Enumeration fraud is the act of establishing valid card details, by testing them on an ecommerce website. It is also known as carding or card testing.
It can have devastating consequences for both businesses and consumers. If an online firm fails to take steps to identify and prevent their site from being used in this manner, it could result in lower authorisation rates; increased transaction fees because of repeated declined transactions; and additional fees from Visa or Mastercard for excessive retry attempts
But even more alarmingly, if someone tests and confirms stolen card details are valid using your site and then commits further fraud with those valid card details, you could be liable for that fraud. It could result in fines and fees and business-ending reputational damage.
Security breaches aren’t a problem - until they are. Protect your time, money and reputation by making payment security a top priority.
Phishing scams are nothing new, but they have come a long way since the days of emails announcing you have inherited millions from a royal benefactor.
Advanced technology solutions provide a formidable defence against the insidious threat of ecommerce fraud.
Meanwhile your customers face emotional distress, loss of trust in your company and payments in general, financial hardship or identity theft.
Brian Kinsella, Senior Regional Fraud Manager at Elavon, said: “We often see that the types of businesses that fall victim to carding attacks are small companies that may not have invested heavily in website security.
“By taking a few simple, low-cost steps, you can prevent your business from falling foul of carding and any card fees for excessive declines.”
Cyber-criminals acquire a collection of card details, either through theft, hacking, phishing, buying a list from the dark web or other nefarious means.
But they don’t know if they will work. Has the owner already cancelled the card? Did the card issuer already spot that the details have been cloned? Or perhaps the details are old and expired.
They need to authenticate the details without alerting the owner of the card that they are a victim of fraud. They find an ecommerce site with a low bar for security.
Once the criminals have identified a site, computer scripts can then test potentially thousands of card details over and over again until one is found that works.
If your site is being used for this kind of carding, you might see a steep rise in declines or cards registered to an address in one country being used from an IP address in another.
Your ecommerce site may also be targeted in a similar type of fraud called a BIN attack. The BIN or Bank Identification Number, is the first six to eight digits on a debit or credit card. This is the part of the card details that identifies the issuing bank, card scheme and the type of card being used.
Cyber-criminals acquire genuine BINs, through theft, buying lists on the dark web or using publicly available data. They then randomly generate the extra digits needed to make a complete card number, combining expiry dates and CVV numbers.
Computer scripts can generate thousands of these card numbers and then test them against ecommerce sites to find one that works. It’s known as a brute force attack as it’s fairly low tech, but it can be effective.
Again, cyber-criminals will often target websites that take low value transactions or services that don’t require an actual transaction.
As reported above, once a valid card has been identified, it can be used to make fraudulent transactions and purchases until the fraud has been spotted by the cardholder or the issuing bank.
But don’t panic. There are some relatively simple and cost effective methods to protect yourself.
There are two main ways to take payments on your own website; either build your own connection to a payment gateway or use a hosted payment solution.
Using a hosted payment solution means your customers’ sensitive card information is handled by the payment gateway and never touches your servers.
Because it’s hosted by the gateway provider, security is improved and it is much simpler for you to meet PCI-DSS compliance requirements.
Improvements in technology now mean the hosted components can look and feel like your website and brand, meaning the customer is much less likely to abandon their purchase at the point of checkout.
The alternative is to fully integrate the gateway into your website, which requires a team of skilled engineers, developers and constant maintenance.
It might give you more flexibility but you will be handling sensitive card data, increasing the risk of a breach and meaning your PCI-DSS compliance requirements will be much higher.
You should speak to your developer about introducing security measures across your entire site, not just at the point of payment.
For Authorisation based carding attacks:
For 3DS Authentication based carding attacks
Speak to your gateway provider about what fraud prevention and detection products they have or partners they recommend. If you are ever in doubt over your payment security, speak to your gateway provider for more information and help.