AI Agent Profile · LendingIQ · Bengaluru
Fraud Risk Agent AI
DivisionRisk division
Resume
What this agent does
The Fraud Risk Agent AI reads every incoming loan application for signals that suggest identity fraud, document fabrication, undisclosed liabilities, or coordinated application fraud — then maps the applicant's entity connections across prior applications, shared identifiers, and registry data to detect network patterns that individual-application analysis cannot see. It runs velocity checks to identify burst application behaviour across channels. Every output is a structured signal report for the human fraud analyst to investigate. The agent detects; humans determine.
Primary functions
Application Fraud Signals
Every application — synchronousInvoked when: application submitted to the loan origination system, before the underwriting agent processes the credit decision
- Reads the full application data — KYC documents, financial statements, stated identity fields, declared employment and income, contact details, and digital origination metadata — and checks for internal consistency: name spelling across documents, date of birth across identity documents versus bureau report, PAN linked to the stated name via NSDL records, address on utility bill matching stated address, and employer name consistent across salary slips and Form 16.
- Cross-checks stated financial data against verifiable signals: a salary slip showing ₹80,000 monthly income for an employer that bureau data shows was struck off from MCA filings six months ago; a GST-registered business that shows zero GST turnover but declares ₹40 lakh annual income; a property document citing a registration number that does not match CERSAI records. Each of these is a specific fraud signal, not a general suspicion.
- Checks the application against the fraud pattern corpus — the library of known modus operandi used in prior fraud cases at LendingIQ and from industry sharing — and flags any structural match: applications using a specific document format associated with a prior fraud ring, income certificate templates that match previously identified forged documents, or applicant profiles that match a known synthetic identity pattern.
- Does not authenticate physical documents — it cannot determine whether a document image has been digitally altered, whether a stamp or signature is genuine, or whether a letterhead is authentic. Document authentication requires forensic tools and trained human document examiners. The agent flags inconsistencies in document data; it does not verify the document itself.
Network Analysis
Per application and on periodic portfolio scanInvoked when: application is processed (real-time linkage check) or during monthly portfolio scan to detect slow-burn coordinated fraud patterns
- Maps the current applicant across every shared identifier in the application database — phone number, email address, PAN, Aadhaar hash, device ID, IP address, bank account number, employer name, and residential address — and identifies all prior applications at LendingIQ that share any of these identifiers, whether those applications were approved, declined, or withdrawn.
- Extends the network one degree further: where the current application shares an identifier with a prior declined or fraud-flagged application, it maps all other applications that share identifiers with that declined application — building the network graph that reveals whether this applicant is part of a cluster of connected applications that individually look clean but collectively show a coordinated pattern.
- Checks MCA director linkage data for business borrowers: where the borrower is a company director, it identifies all other companies the director controls, checks those companies' credit histories at LendingIQ, and flags where the director is associated with prior defaulted or fraud-flagged entities. A director with three prior clean-looking company applications that all defaulted within 12 months of disbursement is a network signal the individual-application view cannot see.
- Cannot access other lenders' databases, CIBIL's fraud exchange, or industry-wide fraud sharing networks autonomously. Cross-industry network analysis requires the agent to be provided with external fraud consortium data as an input — it cannot pull it independently. Where such data is not available, the network analysis is bounded to LendingIQ's own application history.
Velocity Checks
Per application and on batch triggerInvoked when: each application is processed, or when a batch velocity alert is triggered across the portfolio
- Checks the application entity and its associated identifiers against configurable velocity rules: number of applications from this PAN in the last 30 days, number of applications from this phone number in the last 7 days, number of applications from this device ID in the last 24 hours, number of applications from this IP address subnet in the last hour, and number of applications from this employer in the last 30 days.
- Applies context-sensitive velocity interpretation: five applications from the same employer in 30 days may be normal (a corporate loan scheme) or a fraud signal (a fake employer used across a ring) — the velocity check flags the pattern and presents the context, but the interpretation of whether it is benign or suspicious requires the human analyst to check the employer legitimacy and whether the five applicants have any prior relationship.
- For digital origination channels, checks device-level and session-level velocity: multiple applications completed within minutes from the same device suggest either a loan agent processing bulk applications (potentially legitimate, but requiring a different compliance review) or a fraud operation using a single device to submit multiple synthetic identities rapidly. The two scenarios look identical in velocity data but require different responses.
- Runs a portfolio-level velocity scan on a configurable schedule — weekly or on trigger — to detect slow-burn velocity patterns that real-time checks miss: 20 applications over 60 days from addresses within a single PIN code, all with the same employer, all approved without velocity flags at individual processing time, but collectively forming a pattern that warrants retrospective investigation.
Knowledge base
Application Database (full history)
Every application processed at LendingIQ — approved, declined, withdrawn — with all identifiers. The primary dataset for network analysis and velocity checks. Quality of network analysis is directly proportional to the completeness and consistency of identifier capture.
Fraud Pattern Corpus (RAG)
Known fraud typologies, modus operandi case studies, forged document templates identified in prior cases, and shared blacklist entries. Maintained by the fraud team and updated after each confirmed fraud case.
Velocity Rule Configuration
Configurable thresholds for each velocity dimension — per identifier type, time window, and channel. Set and maintained by the human fraud team. The agent applies the rules; the fraud team calibrates them based on confirmed fraud and false positive rates.
MCA & CERSAI Registry Data
Company director linkages, security interest registrations, struck-off company flags. Used for business borrower network analysis and employer verification cross-checks.
Bureau Enquiry Log
Recent bureau pulls on the applicant entity across all lenders — the hard enquiry log is a velocity signal for loan-seeking behaviour. Multiple bureau pulls in a short window can indicate loan stacking intent.
Fraud Detection Knowledge
Pre-training knowledge of application fraud typologies, document fraud patterns, synthetic identity construction, and coordinated fraud ring characteristics in Indian lending up to knowledge cutoff.
Hard guardrails
Known limitations
Important Reads
Learn more about how to deploy Fraud Risk Agent AI to your lending workflow.
- Use case #0001How Fraud AI Detects SIM-Swap Fraud at the Onboarding StageA SIM swap takes 4 minutes to execute at a telecom service centre. In those 4 minutes, a fraudster gains control of a phone number they do not own — the number linked to the victim's Aadhaar, bank account, and OTP delivery channel. By the time the victim realises their phone has no service, a loan application may already be in the system using their identity. The Fraud Risk AI detects the swap before the OTP is sent.Read article →
- Use case #0002Network Graph Analysis: How Fraud AI Links Connected Fraud RingsOrganised fraud rings do not operate as isolated individuals. They share phone numbers, addresses, devices, bank accounts, and IP addresses across dozens of applications submitted to the same or multiple lenders. Each application looks legitimate in isolation. The network graph makes the connections visible — and what looks like a creditworthy borrower on a single-application view becomes the obvious centrepiece of a coordinated fraud ring on a graph view.Read article →
- Use case #0003Velocity Checks: Stopping Repeat Fraud Applications Across LendersA fraudster who fails to get a loan from one lender simply tries the next. And the next. And the next — sometimes submitting to 8 to 12 lenders simultaneously, knowing that most institutions check their own history but not the application history the fraudster is building at every other lender at the same time. Velocity checks close this gap by reading the signals that only exist across the population of lenders — not within any single one.Read article →
