Credit Card Malware Acts like a Human

Next story

A new carder-esque tool has emerged in the deep dark depths of the web which can supposedly use credit card information in a “more human way” in order to bypass fraud detection systems according to the register. How can we combat this technology and what should you be looking out for?

What can you do about it? Well to be honest... nothing, the security issue is at their end not yours in these cases BUT you can help protect yourself by keeping a closer eye on your financial transactions and reporting any anomalies as soon as they happen.“Credit card fraud is certainly on the increase, with the very big caches we have seen from Target and Home Depot to name just two,” explains Mark James, ESET security specialist. I also covered the Kmart and JP Morgan breaches recently.

“Keep an eye out for small “under the radar” type transactions designed to test your card to see if it’s active and if found you should report these to the bank as soon as possible, no matter how small.”


Rise of the Machines


Mark explains that “this particular form of malware is designed to act more like a human and less like a robot: it will use random amounts at random times from different payment gateways to mimic purchases from your PC or mobile.

“It will make spotting these fraudulent transactions harder but ultimately it’s your job to protect your own money. Although most banks try to protect you it’s not entirely fair to expect them to be 100% effective all the time so keeping an eye on your spending habits is a much safer way of doing it.”

Mark further explains you can “try [using] different payment methods or cards for different types of transactions”.

For example, using PayPal online or a credit card in traditional stores adds an extra layer between your actual bank details and the shop. You’re obviously going to make payments using your debit card at some point but if you can limit it as much as possible then you’re reducing the risk that those details will become compromised.

For more details and sources have a looksee at this article from