• Products

    Digital Trust & Safety Platform

    Fight fraud without sacrificing growth

    Learn more

    Platform solutions

    • Payment Protection
    • Account Defense
    • Dispute Management
    • Content Integrity
    • Sift Connect
    • Passwordless Authentication

    Sift innovations

    • PSD2 Solution
    • New Releases & Enhancements
  • Industries

    One solution, any industry

    Learn how Sift can work for your industry

    Learn more

    Featured Industries

    • Fintech
    • Payment Service Providers
    • Retail
  • Customers

    Case studies by industry

    See how leading brands succeed with Sift

    Learn more

    Featured Customers

    • DoorDash
    • Uphold
    • Paula’s Choice
  • Partners
  • Fraud Center
  • Resources

    Fraud-fighting resources

    Explore fraud trends and insights

    Learn more

    • Blog
    • Demos
    • Infographics
    • Ebooks & Reports
    • Videos
    • Podcasts
    • One-Pagers
    • Webinars
    • Trust & Safety University
  • Company

    Why leaders choose Sift

    Technology, community, and partnership

    Learn more

    Our mission: Help everyone trust the internet

    • About
    • Careers
    • News & Press
Talk to an expert
Products
  • Digital Trust & Safety Platform
  • Payment Protection
  • Account Defense
  • Dispute Management
  • Content Integrity
  • Sift Connect
  • Passwordless Authentication
  • PSD2 Solution
  • New Releases & Enchancements
Industries
  • Fintech
  • Retail
  • Payment Service Providers
Customers
Partners
Fraud Center
Resources
  • Blog
  • Ebooks & Reports
  • One-Pagers
  • Demos
  • Videos
  • Webinars
  • Infographics
  • Podcasts
  • Trust and Safety University
Company
  • Search Careers
  • Our Company
  • Contact Us
  • Engineering Blog
Talk to an expert Sign in
  • Blog Home
  • Digital Trust & Safety
  • Fraud
< prev / next >
Share this article on LinkedIn
Tweet this article
Share this article on Facebook
SOCIALICON
Share this article via email

New Visa Attack Hole Demands New Fraud Defenses

By Evan Schuman  / 

12 Dec 2016

Evan Schuman is a guest contributor to the Sift Science blog. 


When security researchers recently published that multi-merchant attacks gave them unlimited attempts at guessing Visa card fields (but not Mastercard fields), it was a reminder of the inherent fragility of payment card security today.

One way to successfully defend against such an attack is by using a service that tracks transactions across a wide range of merchants. This kind of centralized protection is supposed to come from the card brands, but – at least in Visa’s case – that is simply not happening.

The protection could, in theory, come from processors, but they are going to have visibility into a far smaller number of transactions. It’s also relatively easy for cyberthieves to determine a merchant site’s processor and simply only attack one from each processor. Cyberthieves tend to think through their attacks, forcing everyone else to carefully think through their defenses.

fraudster

How the attack works

The Visa attack used bots to specifically take advantage of the lack of information-sharing between websites. Although a site may limit the number of times a shopper can incorrectly enter a field before they are blocked and need to talk with customer service, there’s nothing stopping the attacker from hitting more sites to try and figure out each line. Done methodically enough, it’s an effective tactic.

And yes, these attacks also tend to hit the smallest of sites, on the assumption that they will then encounter the weakest security.

For those merchant executives who may be thinking “Why should I worry about this? I’m merely a tiny cog in the machine to help them identify payment card fields. How does that hurt me?,” you may want to remember that these thieves know about your site and may have concluded that your security isn’t great. When they complete their investigations and have enough verified data to start making bogus transactions, which sites do you think will be at the top of their hit list?

“Once they know that they have the keys to your kingdom, it’s really just a matter of time before they work through their list and take advantage of your store,” said Kevin Lee, Trust & Safety Architect at Sift Science, who has also managed risk or spam operations for Facebook, Square, and Google.

The aggregated defense

Lee argues that attacks such as this multi-site Visa effort makes it clear that retailers need to deploy a much more aggregated approach to defending themselves. In short, they need near-realtime visibility—whether it’s direct or indirect—into what is happening on thousands of other sites.

“For example, there may be 10 individual merchants. If Sift Science is integrated with them, we can see that an attack is coming from a particular device or IP address. We’ll often see sequential Gmail accounts [Jdoe1234@gmail.com, Jdoe12345@gmail.com, etc.] used for this,” Lee said. “Sift Science is able to see across our entire portfolio and we instantly adjust the fraud score for the next transaction.”

The multi-merchant Visa attack, for instance, used bots, which makes it easy to identify. It pasted the data into individual fields as part of its guessing effort, as opposed to typing the data in one character at a time. “That’s definitely outside of the norm,” Lee said.

This attack method overall, though, didn’t especially impress Lee. “The sophistication that these folks used was pretty basic,” he said. For example, in an IEEE paper the researchers wrote, the attack was thwarted by an ordinary CAPTCHA. “Many bots wouldn’t be thwarted that easily,” Lee said.

How did the attack get by Visa?

Of greater intrigue, Lee said, was why this attack consistently got past Visa systems, but did not fool the same kind of defenses from Mastercard. The report said they made sure that multiple processors were hit on both sides, to rule out if it was the processors—and not Mastercard—that blocked the attacks.

“I would assume that Visa is watching this data. They should have visibility across their portfolio,” Lee said. “I think they should be able to detect this stuff. This is a fail on their side.”

In a statement issued after the research was published, Visa suggested that merchants should use Verified by Visa. “Visa also offers enhanced security using Verified by Visa based on the 3DSecure standard, which offers improved security for e-commerce transactions. The 3DSecure 2.0 specification was recently announced and Visa is actively developing Verified by Visa to incorporate the advances in security it offers,” Visa said. “Where a merchant chooses not to use Verified by Visa for a card not present transaction, they will assume the risk for fraud.”

Lee said this Visa pitch for its Verified By Visa program is unlikely to go anywhere. Visa “has been talking about that for more than five years. The friction is so high, along with the implementation costs by the merchants. Merchants hate it because you lose good customers and pay high implementation costs,” he said. “I’m inhibiting my business more because I’m turning away good customers.”

A centralized approach makes sense, but it needs to be one that has visibility across all payment types and doesn’t accomplish its anti-fraud efforts by making shoppers jump through hoops.

Related

cybercrimefraudstersvisa

Evan Schuman

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld, and eWeek.

  • < prev
  • Blog Home
  • next >
  • Company
  • About Us
  • Careers
  • News & Press
  • Partner With Us
  • Blog
  • Support
  • Help Center
  • Contact Support
  • System Status
  • Trust & Safety University
  • Fraud Management
  • Developers
  • Overview
  • APIs
  • Client Libraries
  • Integration Guides
  • Tutorials
  • Engineering Blog
  • Social

Don’t miss a thing

Get industry trends, insights, and actionable fraud-fighting tips.

You're on the list.

You can unsubscribe at any time. Please see our Website Privacy Notice.
Do Not Sell My Personal Information

If you are using a screen reader and are having problems using this website, please email support@sift.com for assistance.

© 2023 Sift Science, Inc. All rights reserved. Sift and the Sift logo are trademarks or registered trademarks of Sift Science, Inc.
Privacy & Terms

Secure your business from login to chargeback

Stop fraud, break down data silos, and lower friction with Sift.

  • Achieve up to 285% ROI
  • Increase user acceptance rates up to 99%
  • Drop time spent on manual review up to 80%
Your information will be used to contact you about our service and subscribe you to our direct marketing communications. You can, of course, unsubscribe at any time. Please see our Website Privacy Notice.