How Dabble tracked 250 bonus abuse accounts to one UK house Skip to content
Financial Transaction Security Platform of the Year. Two years running.
See Why

How Dabble tracked 250 bonus abuse accounts to one UK house

Read time:
0 minutes

Unique devices. Unrelated users. How did Dabble UK connect 250+ bonus abuse accounts back to one house?

Welcome to GeoComply’s Fraud Files—true fraud stories from the industry’s front lines.

Today, we’re travelling to Preston, England, where the fraud team pinned a surge of bonus abuse to one multi-accounting hotspot.

We’re joined by Hila Popal, the GeoComply Fraud and Risk Analyst who partnered with the Dabble UK team to surface the attack and shut it down.

The setup: That promo must be working, right?

Basic, silo’d signals would have left Dabble in the dark. Precise location and device intelligence linked seemingly unique devices to one address.

Dabble, an iGaming platform, entered the competitive UK market with a strong rollout of enticing promotions. And Preston seemed to love it. An influx of new registrations—random player names, different usernames. Just what you want, right?

Not quite.

Multi-accounting: The problem with looking good on paper

(Spoiler alert. It was an aggressive multi-accounting fraud ring.)

Without the right signals, the fraud team would have been left chasing individual cases. Each account looked “unique”: fresh username, new device ID, no obvious links.

You don’t need us to tell you that this game of whack-a-mole becomes a slow, manual slog. And the abuse can scale long before it’s stopped.

“Multi-accounting is designed to fool basic tools. And it does,” Hila says. “But device-sharing signals, account-sharing patterns, and device reset detection tell a different story. Once you can see that layer, the ring unravels fast.”

The Dabble difference

Dabble had an edge.

They’d layered new tools into their identity stack: GeoComply’s location, device and behavioural intelligence. Ground truth signals that work together to paint the invisible lines between those new usernames and devices.

“Because Dabble had gathered these signals right at registration, we had powerful data to work with right from the start. Rather than retroactively putting the pieces together, this gave us a clear picture of how these users, devices, and locations were related, in real-time,” Hila explains.

“Because Dabble had gathered these signals right at registration, we had powerful data to work with right from the start. Rather than retroactively putting the pieces together, this gave us a clear picture of how these users, devices, and locations were related, in real-time,” Hila explains.

This surfaced hidden connections between seemingly random players.

The signals: That don’t imPreston me much

Map of connected users and devices, all located at one Preston address

Using precise location coordinates—drawn from a combination of GPS, Wi-Fi, IP, and cell tower signals—Dabble traced over 250 of these accounts to a single residential address.

They detected:

  • Two devices repeatedly reset to create “new” device IDs
  • Accounts created using suspected stolen or synthetic identities
  • Activity lasting just long enough to qualify for and redeem the promotion
  • Before the device was reset, and the cycle repeated

GeoComply linked this one Preston location to over 280 new device UUIDs active across 255 users. Just one cluster of this activity—8 linked devices and users—caused an estimated £1,000 in bonus abuse damage alone.

“That’s one cluster, at one address, in one city. It doesn’t account for the investigation time that would have been burnt, or the wasted marketing spend,” Hila says. “We also often see chargebacks crop up later down the line, when victims have realized their payment details have been compromised and exploited. The earlier you spot it, the less damage.”

Precise location: The smoking gun

This is where basic, IP-based tools hit their ceiling. From an IP address alone, you’re working with a location radius of roughly 100km.

That’s enough to tell you someone’s probably in Greater Manchester (unless they’re using a VPN or proxy). It’s not enough to tell you they’re in the same living room as the last 249 accounts that were approved.

“Simply put, Dabble did two key things really well: they gathered device, location, and behavioural intelligence early in the journey. And then they mixed those signals together,” says Hila. “This allowed them to clearly see clusters and connections that would have otherwise been invisible.”

The shutdown: Pinning down promo abuse

Dabble’s perimeter alert setup in GeoComply’s platform

Once the cluster was confirmed, Dabble worked with GeoComply to set up a real-time perimeter alert at the Preston location, with proactive monitoring feeding back directly into their KYC process.

This means they can instantly detect and respond to new activity with a step-up challenge, stopping fraud attempts without disrupting legitimate players who happen to live nearby.

Anyone who has ever collaborated with the Product team knows that last part matters.

“The false positive problem is one of the biggest operational tensions in fraud prevention: block too aggressively and you start turning away real customers. Precise location lets operators draw finer lines, targeting suspicious activity at a specific address rather than flagging an entire postcode,” Hila says.

Why precise location changes the game

If you’re still relying on IP-based geolocation, here’s the part worth getting nerdy about.

IP location works by mapping an internet address to a known physical area. The problem is that IP addresses are assigned to ISPs (internet service providers), not individual homes. And an ISP can serve thousands of customers across a wide region.

The result is a location estimate that’s often accurate to a city (up to 100km or 60 miles in diameter). Sometimes it’s a neighbourhood. But it’s rarely a street. Add a VPN or proxy into the mix, and that already-fuzzy signal disappears entirely.

Precise location works differently. By combining GPS, Wi-Fi access point data, cell tower triangulation, and IP together, it’s possible to establish where a device actually is—not where its internet provider happens to be. That’s the difference between “somewhere in Preston” and “this address on this street.”

“Even better, we can see when someone is trying to hide their location or device fingerprint. That’s the difference between a normal customer and someone with malicious intent,” Hila says.  

For fighting fraud, that difference is everything. Device resets can generate new IDs. Synthetic profiles can pass document checks. But, with GeoComply on the other side, fraudsters can’t fake the location of a physical device. And if they try, you’re the first to know.

The TL;DR tricks of the trade

Fraudsters scale promo abuse through a reliable playbook: device resets, stolen or synthetic IDs, and coordinated account farming. The accounts look different, but the pattern doesn’t—if you have the right signals to see it.

Dabble did. What made the difference:

  • Location intelligence beyond basic IP—pinpointing real-world device location, not ISP geography
  • Real-time device and multi-account detection—surfacing connections between “unique” accounts the moment they appear
  • High-risk location and multiple-user flags—delivered directly into case workflows, cutting manual review time

Hila sums it up: “device resets and synthetic IDs are table stakes for these groups. The accounts look different by design. What Dabble had was the ability to see through that, not because any one signal gave it away, but because the combination of location, device, and behaviour made the pattern impossible to ignore.”

Want to see how organizations are catching multi-accounting and promo abuse faster, and cutting manual review workload while they’re at it? Talk to our Fraud and Risk Management team.

Madeleine Ritzker | Fraud Journalist, GeoComply

Madeleine Ritzker covers fraud intelligence for GeoComply, mining the hard work of the industry’s risk and fraud teams and translating it into stories that reveal what’s actually happening on the digital front lines. Fraud Files is your way to keep up with the latest tricks and trends sweeping through the darkest corners of the web.

Hila Popal

Hila Popal | Fraud and Risk Analyst, GeoComply

Hila partners directly with organizations to tackle fraud on the front lines. Her work spans threat analysis, custom rule development, and ML model tuning, translating real-world fraud patterns into practical defences built around each platform’s specific risk profile.

Note: Case images have been anonymised to protect personal data. All details shown are reflective of the true investigation.

Related Posts

Defending the AI frontier: Geolocation security in the global AI arms race

Geofencing, VPN Detection, and the Revenue Security Prism

The full-stack fraud ring that’s run like a Silicon Valley startup

Discover how GeoComply helped a leading crypto platform achieve global growth in a complex regulatory environment.
Download Case Study