<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Accept Customer Hosted Form Brute Force in Integration and Testing</title>
    <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81813#M51567</link>
    <description>&lt;P&gt;Any update from the Authorize.net team?&lt;/P&gt;</description>
    <pubDate>Sun, 27 Mar 2022 14:31:07 GMT</pubDate>
    <dc:creator>ngagne7412</dc:creator>
    <dc:date>2022-03-27T14:31:07Z</dc:date>
    <item>
      <title>Accept Customer Hosted Form Brute Force</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81221#M51202</link>
      <description>&lt;P&gt;We've received tens of thousands of $0 card authorization declines in the last couple of weeks. We've identified that someone is exploiting the Accept Customer Hosted Form (&lt;A href="https://developer.authorize.net/api/reference/features/customer_profiles.html" target="_self"&gt;https://developer.authorize.net/api/reference/features/customer_profiles.html&lt;/A&gt;) which we're embedding in an iFrame on our application. Since card authorization happens when entering credit card data, it allows a malicious user to repeatedly test credit card data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to combat this, we've set hostedProfileValidationMode=testMode. Is this the best solution, or is there another solution for having hostedProfileValidationMode=liveMode while still protecting against these kind of brute-force attacks?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the settings we were using for the Accept Customer Hosted Form:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;hostedProfileManageOptions=showPayment&lt;/LI&gt;&lt;LI&gt;hostedProfilePageBorderVisible=false&lt;/LI&gt;&lt;LI&gt;hostedProfileCardCodeRequired=true&lt;/LI&gt;&lt;LI&gt;hostedProfileBillingAddressRequired=true&lt;/LI&gt;&lt;LI&gt;hostedProfilePaymentOptions=showCreditCard&lt;/LI&gt;&lt;LI&gt;hostedProfileValidationMode=liveMode&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sat, 12 Feb 2022 18:41:54 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81221#M51202</guid>
      <dc:creator>ngagne7412</dc:creator>
      <dc:date>2022-02-12T18:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Accept Customer Hosted Form Brute Force</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81226#M51206</link>
      <description>&lt;P&gt;@&lt;SPAN class=""&gt;&lt;A href="https://drifthuntersgame.com/" target="_self"&gt;&lt;SPAN class=""&gt;ngagne7412 &lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;I am facing the same issue.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Feb 2022 11:52:18 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81226#M51206</guid>
      <dc:creator>emmawilson</dc:creator>
      <dc:date>2022-02-13T11:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Accept Customer Hosted Form Brute Force</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81376#M51276</link>
      <description>&lt;P&gt;I'm surprised that Authorize.net would offer a feature on their own hosted form which allows a malicious user to brute force credit card data without any kind of prevention, and the only solution is to disable that feature (&lt;SPAN&gt;hostedProfileValidationMode=testMode). I see that Authorize.net offers a "security code" feature on their checkout form to prevent this, but they haven't added anything simliar to the&amp;nbsp;Accept Customer Hosted Form. If the&amp;nbsp;Accept Customer Hosted Form is no longer a supported product they should announce it as deprecated so developers can make a more informed decision when developing a solution.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Feb 2022 15:52:20 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81376#M51276</guid>
      <dc:creator>ngagne7412</dc:creator>
      <dc:date>2022-02-21T15:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Accept Customer Hosted Form Brute Force</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81440#M51317</link>
      <description>&lt;P&gt;Is there anyone available from the Authorize.net team who can speak to this, as (from what I can see) this is an issue which will affect&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;all customers&lt;/STRONG&gt;&lt;/EM&gt; who are using the hosted form.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Feb 2022 18:01:52 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81440#M51317</guid>
      <dc:creator>ngagne7412</dc:creator>
      <dc:date>2022-02-26T18:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: Accept Customer Hosted Form Brute Force</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81813#M51567</link>
      <description>&lt;P&gt;Any update from the Authorize.net team?&lt;/P&gt;</description>
      <pubDate>Sun, 27 Mar 2022 14:31:07 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/81813#M51567</guid>
      <dc:creator>ngagne7412</dc:creator>
      <dc:date>2022-03-27T14:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: Accept Customer Hosted Form Brute Force</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/91744#M57592</link>
      <description>&lt;P&gt;It's been a few years but I'm reviving this thread as the problem has again resurfaced. The Authorize.net documentation doesn't seem to offer any details on how to protect against this. Other products offer a&amp;nbsp;&lt;SPAN&gt;validationMode=none setting, but not the CIM. What other options do we have to protect against card testing fraud? If the CIM is not a viable, supported option, please let the developer community know.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 03:52:12 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/91744#M57592</guid>
      <dc:creator>ngagne7412</dc:creator>
      <dc:date>2025-05-28T03:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Accept Customer Hosted Form Brute Force</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/93782#M58067</link>
      <description>&lt;P&gt;Anyone from Authoritze.net have any thoughts on how to address these issues?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2025 22:44:05 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Accept-Customer-Hosted-Form-Brute-Force/m-p/93782#M58067</guid>
      <dc:creator>ngagne7412</dc:creator>
      <dc:date>2025-08-22T22:44:05Z</dc:date>
    </item>
  </channel>
</rss>

