TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Criminals can guess Visa number and security code in six seconds, experts find

218 pointsby seycombiover 8 years ago

17 comments

cs702over 8 years ago
There are well-specified rules for coming up with valid credit card account numbers, and at most, say, 60 valid expiration dates (12 months × 5 years into the future).<p>Once an attacker has a valid credit card number and expiration date, there are only 10⁴ = 10,000 four-digit security codes possible, which the attacker tries with parallel requests to hundreds of websites. Each website gives the attacker at least a few tries to enter valid credit card information.<p>Worst case, it takes only 10,000 parallel requests to guess the correct security code. Worst case.<p>I don&#x27;t know whether to cringe or laugh at this.
评论 #13100631 未加载
评论 #13101425 未加载
评论 #13102238 未加载
评论 #13100281 未加载
评论 #13100302 未加载
preinheimerover 8 years ago
So criminals can guess a valid CC&#x2F;CVC&#x2F;Zip in 6 seconds, and merchants that get nothing but green lights across the board from their credit card processor will be left holding the bag when the card holder disputes the charge.<p>Merchants doing everything they can need better protection from this crap.
评论 #13102252 未加载
评论 #13101129 未加载
评论 #13100597 未加载
评论 #13102589 未加载
评论 #13100771 未加载
rcthompsonover 8 years ago
Shouldn&#x27;t this be easy to detect, though? Every attempt to use a credit card number online involves a request to the bank providing that card to determine if it&#x27;s valid, right? So the bank would see thousands of attempts across hundreds of websites for the same card number in a matter of seconds, which is clearly impossible for a human, and flag the card as &quot;stolen&quot;.<p>Or maybe I&#x27;m just way too optimistic about how this all works.
评论 #13101508 未加载
评论 #13100942 未加载
评论 #13101228 未加载
coldcodeover 8 years ago
The power of distributed attacks. Of course they can only guess a random correct credit card + exp + code not yours. Given the relative limited number of codes for each bank, I wonder what the odds are for them to wind up with yours.
评论 #13100186 未加载
评论 #13100398 未加载
评论 #13100448 未加载
lisperover 8 years ago
Securing the current protocol for credit card transactions is completely hopeless. It is <i>inherently</i> insecure because the &quot;secret&quot; information used to authorize a transaction is not bound to that transaction, and so it&#x27;s reusable. Even if you were able to secure the system against brute-force attacks like this one, you can never secure against phishing. The only way to fix it is to change the protocol to one that relies on public-key cryptography and secure digital signatures.<p><a href="http:&#x2F;&#x2F;blog.rongarret.info&#x2F;2013&#x2F;02&#x2F;a-simple-solution-to-credit-card-fraud.html" rel="nofollow">http:&#x2F;&#x2F;blog.rongarret.info&#x2F;2013&#x2F;02&#x2F;a-simple-solution-to-cred...</a>
评论 #13103775 未加载
acomjeanover 8 years ago
I&#x27;m no means on expert on this, but having delt a little with online transactions from testing responses from a payment processor.<p>The things that needed to match also involved the customers street address, zip and name. If I recall these were scored and if the match wasn&#x27;t good (zip was entered wrong) the transaction was rejected. Maybe different payment processors have different thresholds for rejecting a transaction?<p><a href="https:&#x2F;&#x2F;help.chargify.com&#x2F;payment-gateways&#x2F;Error-FAQ.html" rel="nofollow">https:&#x2F;&#x2F;help.chargify.com&#x2F;payment-gateways&#x2F;Error-FAQ.html</a>
评论 #13101103 未加载
评论 #13103106 未加载
评论 #13100888 未加载
评论 #13104017 未加载
maemreover 8 years ago
A solution that some banks provide is to enable a credit card for only transactions using 3-D Secure [1], in which you are expected to enter a 2FA code sent to your phone by the bank during transaction to a webpage of the bank that gets opened.<p>Unfortunately, some (most) websites don&#x27;t support 3-D Secure. I remember that almost all Turkish e-commerce sites I shopped supported it but almost none of the American sites supported it.<p>[1]: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;3-D_Secure" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;3-D_Secure</a>
评论 #13100755 未加载
评论 #13103777 未加载
评论 #13100756 未加载
评论 #13101655 未加载
评论 #13104049 未加载
评论 #13100557 未加载
评论 #13100673 未加载
hanozover 8 years ago
I find it impossible to believe distributed enumeration of card numbers via ecommerce sites was used to defraud 9000 Tesco customers over a weekend.
评论 #13102753 未加载
seanwilsonover 8 years ago
Wouldn&#x27;t asking for the name on the card as well stop this? You&#x27;re not going to be able to randomly generate the correct name.
评论 #13101530 未加载
avh02over 8 years ago
hindsight is 20&#x2F;20 - but I&#x27;m awefully surprised that this would not be detected by the backend&#x2F;backoffice systems processing cards.
评论 #13100135 未加载
评论 #13100397 未加载
评论 #13100364 未加载
fjarlqover 8 years ago
The paper:<p>Ali, Mohammed Aamir and Arief, Budi and Emms, Martin and van Moorsel, Aad (2016)<p>Does The Online Card Payment Landscape Unwittingly Facilitate Fraud?<p>IEEE Security &amp; Privacy<p><a href="http:&#x2F;&#x2F;eprint.ncl.ac.uk&#x2F;file_store&#x2F;production&#x2F;230123&#x2F;19180242-D02E-47AC-BDB3-73C22D6E1FDB.pdf" rel="nofollow">http:&#x2F;&#x2F;eprint.ncl.ac.uk&#x2F;file_store&#x2F;production&#x2F;230123&#x2F;1918024...</a>
mamonover 8 years ago
That&#x27;s why you should enable two factor authentication on your credit card: online transactions would require confirmation with single-use password you receive by SMS.
评论 #13104719 未加载
评论 #13103969 未加载
hughwover 8 years ago
These attackers are probably brilliant enough to make their mark in the honest tech business world. I suppose they are driven by the challenge of the crime.
评论 #13100266 未加载
评论 #13101461 未加载
ForFreedomover 8 years ago
If you total the credit card numbers for any particular card the answer would be the same. For example: totaling the visa credit card number might be 32. The hackers would have to guess the 3 set of numbers if they get the fourth set.<p>So my guess is they would try out different combination with the available expiry date&#x2F;cvv number
mataugover 8 years ago
Another one of those technologies which hasn&#x27;t kept up with the evolving tech landscape.
评论 #13100804 未加载
fiatjafover 8 years ago
This is a good argument to be used against the creditcardization (war on cash[1]) of the world some governments are promoting.<p>[1]: <a href="https:&#x2F;&#x2F;www.google.com.br&#x2F;search?q=war+on+cash" rel="nofollow">https:&#x2F;&#x2F;www.google.com.br&#x2F;search?q=war+on+cash</a>
debtover 8 years ago
Laughed out loud after reading this headline