Check your Credit Statements for Fraud

Status
Not open for further replies.

Douggro

Ultra Member
Nov 26, 2015
1,399
2,286
61
Seattle, WA
In this case, crooks are infecting machines with ransomware via advertising. (You all DO make backups on a regular basis, yes?)
Important to note that the latest rounds of ransomware are of the cryptolocker variety, and they will encrypt any drive mounted to your computer, including backup drives. Layered backup planning including regular backups to the cloud or offline storage are the only sure protection from losing your data.

What happened with MFS was unfortunate but not outside of the new normal for Web-based businesses today.
 

Bad Ninja

Vaping Master
ECF Veteran
Jun 26, 2013
6,884
17,225
God's Country
In this case, there appeared to be malicious code injected onto MFS servers last year. It was detected rather quickly as far as these things go (it was in place around one month).

Thieves know that Point of Sale software is a goldmine of information. It is an arms race, and as any server administrator will tell you, server logs are chock full of entries from people across the world attempting to break into them. There are zero day exploits out there that a lot of us don't know anything about until someone finds a server has been compromised and the investigation begins. Patches are developed and sent, and the game continues. In many of these cases, the server admin has done everything possible in their power to secure their servers, yet due to an unknown exploit, they find their company on the front page of the newspapers.

Your desktop machine is also a rich target. There is a ton of malware out there that is designed solely for targeting a user's machine to steal any and all financial information. Some are designed as "root kits", which makes detection by anti-virus programs extremely difficult. There are some root kits that are so good at hiding on your machine, that specialized software is required to detect its presence.

Protecting yourself requires a multi-level defense strategy. Not only should you use a good anti-virus program, but there are plugins you can use with your browser that strengthens your security posture as you use the Internet. A good ad blocking plugin is a must IMO, as part of these security strategy. Yes, your machine can be nailed via advertising. In fact, this type of infection is on the rise.

Angler Takes Malvertising to New Heights

In this case, crooks are infecting machines with ransomware via advertising. (You all DO make backups on a regular basis, yes?)


So MFS obviously hasn't fixed the issue.
 

Douggro

Ultra Member
Nov 26, 2015
1,399
2,286
61
Seattle, WA
So MFS obviously hasn't fixed the issue.
I'm almost sure they have. It's just that once some nefarious person/group has your credit card data, it goes up for sale on the DarkWeb for the scammers to purchase and start running fraudulent charges through. Not uncommon for many of them to use the same fake business name on the bogus transactions.
 

Bad Ninja

Vaping Master
ECF Veteran
Jun 26, 2013
6,884
17,225
God's Country
I'm almost sure they have. It's just that once some nefarious person/group has your credit card data, it goes up for sale on the DarkWeb for the scammers to purchase and start running fraudulent charges through. Not uncommon for many of them to use the same fake business name on the bogus transactions.

There have been dozens of complaints about this issue, all from MFS, over the past year or so. Fraudulent charges days after an MFS purchase.
o_O
Stevie Wonder could see where the problem is.



FYI: my CC isn't compromised. Never has been.
I've been making online purchases for several decades and I take precautions to avoid stuff like this.
:thumb:
 

drysprocket

Ultra Member
ECF Veteran
Verified Member
Jul 11, 2014
1,128
1,916
Los Angeles
So MFS obviously hasn't fixed the issue.

My last purchase with them was on 12/31, but it's possible that I purchased with this same debit card during the initial time frame of the known breach, and my info was just now used.

So either way, if anyone has done business with them over the last year or so, best to keep an eye on your statements.
 

crxess

Grumpy Ole Man
ECF Veteran
Verified Member
Sep 20, 2012
24,438
46,126
71
Williamsport Md
I have had my debit card info stolen twice since December 2015.

Thru PayPal.

I am all set with gear. Really glad--as i will not purchase overseas anymore.

As for in the States--it has been suggested to me to use Amazon gift cards.

I do not think that it is the vendors. But i believe the thieves are coming up with ways to circumvent bank security measures--and banks and consumers like us can't keep up.

I've been permanently spooked.
Please be careful. Thanks for this thread

ps--i am not really a new member. Sorta freaked after the second theft.

GC, aka DBCooper

When you Make Purchases via PayPal - Return to PayPal after completing the Transaction................ and LOG OUT!

Yes, your Account stays active for a Brief period and additional purchases can be applied. Never actually had anyone get my Info through PayPal.
*Also - Never save your Paypal Password for easy access. All a thief needs is your Email address to get in. :ohmy:

One of the Worse practices is storing passwords via onsite <Remember me> log-ons.

*PayPal user since 2003 and never an issue with identity theift.
 

Douggro

Ultra Member
Nov 26, 2015
1,399
2,286
61
Seattle, WA
One of the Worse practices is storing passwords via onsite <Remember me> log-ons.
Er, no. The "remember me" option sets a cookie on your local machine with that info.
Any server admin who sets up a system that grants access by server-side provision of the password with entry of just the account name would be hung by the gonads.
 
  • Like
Reactions: curiousJan

crxess

Grumpy Ole Man
ECF Veteran
Verified Member
Sep 20, 2012
24,438
46,126
71
Williamsport Md
Er, no. The "remember me" option sets a cookie on your local machine with that info.
Any server admin who sets up a system that grants access by server-side provision of the password with entry of just the account name would be hung by the gonads.

Works for me. No info on either side diminishes risk. :cool:
I see an average of a dozen Bogus/hack emails a week. Immediately Delete without a second thought.

Mobile users need to be weary of vulnerabilities.
 
Status
Not open for further replies.

Users who are viewing this thread