top of page

Holiday Fraud Is Just the Beginning: How Criminals Use Peak Season to Build Sleeper Accounts for Year-Round Abuse

  • Don Bush
  • 3 days ago
  • 5 min read

Yes, criminal activity spikes during peak shopping season. But the most damaging fraud often doesn’t happen in November or December. It happens months later, after the holidays have passed and attention has shifted, using accounts that were created, compromised, or harvested during peak volume.

Fraudsters don’t treat the holidays as a sprint, they treat them as account setup season.

Fraudsters use the holidays to set up sleeper accounts and synthetic identities, and to harvest real customer accounts, then monetize them throughout the year. By the time most companies detect the fraud, those accounts have already matured, gained trust, and done real damage.


How active are criminals during the holidays? In the 62 days of November and December, myNetWatchman observed the following from live data sources:

  • 5.7B unique credentials (username and password)

  • 45.8M compromised credentials

  • 16M compromised email accounts

  • 3.7M payment/gift cards being tested

  • Millions of new accounts created using compromised or synthetic data


Holidays are ideal for sleeper and synthetic account creation

The holiday season creates perfect cover for identity-based fraud because everything looks noisy:

  • New account registrations surge to access discounts, shipping perks, and rewards

  • Logins occur from unfamiliar locations and devices due to travel and gifting

  • Customer service is overwhelmed with legitimate requests

  • Promotional pressure reduces friction across onboarding and checkout


In that environment, fraudulent behavior blends in.


This matters because new account fraud is no longer a marginal issue. Losses tied to new account fraud now reach billions of dollars annually, driven largely by synthetic identities, fabricated profiles built using a mix of real and fake data. These accounts are designed to appear legitimate long enough to pass early controls, then “activate” later through fraud, abuse, or bust-out behavior.


Fraudsters know that account age equals trust. The holidays give them the scale and cover to create thousands of accounts that can quietly age into high-value assets.


The second holiday opportunity: harvesting real customer accounts

Alongside new account creation, the holidays are also prime time for account harvesting.


Shipping notifications, delivery issues, gift card emails, and promotion alerts create ideal phishing and credential-stuffing conditions. In many cases, the goal isn’t immediate fraud. Instead, criminals test credentials, confirm access, and store that account for later use.


These “harvested” accounts may sit dormant for weeks or months before being used, often during:

  • Major sales events

  • Product launches

  • Or moments when the account has accumulated value or loyalty rewards


From a business’ perspective, the fraud appears suddenly. In reality, the compromise happened long before.


How sleeper and harvested accounts get monetized

Once activated, these accounts rarely serve just one purpose. They are reused across multiple fraud and abuse vectors:

  • Fraudulent transactions and chargebacks using trusted accounts and saved payment methods

  • Return and refund abuse, especially post-holiday when return volumes are already high

  • Loyalty and rewards theft, draining stored value that often receives less scrutiny than payments

  • Marketplace abuse, including fake buyers, seller reputation farming, or eventual bust-outs


The common thread is identity trust. These accounts succeed because they don’t look new, risky, or suspicious, until it’s too late.


Stopping sleeper and synthetic accounts requires shifting from transaction-only defenses to continuous identity risk assessment across the account lifecycle.

Most organizations don’t see sleeper accounts until damage occurs

Fraud programs are optimized to detect loud events: chargeback spikes, refund abuse waves, bot attacks.


Sleeper accounts are different. They:

  • Behave normally during early life stages

  • Spread activity across time and channels

  • Exploit organizational silos between identity, payments, loyalty, and marketplace teams

  • Trigger controls only after trust has already been established


By the time action is taken, the account has often already been monetized across multiple surfaces.


What should your organization being doing now

Stopping sleeper and synthetic accounts requires shifting from transaction-only defenses to continuous identity risk assessment across the account lifecycle.


Start with stronger identity signals at account creation

Email addresses are one of the earliest and most persistent identifiers tied to an account and one of the most data rich, underutilized fraud signals.


In effective fraud programs, trust is not permanent. It is continuously re-earned.

Using email authentication and reputation intelligence at account creation helps identify:

  • Newly created or disposable email domains

  • Emails previously associated with fraud or abuse

  • Reuse patterns across identities, devices, or transactions

  • Automation-driven account creation behavior


This doesn’t mean blocking more customers. It means understanding risk earlier and applying friction only when signals justify it, preventing fraudulent identities from quietly aging into trusted accounts.


Re-evaluate trust when accounts evolve

Sleeper accounts rarely stay static. Risk increases when accounts:

  • Change credentials or contact details

  • Add new shipping addresses or payment methods

  • Attempt high-value purchases, refunds, or redemptions


Re-checking email reputation and identity signals at these moments helps detect accounts that were once low risk but have since shifted, before abuse escalates.


In effective fraud programs, trust is not permanent. It is continuously re-earned.


Detect compromised credentials before takeovers turn into losses

Account takeovers are a common trigger for downstream fraud, but many defenses activate only after fraud occurs.


Credential intelligence solutions allow organizations to assess risk before approving sensitive account actions by identifying whether:

  • Login credentials have appeared in known data breaches

  • Passwords are actively circulating in criminal ecosystems

  • Credentials are being reused across platforms


By evaluating credential exposure during logins, password changes, or account modifications, businesses can interrupt fraud at the takeover stage—rather than absorbing losses later through transactions, refunds, or loyalty theft.


The bigger picture: accounts are long-term fraud assets

Fraudsters don’t think in transactions. They think in accounts.


The holidays are not just a time of increased fraud, they are a setup phase. Accounts created or compromised during peak season often fuel fraud and abuse for the rest of the year.


Organizations that recognize this shift focus less on reacting to fraud spikes and more on exposing risky identities early, monitoring how trust evolves, and intervening before monetization occurs.


Because by the time fraud becomes obvious, the most important decisions were already missed.


myNetWatchman can help stop fraud before it ages

While fraudsters use the holiday chaos to plant seeds for year-round abuse, myNetWatchman’s Email Reputation service allows retailers to reclaim the advantage of time. By leveraging real-time criminal data, our solution exposes the "DNA" of an email address at the moment of entry. Whether it’s flagging a high-risk sleeper account during registration, identifying harvested credentials before they are stored, or preventing a high-value account takeover during a login shift, myNetWatchman provides the intelligence to act before monetization occurs. We offer a friction-free, zero-false-positive environment that doesn't just block bad actors, it ensures that trust is earned, verified, and maintained. Don’t let today’s peak season volume become tomorrow’s liability.


Want to learn more, let’s talk.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page