Between 8 February 4:00 PM AEDT (5:00 AM UTC) and 9 February 10:00 AM AEDT (11:00 PM UTC), transactions completed on Enterprise versions 4.8.0 to 4.10.91 returned a “high-risk” outcome for Document Fraud Analysis (DFA). This occurred due to missing IP-based geolocation data from a third-party service used during transaction processing. In line with our platform design, where external signal failures default to a conservative outcome, transactions were automatically returned as high-risk rather than allowing a potential false approval.
The issue has since been resolved. Product improvements have been released to reduce dependency sensitivity to this signal in future.
All identity verification transactions during the affected period returned a DFA “high-risk” result, irrespective of whether the individual was genuine or fraudulent.
The impact was operational. Genuine users were unable to complete onboarding during the window, which may have resulted in customer friction, delayed onboarding, or the need for re-verification or re-processing after resolution.
A configuration issue within a third-party IP intelligence provider resulted in valid service availability but incomplete data being returned for geolocation and VPN detection.
The provider’s endpoint remained operational, which made automated detection difficult as the service did not fail at a network or availability level. The issue was identified following client feedback and subsequently confirmed through investigation.