that are problematic. Many IP subnets are repeat offenders.
~Che
-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com]
Sent: Sunday, February 17, 2013 6:38 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net
I added another filter
I added another filter today...
I have always checked all form submissions for the bad keywords but I
noticed that many of the attacks seem to start with them entering 1
or -1 as the first and or last name. Probably too lazy to put more
keystrokes in when they are setting up the script.
So now
Anyone else seeing a lot of form submissions with -1 or 1 as the name?
Yup - I get that sometimes.
Or, an attempt to enter the same web or email address entered into EVERY
field.
and I'm still getting weird *something* errors sent to me from a
site that look like:
the same hold true for session session variables?
-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com]
Sent: Friday, February 15, 2013 11:18 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net
If they read in the form page
You can set the session timeout to about 45 minutes and it should
work.. if they try to submit the page using the same session the
next day, it will time out.
At 08:48 AM 2/16/2013, Rick Faircloth wrote:
What would be an appropriate length of time for a session variable
for a hacker who's
Subject: Re: Problem with Hackers on Donation form through Authorize.net
As an FYI, my blog never had a lot of spam, but it was pretty regular. When
I started using CFFP, it dropped dramatically. I can't even remember my last
spam comment.
On Mon, Feb 11, 2013 at 10:43 AM, Rick Faircloth
r
to write my own.
Your blog is running CF ?
-Original Message-
From: Raymond Camden [mailto:raymondcam...@gmail.com]
Sent: Monday, February 11, 2013 11:46 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net
As an FYI, my blog never had a lot of spam
, February 13, 2013 9:23 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net
Part of the verification in the processing can be reliant upon something
executing in JavaScript and being passed in with the form submission.
While I do not disagree with your statements
: RE: Problem with Hackers on Donation form through Authorize.net
You have to be careful not to interfere with normal donations.
When I fill out forms using chrome, chrome fills in my name, address
and phone number. It might take me only 15 seconds to fill out my
donation form..
You can
If they read in the form page and then submit it using a script for
many days without re-reading the original form, it will appear to the
server that they took days to fill. So testing for more than a few
hours should be good...
sessions might work but they should expire quickly... then if
I wonder if the hacker can still submit the form with JavaScript turned
off?
How would I go about determining just what the hacker's process is?
At a base level they can copy your form page to their local server then
manipulate the form submitting it to your cfc directly. I have seen people
Thanks for the feedback, Justin...
-Original Message-
From: Justin Scott [mailto:leviat...@darktech.org]
Sent: Tuesday, February 12, 2013 6:01 PM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net
Forget the form page the bots/humans are not even
Thanks, Dennis!
-Original Message-
From: UXB [mailto:denn...@uxbinternet.com]
Sent: Tuesday, February 12, 2013 5:31 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net
button for my form is just a regular button that triggers an AJAX
function
Part of the verification in the processing can be reliant upon something
executing in JavaScript and being passed in with the form submission.
While I do not disagree with your statements anything that is part of the
form data that can be generated by JavaScript can be submitted without it
: UXB [mailto:denn...@uxbinternet.com]
Sent: Wednesday, February 13, 2013 9:23 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net
Part of the verification in the processing can be reliant upon something
executing in JavaScript and being passed in with the form
Looks interesting. IP-based blocking may be a good way to go
for my donation form.
-Original Message-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com]
Sent: Tuesday, February 12, 2013 12:07 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net
Another good thought! Thanks!
-Original Message-
From: Byron Mann [mailto:byronos...@gmail.com]
Sent: Tuesday, February 12, 2013 1:57 AM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net
A fairly inexpensive and easy to implement fraud screening
, DPM muse...@virtualtrials.com
To: cf-talk cf-talk@houseoffusion.com
Sent: Monday, February 11, 2013 11:06 PM
Subject: Re: Problem with Hackers on Donation form through Authorize.net
I came across an interesting way to get the country from the IP
address.. http://www.mximize.com/getting-country
Your right we do routinely get real donations from a few
places like Puerto Rico and Mexico (which both happen to be part of
north america)... as well as most of Europe and Japan. We actually
got real donations from China and even Nigeria so we can't block any
coutry outright.
So I
We had another run of someone trying yesterday.. I detected it on
the 3rd attmept (all of which failed).. then he (or she) tried about
30 more times where I just sent the fake failure notice without
letting it hit the credit card processor.
I like this approach on two fronts. First it
with this approach?
