Please help!!! Over 265,000 fraudulent constituent accounts created in less than a month

Options
Beginning on June 14, we have had over 265,000 fraudulent accounts created as a result of excessive credit card testing through one of our donation forms. We've reached out to support several times, we've added CAPTCHAs and enabled the "Validate API Donation Requests" verification settings on all of our donation forms, and still continue to receive thousands of fraudulent account creations each day (we had over 9000 yesterday alone).


Luckily none of the transactions have gone through, but they've all created fake constituent records. 


Has anyone else experienced this? Is there a way to create donation forms that only create constituent records if the transaction is successful? We need for this to stop as soon as possible, we're already looking at a massive data cleanup because of this, and the work is continuing to pile up. We haven't received much guidance from Luminate support beyond adding the CAPTCHAs and running reports.


Please help!! 
Tagged:
«1

Comments

  • Hi Erin,


    Have you reach out to your customer success manager/project manager to discuss this?  This sounds like someone created a script to create constituent records to test out credit cards.


    -David
  • Hi David!

    We have, but in the past when we've had issues with Luminate in the past, our Client Success manager has said "since I was not part of the Luminate acquisition, all I can do is provide you with solid information going forward." And that information seems to always lead us right back to chat support, or it leads us nowhere at all.  I agree, I think it's a script because it wouldn't be possible to manually complete the form at the rate in which it is. We're very much stuck and it seems like no one knows how to handle the situation. 
  • Hi,


    How about your Blackbaud Project Manager? Do you have retainer hours? If so, you can put this as a request which will come with a charge. What merchant account do you use? BBMS?


    -David Arocha
  • Hi Erin,


    I found the support case that you were referring to and I'm happy to step in to help. I'll message you through the case.


    Thanks!

    Trent Roberts

    Customer Support
  • Erin, we deal with this near daily however often see it 'big spurts' - here's what we have done and do.

    1. Captcha - not going to help - at least not us. There is a known bug in the BB API which will bypass captcha hence updating your websites pages (at least for us) did nothing to resolve. If the 'bad people' are good, and they are, they are not actually scrapping your pages, they are using an API.

    2. We download all BBMS transactions daily to look for patterns of non-approved transactions - these are easy to spot and you will quickly notice common patterns. Based on the patterns we have reports generated and remove the constituents from LO as well as RE.

    3. To prevent the risk of a CC being inappropriately charged (i.e. a 'bad person' getting lucky with the right info and confirming a cc is good) we do have BBMS confirm each transaction against a BBMS calculated confidence/score level.  Based on the score the transaction will be automatically declined regardless.  

    4. Lastly, if you manage events via LO make sure you close your event(s) when they are over - we have found this is an easy way to stop a lot of the transactions.


    Yes, the above is reactive but we find the fraudulent transactions within 12-24hrs and clean them up - it works for us.

     
  • Thank you so much!!!

     

    Erin
    Levine-Krynock

    Database
    & Registration Coordinator


     

    Pennsylvania
    Coalition Against Rape
    2101
    N Front Street

    Governor’s Plaza
    North, Bldg #2

    Harrisburg, PA 
    17110

    717.728.9740 x 106

    1-800-692-7445 x 106 Toll Free

    Help • Hope •
    Healing

     

     

    Join us May 18 for the Highmark Walk for a
    Healthy Community. 


    Build your team today
    and walk with PCAR to end
    sexual harassment, abuse and assault.

     

  • Hi,


    That's fantastic! Glad to hear. Trent, can I see what that looks like on the donation form for this example?


    -David Aorhca
  • Here's an example of how the BC SPCA integrated bot protection- they were dealing with the same thing in terms of fraudulent transactions!  The site uses an application level firewall with a known network of bots auto banned (they went with WordFence since they're on WordPress), a honeypot trap for scripts that fill out common fields, a time calculation system that detects how long it took to fill in the form, and a detection system that bans bots if they fail to submit the form too many times.

    https://spca.bc.ca/donations/make-a-donation/


     
  • Trent Roberts‍ Any plans from BB/LO team to improve/update the captcha functionality?


    Thanks,


    Phil
  • Philip Nawrocki‍, to my knowledge there isn't anything on the roadmap for improving CAPTCHA. There is a feature request in our Ideas Portal that is still open for voting:

    https://luminateonline.ideas.aha.io/ideas/LUM-I-1164


    Best regards,

    Trent Roberts

    Customer Support
  • Wow, starting July 9th (and ramping up over time) we also have been experiencing a vast number of fraudulent Declined transactions (a few do get through, though). Most of the time they're using the same address, but finding a pattern -- and a way to stop them -- has been proving elusive.


    Captcha isn't working of course. Swapping an existing donation form with another one only sandbags them temporarily. We even have our payment authorizer ban all non-US donations, but our best guess is these are going through VPNs and they're coming from everywhere. Our Deduplication process is hell as well. Naturally, we tried all sorts of form changes to throw them off, but none of them last long.  And of course, none of this traffic is on the page itself. Google Analytics and hotjar register nothing. 


    This wouldn't be so bad if Luminate hadn't allowed records to be created before a transaction status is successful. Doesn't that bogus data impact BB server cost too? Is there a reason the logic exists?


