Cybercrime , Fraud Management & Cybercrime

Banish Sequential Numbering: How to Combat 'BIN Attacks'

Keri Crane of Jack Henry & Associates on Bank Identification Number Attack Defenses
Keri Crane, advisory technical product manager, Jack Henry & Associates

In order to identify BIN (Bank Identification Number) attacks or account testing attacks, it is important for payment card brands to leverage artificial intelligence and automated systems for monitoring transaction data to look for unusual patterns and work with merchants to improve processes, says Keri Crane, advisory technical product manager with Jack Henry & Associates. BIN attacks happen when fraudsters take the first six digits of a card and use a software to generate the remaining digits.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

"It is important that merchants check the CVV code and carry out 3D secure authentication, as well as do bot checking. From the issuer side, it is important to generate card numbers randomly rather than sequentially. This will go a long way in stopping the BIN attacks," she says.

In a video interview with Information Security Media Group, Crane also discusses:

  • How to identify BIN attacks;
  • Technologies to leverage to stop BIN attacks;
  • Payment card fraud trends for 2022.

Crane is an advisory technical product manager with Jack Henry & Associates and has over 25 years of experience. She focuses on card fraud management and the analysis of emerging payment trends.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.