-Original Message-
From: Justin Scott [mailto:leviat...@darktech.org]
Sent: Tuesday, February 12, 2013 2:36 PM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net
We had another run of someone trying yesterday.. I detected it on
the 3rd
: Problem with Hackers on Donation form through Authorize.net
We had another run of someone trying yesterday.. I detected it on
the 3rd attmept (all of which failed).. then he (or she) tried about
30 more times where I just sent the fake failure notice without
letting it hit the credit card
If so, this won't work because I don't use an actual button with
a type of submit. The submit button for my form is just a regular
button that triggers an AJAX function that sends the data to a CFC
for further processing and then submission in the CFC to Authorize.net.
From this you can
button for my form is just a regular button that triggers an AJAX
function that sends the data to a CFC for further processing and then
submission
Forget the form page the bots/humans are not even seeing it they are
attacking your processing cfc directly. Your protection has to be server
Forget the form page the bots/humans are not even seeing it they are
attacking your processing cfc directly. Your protection has to be server
side since any JavaScript on the form page is ignored. They are
submitting form data directly to your CFC processing page.
Part of the
Hi, guys...
I'm been running my first eCommerce setup with a donation
page/form using Authorize.net.
Things have been running fine, excepts for spammers using
the donation form to find legitmate CC numbers so they could
abuse the card in other ways.
I've assumed, up to this point, that the
I realize that if someone is hiring cheap human labor for $1
per day to sit and enter form info, that I can't stop that,
but if it is bots doing the spamming, will making CF captcha
more difficult to read have a good chance of stopping the bots,
or do I need to get with reCaptcha. I like
Subject: Re: Problem with Hackers on Donation form through Authorize.net
I realize that if someone is hiring cheap human labor for $1
per day to sit and enter form info, that I can't stop that,
but if it is bots doing the spamming, will making CF captcha
more difficult to read have a good
on Donation form through Authorize.net
I realize that if someone is hiring cheap human labor for $1
per day to sit and enter form info, that I can't stop that,
but if it is bots doing the spamming, will making CF captcha
more difficult to read have a good chance of stopping the bots,
or do I
: Re: Problem with Hackers on Donation form through Authorize.net
I realize that if someone is hiring cheap human labor for $1
per day to sit and enter form info, that I can't stop that,
but if it is bots doing the spamming, will making CF captcha
more difficult to read have a good chance
: Problem with Hackers on Donation form through Authorize.net
I realize that if someone is hiring cheap human labor for $1
per day to sit and enter form info, that I can't stop that,
but if it is bots doing the spamming, will making CF captcha
more difficult to read have a good chance
11, 2013 2:02 PM
To: cf-talk
Subject: Re: Problem with Hackers on Donation form through Authorize.net
No, it returns a pass/fail type response.In your example, I'd probably add
it after you do client side validation and CF validation, but before the
hit to Authorize.net.
On Mon, Feb 11, 2013
On Mon, Feb 11, 2013 at 1:45 PM, Rick Faircloth r...@whitestonemedia.comwrote:
After more unsuccessful testing, I'm assuming that the form
button at the end of the form needs to be an actual button with
a type of submit to work with CFFormProtect?
Not as far as I know. I'm a bit rusty on
I have just gone through this... A big problem is that the
owner complains and the credit card company charges you a penalty
and if many get through they can dump you.
At first, I banned the IP address when someone tried 3 times
unsuccessfuly. That worked for about a day then they would
-
From: Al Musella, DPM [mailto:muse...@virtualtrials.com]
Sent: Monday, February 11, 2013 4:32 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net
I have just gone through this... A big problem is that the
owner complains and the credit card company charges
One site of mine for a dance company used to get a ton of spam through
contact forms. Everybody hated CAPTCHA, so I put a simple question with
radio button choices:
A cow goes?
a. quack
b. woof
c. moo
d. chirp
VERY low tech, but believe it or not, we've not gotten a single piece of
bot spam
to Outback!)
Rick
-Original Message-
From: Rick Faircloth [mailto:r...@whitestonemedia.com]
Sent: Monday, February 11, 2013 4:40 PM
To: cf-talk
Subject: RE: Problem with Hackers on Donation form through Authorize.net
Thanks for the info, Al...
It is a royal pain trying to deal
I came across an interesting way to get the country from the IP
address.. http://www.mximize.com/getting-country-by-ip-based-on-geolite
I might set this up and block non North American IPs...
At 04:43 PM 2/11/2013, Les Mizzell wrote:
One site of mine for a dance company used to get a ton of
A fairly inexpensive and easy to implement fraud screening service is
maxmind minfraud.
It's something like 0.005 per transaction methinks.
Another method I didn't see in the thread was doing an email confirmation
before performing the cc transaction. Like send an email to the user with
a
On 2/12/2013 12:06 PM, Al Musella, DPM wrote:
I came across an interesting way to get the country from the IP
address.. http://www.mximize.com/getting-country-by-ip-based-on-geolite
I might set this up and block non North American IPs...
i would check w/your client first. not everybody
40 matches
Mail list logo