    Have you folks got any fresh ideas, OP?
  • M Oconnell, when we experienced this late last year our credit card processor was the one who actually warned us of what was happening. Along with being able to block IP addresses from suspect countries they also have functionality that allows you to block credit cards based on BIN numbers. We have blocked cards issued by banks in all the suspect countries like Brazil, Bulgaria etc. Of course this does not help with stolen Canadian, European or US credit cards but it does help some. We found that we just had to tough it out and delete all of the identified records as soon as we found them.


    Robert
  • I've also created this idea - please vote for it here: https://luminateonline.ideas.aha.io/ideas/LUM-I-1730 

     

    Do not create an active constituent record when it results from failed transaction

    In order to determine if a transaction is fraudulent, LO first has to create a constituent record so the information can be sent to the merchant account. I propose making a product change so that the system not create an *active* constituent record.

    Why? Active constituent records sync over to other database systems (offline CRM, mobile vendor, etc.) AND active constituent records receive email. When the data is bad, such as via a carding run, it takes staff time to identify said records, and then remove/clean the data across multiple systems. If not addressed, it can have negative downstream effects, such as impacting email deliverability and inflating direct mail costs.

    This issue impacts organizations large and small. Large organizations sometimes are able to dedicate the resources to clean the data; small most often are not. 

     
  • > since records can never truly be deleted from Luminate, we do now have close to 380,000 records that are "marked as removed."


    This sort of thing is such a bummer with LO.


    I understand the reasoning, but our instance has been running since 2008. I think we have more junk than real content at this point.


    BPM
  • We've recently experienced a spate of fraudulent donation attempts as well. Besides the backend work LO folks did for us (blocking IP was a major one) and verifying other settings (which I can't really enumerate, as I don't really know what they are), a suggestion that was made to us that seemed to also help stymie the bad guys was this: Since each giving level (ask level) has its own field ID, we "retired" the existing ones and created new ones that were the same as the original in terms of amounts. This was because Support thought it likely the bad guys had actually made a "shadow form" from our original, and were using it to card-test. And once they discovered their shadow form no longer worked, they'd move on. Which apparently they did, as for the last week plus, we've only received legitimate, normal activity on that form.


    I saw this OP when if first happened, and didn't think about it again in relation to our issue (which came later) until seeing Brian's update from 9/5. Now I'm realizing I probably have to go in and try to scope out all the false email addresses and make sure they're not "active" in Luminate! Upwards of 3000... sigh.


    Good thread, thanks all! (Especially for the Ideas links to vote for.)

     
  • "This was because Support thought it likely the bad guys had actually made a "shadow form" from our original, and were using it to card-test."


    I always imagined some kind of macro or script like GreaseMonkey which they run against the forms we host. But if they scrape their own front end form they can strip out all the UI and validation, and just make it a posting machine.


    I wonder how that works across domains though.


    BPM
  • We had the same carding this month and BB suggested us to use Digital resolve, the Behavioral monitoring software which will be put in between Luminate and the payment processor. Which according to BB, will analyse the traffic for any unusual behaviour while checking AVS, VVT. Has anyone tried this ?

    While BBMS will also enable the extra premium protection, to double up the security against carding. 
  • We used Digital Resolve during a recent carding run. Highly recommended as we shut off allowing of transactions from specific regions as time wore on. It cut off a source of fraud completely. A few days later we turned it back on and had no issues. Also try to adjust your Luminate PD settings to allow AVS/VVT. 


    Your tactics will be different from others' due to the nature of attacks.


     
  • How much time to set up? Approx cost? Seems like you'd need a pretty fast turnaround.


    BPM

     
  • That's great to hear. but the Luminate PD settings do no work, since we have IATS. IATS, did not have AVS or VVT, surprisingly and let all the fraud go thru and crashed.
  • I spoke to Allan the Sales Manager from Digital resolve, their turnaround time is pretty impressive. Once the agreement is signed within hours they are installed, security tightened. pretty awesome. Thanks Oconnell.

     
  • IATS was the worst, to a comical extent. We changed our hospital name, and they absolutely refused to update it in their system no matter who we spoke with. Several people told us it was simply not possible. This is the donor facing name I'm talking about here. Crazy.


    BPM
  • their advertisement boasts all the features but it nothing in place. Worst of all is that they do not have a 24/7 hot line for any emergencies !
  • One thing to note about implementing Digital Resolve -- if you are using the Facebook Fundraisers integration in TeamRaiser, there is some additional setup required if you are using Digital Resolve. You must whitelist the IP addresses used for Facebook Fundraisers, or else Digital Resolve may unintentionally flag the transactions as fraud.
  • thank you. Nice to know. Anything else to watch out ?

    May I know which payment processor are you using ? 
  • Raj - not sure who answers that question, but I'll send along my answer:  We use PayflowPro.   And that brings up another "valve" to stop fraudulent transactions - If LO's AVS settings aren't cutting it, you can consider Fraud services usually provided through your payment processor. In our instance, PayflowPro has add-ons for a fee that include Advanced Fraud Protection and Buyer Authentication. We haven't used it but its knowing whats there -- and if there's a "shut off anytime" mechanism, its something you might want to dry-run the set up to have it available on demand, because Fraud is always going to happen. 
  • Erik Leaver
    Erik Leaver ✭✭✭✭✭
    Ancient Membership Facilitator 4 Name Dropper Photogenic
    Agreed. Fraud is only growing.


    As per a Washington Post article a few weeks ago: "Card-not-present” credit card fraud has ballooned in the US, reaching $4.57 billion in 2016, up 34%,

Categories