Jupiter | Identifying Synthetic ID Fraud and Safeguarding Customer Journey
Jupiter | Identifying Synthetic ID Fraud and Safeguarding Customer Journey
Jupiter | Identifying Synthetic ID Fraud and Safeguarding Customer Journey
Sophisticated scammers took advantage of the convenient and simplified experience of Jupiter's BNPL app. Jupiter Edge, the app, needed a risk assessment solution to identify such scammers and block them from using abusing the system. Here's how Bureau tackled the problem.
Author
Team Bureau




TABLE OF CONTENTS
See Less
Meet Jupiter
Jupiter, a leading neobank based in India recently forayed into micro-loans with Jupiter Edge, a ‘Buy Now, Pay Later’ (BNPL) app that offers consumers a small-ticket line of credit based on their credit score and other risk indicators.
Jupiter Edge wanted customers to enjoy a speedy experience by providing an instant line of credit via real-time access to fresh funds. To achieve this, only basic Know Your Customer (KYC) checks were implemented. Unfortunately, this opened it up to sophisticated scammers taking advantage of the convenient, simplified experience.
The Challenge
Fraudsters tried to exploit Jupiter Edge’s instant line of credit offering by abusing the promotional offers. In one such incident, the scammers availed themselves of instant credit using stolen IDs across multiple devices, then bypassed security and KYC checks to make transactions against the line of credit before absconding.
They also used app cloners to create duplicate applications, thus multiplying the abuse, leading to substantial financial losses. Jupiter Edge was in dire need of a risk assessment solution that could identify such scammers and block them from using the app.
The Solution: Identifying fraudulent users speedily
Bureau’s suite of tools helped Jupiter Edge uncover the modus operandi (MO) of the fraudsters and deter potential threats, without sacrificing the instant access to funds customers had come to love.
Bureau’s Device Intelligence helped uncover a coordinated attack in which scammers utilised fake IDs coupled with clones apps.
Jupiter Edge strengthened security without compromising the user experience by leveraging Bureau’s intelligence behind a user’s email, phone number, and device.
Based on the genuineness of the name, phone number, and email, it used Bureau’s ID match scores to determine the user’s true identity versus the presented identity.
Bureau’s device intelligence and fingerprinting worked silently in the background to provide critical information, including the use of malicious apps, faked IP location, and anomalous behaviour biometrics; which taken together points to suspicious users.

The Result: Blocked fraud and unlocked real growth
“Bureau’s solution to identify fraudsters via detailed analysis helped us tweak our customer onboarding and protect against third-party fraud,” highlighted Vishakha Gupta, Risk Manager at Jupiter. Bureau’s ID match and device intelligence honed in and prevented a large-coordinated fraud ring attack within a day.
This clan of 500+ fraudsters used coordinated attacks from a specific location. Acting on Bureau’s intimation, Jupiter Edge prevented any money movement before the fraudsters could abuse any credit line then, ghost.
“More importantly, I’ve never come across a team as responsive as Bureau - that made the integration, usage, and post-facto analysis so much easier and faster,” adds Vishakha.
Meet Jupiter
Jupiter, a leading neobank based in India recently forayed into micro-loans with Jupiter Edge, a ‘Buy Now, Pay Later’ (BNPL) app that offers consumers a small-ticket line of credit based on their credit score and other risk indicators.
Jupiter Edge wanted customers to enjoy a speedy experience by providing an instant line of credit via real-time access to fresh funds. To achieve this, only basic Know Your Customer (KYC) checks were implemented. Unfortunately, this opened it up to sophisticated scammers taking advantage of the convenient, simplified experience.
The Challenge
Fraudsters tried to exploit Jupiter Edge’s instant line of credit offering by abusing the promotional offers. In one such incident, the scammers availed themselves of instant credit using stolen IDs across multiple devices, then bypassed security and KYC checks to make transactions against the line of credit before absconding.
They also used app cloners to create duplicate applications, thus multiplying the abuse, leading to substantial financial losses. Jupiter Edge was in dire need of a risk assessment solution that could identify such scammers and block them from using the app.
The Solution: Identifying fraudulent users speedily
Bureau’s suite of tools helped Jupiter Edge uncover the modus operandi (MO) of the fraudsters and deter potential threats, without sacrificing the instant access to funds customers had come to love.
Bureau’s Device Intelligence helped uncover a coordinated attack in which scammers utilised fake IDs coupled with clones apps.
Jupiter Edge strengthened security without compromising the user experience by leveraging Bureau’s intelligence behind a user’s email, phone number, and device.
Based on the genuineness of the name, phone number, and email, it used Bureau’s ID match scores to determine the user’s true identity versus the presented identity.
Bureau’s device intelligence and fingerprinting worked silently in the background to provide critical information, including the use of malicious apps, faked IP location, and anomalous behaviour biometrics; which taken together points to suspicious users.

The Result: Blocked fraud and unlocked real growth
“Bureau’s solution to identify fraudsters via detailed analysis helped us tweak our customer onboarding and protect against third-party fraud,” highlighted Vishakha Gupta, Risk Manager at Jupiter. Bureau’s ID match and device intelligence honed in and prevented a large-coordinated fraud ring attack within a day.
This clan of 500+ fraudsters used coordinated attacks from a specific location. Acting on Bureau’s intimation, Jupiter Edge prevented any money movement before the fraudsters could abuse any credit line then, ghost.
“More importantly, I’ve never come across a team as responsive as Bureau - that made the integration, usage, and post-facto analysis so much easier and faster,” adds Vishakha.
TABLE OF CONTENTS
See More
TABLE OF CONTENTS
See More
Recommended Blogs

Building Real-time Defenses in an Always-on Economy
In an always-on, connected economy, risks are created in real-time, rather than at discrete checkpoints. Defense strategies must, accordingly, level up to measure trust throughout the entire user experience, from first interaction to every single transaction. This always-on protection needs connected signals, adaptive decisioning, and protection that can keep pace with evolving digital behaviors and access methods.

iGaming KYC: Balancing Risk, Compliance, and Player Experience
KYC-driven identity verification is a core element for fraud prevention in iGaming. It helps these platforms establish trust at onboarding by creating a secure, fair, and sustainable ecosystem, preventing abuse, preserving integrity of the platform, and ensuring regulatory compliance.

How Device Intelligence Adapts to Global Data Sovereignty
Global data sovereignty laws are forcing financial institutions to rethink device intelligence, redesign fraud architecture, and operate compliant, real-time risk systems across increasingly fragmented regulatory environments. What this means in practice is a fundamental shift in how businesses design, deploy, and govern fraud systems across regions.
TABLE OF CONTENTS
See Less
TABLE OF CONTENTS
See Less



Solutions
Resources
© 2026 Bureau . All rights reserved.
Solutions
Solutions
Industries
Industries
Resources
Resources
Company
Company
Solutions
Solutions
Industries
Industries
Resources
Resources
Company
Company
© 2025 Bureau . All rights reserved. Privacy Policy. Terms of Service.
© 2025 Bureau . All rights reserved.
Privacy Policy. Terms of Service.
Follow Us
Leave behind fragmented tools. Stop fraud rings, cut false declines, and deliver secure digital journeys at scale
Our Presence
















Leave behind fragmented tools. Stop fraud rings, cut false declines, and deliver secure digital journeys at scale
Our Presence

















