Conversation

Replying to
At the start of this year, the strategy we used to get rid of one type of spammer... attracted a new type. Fuck me. Now there's people who do a "big hack" of cards stored in plaintext somewhere, then try to sell them on the black market before the breach is up on
1
28
But you're a hacker, and you just got 100,000 credit card details from a database somewhere which you now want to sell on. The first question you're going to get to establish market value is... "how many of them work?"
1
31
And so it turns out we inadvertently designed the ultimate credit card testing tool. A public facing credit card form, which DOES validate a card can be charged, but DOESNT charge it, meaning it's nearly invisible to the victims:
1
98
Doesn't show up on printed statements, doesn't show up on internet banking, doesn't show up ANYWHERE except for a temporary "pending transaction" list with some more modern providers. Best of all! It's from a known merchant (us) with well established reputation/history!
1
47
So these motherfuckers start running big batches of thousands of card tests against our signup page. Spam prevention is now spam magnet. They do it via a distributed botnet masquerading as real users filling out/submitting the form, so there's basically no way of filtering.
1
69
Infrastructure team is trying everything but they're getting through all our honeypots, and we're losing our minds. I'm going through our firewall logs looking at the requests and spot a couple of signatures which are easy to block. Then, all of a sudden there's a new spike
3
35
Replying to and
you’re right! Last time I checked market value for a card was between $1 - $20 depending on the country, type of card etc. I guess making the process slow and expensive will lead the attacker the move to an easier target.
1