or whether those attributes had been fabricated specifically to pass automated verification. 

Over a six-week period, 340 loan applications were submitted to the platform. Each application used a real Social Security Number paired with fabricated supporting PII: email addresses registered within the past 30 days, prepaid phone numbers with no prior identity associations, and physical addresses in high-density urban areas used across multiple applications. The credit scores associated with the real SSNs were sufficient to pass automated underwriting. None of the applications triggered fraud alerts.  

The platform’s fraud team identified the pattern during a routine portfolio review: an unusual concentration of applications with very new email addresses, a geographic clustering of physical addresses, and a higher-than-normal rate of applications requesting maximum loan amounts on first draw. The team suspected synthetic identity fraud but had no systematic tool to confirm the hypothesis or identify the full scope of the campaign. 

The Structural Problem with KYC-Only Onboarding Controls 

Standard KYC controls verify that a submitted identity document is genuine and that the applicant’s stated identity has a verifiable credit or legal record. They are designed to prevent impersonation of real individuals and to satisfy regulatory identity verification obligations. They are not designed to detect synthetic identity construction, because synthetic identities are built to pass KYC: the SSN is real, the document is genuine, and the credit history is legitimate. 

The gap that synthetic identity exploits is the absence of external identity context around the non-document attributes. A real person applying for credit will have an email address with years of verified associations across multiple platforms, a phone number linked to their name in carrier and identity databases, and a physical address that appears consistently across multiple sources. A synthetic identity will typically have none of these: the email is new and isolated, the phone is unverified, and the address appears in multiple unrelated applications at scale. 

This pattern is invisible to KYC document verification and credit bureau checks. It is detectable through external identity intelligence that maps the historical associations and exposure history of submitted attributes against a comprehensive identity data lake. 

The Solution: Onboarding Enrichment with External Identity Intelligence 

The platform integrated Constella’s Identity Intelligence API into the onboarding risk scoring workflow as a secondary signal layer, querying submitted email addresses, phone numbers, and physical addresses against Constella’s 54.6 billion record identity data lake before the application reached the automated underwriting stage. 

The integration generated two categories of enrichment signals: 

  • Identity History Absence Signals: Email addresses with zero breach history, zero dark web appearances, and zero identity association matches indicated creation within days or weeks of application submission, a pattern inconsistent with a legitimate borrower’s digital footprint. Phone numbers with no identity associations in the Constella data lake, particularly prepaid or VoIP numbers, generated secondary flags. These signals did not automatically decline an application but elevated it to a fraud review queue. 
  • Cross-Application Attribute Overlap: When the same physical address, phone number, or email domain pattern appeared across multiple applications over a short period, Constella’s identity enrichment surfaced the overlap, allowing the fraud team to identify the shared infrastructure linking apparently independent applications to a common synthetic identity operation. 

Applications triggering either signal category were routed to a manual fraud review queue rather than automated underwriting. The fraud team assessed each flagged application against the Constella enrichment data, conducted additional verification steps for high-risk attribute combinations, and made final disposition decisions with full attribution context. 

The Result: $4.2 Million in Fraud Loss Avoidance 

Of the 340 suspected synthetic identity applications, Constella’s onboarding enrichment flagged 312 for fraud review. Manual review confirmed synthetic identity fraud in all 312 flagged cases: 289 were declined prior to disbursement, and 23 required additional adverse action documentation for regulatory compliance. The 28 applications that did not trigger Constella flags were approved and subsequently performed within normal portfolio parameters, confirming the signal’s precision. 

The financial impact was direct and measurable: 

  • $4.2 million in estimated fraud loss avoidance, calculated against the average first-draw disbursement amount for the flagged loan category and the historical bust-out timing for synthetic identity portfolios. 
  • A consolidated SAR filing was submitted to FinCEN covering the full 312-application campaign. The filing included the identity attribute overlap analysis generated through Hunter’s investigative capability, linking the applications to a common infrastructure pattern and providing law enforcement with actionable attribution data. 
  • The platform’s fraud review queue efficiency improved materially: because Constella’s signals identified a specific, high-confidence cohort, the 312 flagged applications represented a precision-targeted review population rather than a broad suspicious-application sweep requiring hundreds of hours of manual investigation. 
  • The synthetic identity detection capability was extended to the platform’s account monitoring workflow, enabling ongoing surveillance of the approved portfolio for bust-out indicators using the same identity attribute enrichment signals applied at onboarding. 

Key Outcomes:  

  • 312 of 340 synthetic identity applications were identified and declined before disbursement 
  • $4.2 million in estimated fraud loss avoidance 
  • Consolidated SAR filing submitted to FinCEN with full campaign attribution 
  • Fraud review queue converted from broad surveillance to precision-targeted investigation 
  • Synthetic identity monitoring extended to ongoing portfolio surveillance post-deployment 
How does identity intelligence detect synthetic identities that pass KYC?

KYC controls verify document authenticity and the existence of a legal identity record. They do not assess the external history of the non-document attributes submitted alongside those documents. Constella’s identity intelligence evaluates the full submitted attribute set against a 54.6 billion record data lake of breach, exposure, and identity association history. Email addresses, phone numbers, and physical addresses associated with genuine identities have verifiable histories across multiple contexts. Synthetic attributes typically do not. This external history signal is what Constella surfaces at the point of onboarding, before the application reaches underwriting. 

What is a bust-out fraud event in digital lending?

Bust-out fraud is the terminal phase of a synthetic identity operation. The fraudster establishes a synthetic identity, builds credit history over weeks or months by making small, on-time payments, obtains maximum credit lines or loan amounts, draws the full balance, and disappears with the funds. The synthetic identity has no real person behind it, so there is no recoverable asset and no collections path. Digital lenders are primary targets because their streamlined onboarding and fast funding timelines reduce the window for detection before disbursement. 

Why did the SAR filing require a consolidated approach rather than individual filings?

Individual SAR filings for each application would have described 312 apparently unrelated fraud incidents without surfacing the coordinated campaign structure. The Hunter-generated attribution analysis revealed the shared identity infrastructure linking the applications, including overlapping physical addresses, domain registration patterns in submitted email addresses, and phone number characteristics consistent with a common procurement source. A consolidated SAR communicating the full campaign scope is significantly more actionable for law enforcement than 312 individual filings describing isolated events. 

 

Synthetic identity fraud succeeds when lenders can only see what the applicant submits. The SSN is real, the document is genuine, and the credit score is sufficient. The fabrication is in the surrounding attributes, and those attributes are only detectable through external intelligence that maps identity history against a comprehensive data lake.  

For this platform, Constella’s onboarding enrichment converted an invisible threat into a detectable, stoppable campaign, generating $4.2 million in fraud loss avoidance before a single dollar moved. The capability did not require changes to the customer-facing onboarding flow or the credit underwriting model. It required only the addition of an external intelligence layer that could see what the submitted attributes actually represented. 

Ready to add external identity intelligence to your onboarding risk workflow?

REQUEST A DEMO