The BIN, or the Bank Identification Number, is the first six digits on a credit card. These are always tied to its issuing institution – usually a bank. In a BIN attack, fraudsters use these six numbers to algorithmically try to generate all the other legitimate numbers, in the hopes of generating a usable card number.
They then use them at various merchants to filter that list down to, essentially, whatever works. A brute force type of attack, it typically involves a large number of small transactions – as is typical in card testing.
These small transactions show up as various types of declines before they ultimately find any correct combinations – and potentially use them to discover even more. Because they only use card numbers, BIN attacks constitute card not present fraud.
Fraudsters conduct BIN attacks by generating hundreds of thousands of possible credit card numbers and testing them out.
Remember that the fraudster will start off with only six digits, yet there are many more card details required for a successful transaction. If those are entered erroneously, the transaction will decline.
This includes the CVV number, the expiration date, as well as likely address verification service (AVS) failures. Card testing transactions are executed remotely in a fast fashion, so distance checks should also be a hint as well as velocity alerts.
Fraudsters may use bad merchant accounts directly for this purpose, or more frequently involve multiple online stores and services during a BIN attack, as their attempts keep getting blocked at most outlets.
BIN attack frauds harm every single party that’s involved in a transaction, except the criminal. More specifically:
Depending on where you are in the payment landscape, a BIN attack will affect you differently.
Generally speaking, it’s a good idea to set up rules based on typical card testing behavior, including:
Like in all card testing schemes, BIN attackers will look for small transactions that are quick to confirm and if you offer anything of that type as a merchant, you are at higher risk of being exposed to a BIN attack.
However, most anti-fraud rules and practices will cover BIN attacks in one way or another. And, in this type of fraud, even if the criminal has the correct card combination, they still won’t know the cardholder’s name or billing address, as well as several other frequently requested bits of information.
Yet, one should remember that with time, online fraud becomes ever more sophisticated; it’s rightly been described as a cat and mouse game between fraudsters and fraud-fighting specialists.
Even if BIN attack fraud in particular is fairly easy to catch, online merchants and everyone who might accept card-not-present payments are well-advised to implement appropriate levels of fraud detection and prevention.