Conversation

Replying to
And so it turns out we inadvertently designed the ultimate credit card testing tool. A public facing credit card form, which DOES validate a card can be charged, but DOESNT charge it, meaning it's nearly invisible to the victims:
1
98
Doesn't show up on printed statements, doesn't show up on internet banking, doesn't show up ANYWHERE except for a temporary "pending transaction" list with some more modern providers. Best of all! It's from a known merchant (us) with well established reputation/history!
1
47
So these motherfuckers start running big batches of thousands of card tests against our signup page. Spam prevention is now spam magnet. They do it via a distributed botnet masquerading as real users filling out/submitting the form, so there's basically no way of filtering.
1
69
Infrastructure team is trying everything but they're getting through all our honeypots, and we're losing our minds. I'm going through our firewall logs looking at the requests and spot a couple of signatures which are easy to block. Then, all of a sudden there's a new spike
3
35
IMO It's always a matter of rentability. Although it may not be rentable to pay Luminati for residential proxies when it comes to crawling (it depends the value of the data), I guess when it comes to credit card it becomes wort spending some $ on it.
1
Replying to and
you’re right! Last time I checked market value for a card was between $1 - $20 depending on the country, type of card etc. I guess making the process slow and expensive will lead the attacker the move to an easier target.
1