Carding Attack using module to bypass Capcha, checkout email verification
-
Getting a new type of carding attack and it is somehow using this plugin/gateway to bypass all checkout security. Started about 48 hours ago. They are able to bypass capcha and even email verification to checkout. Which means they are somehow using this plugin to bypass the actual checkout. I have had to switch to our backup gateway/processor to stop the carding attacks. There seems to be no way of preventing them from abusing this.
Below is a traffic path for one of the bots carding.Is there a fix for this? I have decently better rates and general fraud protection with Braintree versus my backup processor.
Thanks
Type: Bot
Activity Detail
Philadelphia, Pennsylvania, United States visited https://domain.com/checkout/
11/21/2024 7:16:51 AM (3 minutes ago)
IP: 2601:4a:c800:620:551:9b94:27f:cd14 Block IP
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Recent Activity
Time:
4 minutes ago — Thu, 21 Nov 24 13:16:54 +0000 — 1732195014.944358 in Unixtime
Seconds since last hit:
3.6629
URL:
https://domain.com/wp-json/wc/store/checkout(opens in new tab)
Type:
Normal request
Full Browser ID:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Location:
Philadelphia, Pennsylvania, United States
Time:
4 minutes ago — Thu, 21 Nov 24 13:16:51 +0000 — 1732195011.281483 in Unixtime
Seconds since last hit:
1.5249
URL:
https://domain.com/checkout/(opens in new tab)
Type:
Normal request
Full Browser ID:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Location:
Philadelphia, Pennsylvania, United States
Time:
4 minutes ago — Thu, 21 Nov 24 13:16:49 +0000 — 1732195009.756588 in Unixtime
Seconds since last hit:
2.3886
URL:
https://domain.com/wp-json/wc/store/cart/select-shipping-rate(opens in new tab)
Type:
Normal request
Full Browser ID:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Location:
Philadelphia, Pennsylvania, United States
Time:
4 minutes ago — Thu, 21 Nov 24 13:16:47 +0000 — 1732195007.368002 in Unixtime
Seconds since last hit:
0.8111
URL:
https://domain.com/wp-json/wc/store/cart/update-customer(opens in new tab)
Type:
Normal request
Full Browser ID:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Location:
Philadelphia, Pennsylvania, United States
Time:
4 minutes ago — Thu, 21 Nov 24 13:16:46 +0000 — 1732195006.556870 in Unixtime
Seconds since last hit:
0.7742
URL:
https://domain.com/wp-json/wc/store/cart/add-item(opens in new tab)
Type:
Normal request
Full Browser ID:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Location:
Philadelphia, Pennsylvania, United States
Time:
4 minutes ago — Thu, 21 Nov 24 13:16:45 +0000 — 1732195005.782703 in Unixtime
Seconds since last hit:
2.5645
URL:
https://domain.com/wp-json/wc/store/cart(opens in new tab)
Type:
Normal request
Full Browser ID:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Location:
Philadelphia, Pennsylvania, United States
Time:
4 minutes ago — Thu, 21 Nov 24 13:16:43 +0000 — 1732195003.218205 in Unixtime
URL:
Type:
Normal request
Full Browser ID:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Location:
Philadelphia, Pennsylvania, United States
The topic ‘Carding Attack using module to bypass Capcha, checkout email verification’ is closed to new replies.