Credit cards are vulnerable to brute force kind attacks

Perceived Vulnerabilities of Credit Cards

  • Card numbers + short CVV are seen as an outdated, weak security model, essentially acting like reusable passwords.
  • Attackers can brute-force or enumerate details (card number, expiry, CVV) via multiple merchants and weak anti-automation.
  • Some report compromises where the card was never “exposed” in normal use, suggesting pure guessing or systemic leakage.

Mitigations: Separate, Virtual, and Dynamic Cards

  • Many advocate a separate/low-balance card for online use, or virtual cards per-merchant/transaction with limits.
  • Services and banks offering disposable/virtual cards (including those with dynamic CVVs) are praised but described as niche or underused.
  • Some note these features have existed for years but didn’t “take off” because it’s cheaper for issuers to eat fraud.

Credit vs Debit: Fraud, Liability, and Lived Experience

  • One camp: credit cards are safer because your own money isn’t immediately taken; disputes feel less stressful.
  • Counter-camp: debit fraud protections (in some jurisdictions) are legally strong and often functionally equivalent in practice.
  • Several report months-long battles and partial/non-refunds on debit fraud; others say their banks or credit unions handled it instantly.
  • Strong disagreement on whether credit cards’ main downside—debt traps—is worth the upside; some see them as inherently predatory, others as universally beneficial if paid in full.

Brute Forcing, Fraud Detection, and Rate Limiting

  • Payment processors claim to detect “card testing” with ML and strict monitoring; others note attackers slow down and distribute attempts to evade detection.
  • Commenters stress rate limiting, anomaly detection, and IP blocking as key defenses, but say much of fraud prevention is still reactive.

3D Secure, Regional Differences, and Regulation

  • Outside the US, 3D Secure (often mandated by regulation like PSD2) is common and significantly reduces many attack vectors.
  • In the US, 3DS is rare; reasons cited: added friction, fragmented banking system, and misaligned incentives between issuers and merchants.
  • Some argue US law already strongly protects cardholders, leading banks to invest in backend monitoring instead of more user-facing friction.
  • Others highlight coordination problems: any single bank or merchant enabling stricter flows loses conversions to those who don’t.

Digital Wallets, Tokens, and Automatic Updaters

  • “Digital wallets” and card account updaters can silently keep recurring charges alive across card reissues, including potentially fraudulent ones.
  • One user discovered dozens of active “wallets/tokens” tied to a card; canceling them required a phone call and manual intervention.
  • Network tokens and automatic billing updaters are seen as double-edged: great for frictionless subscriptions, but can perpetuate stolen credentials.

Chargebacks, Liability, and Who Pays

  • At a surface level, consumers in many cases get made whole quickly; several people report near-instant reversals.
  • Others describe chargebacks being reversed after merchant disputes, banks siding with large platforms, and even account closures.
  • Discussion emphasizes that merchants often ultimately pay for fraud through chargebacks and fees, while banks recoup fraud costs via higher prices and interchange.
  • Some note that fraud costs are socialized into overall pricing; consumers “pay” for fraud indirectly even when individually protected.

System Design and Cryptography Critiques

  • Multiple commenters complain that the system relies on static PANs instead of per-transaction cryptographic keys or signatures.
  • EMV, 3DS, tokenization, and dynamic CVVs are viewed as partial fixes; commenters wonder why public-key–style models aren’t standard given modern tech.
  • Some argue that, economically, the current system “works well enough” for banks, so there’s insufficient incentive to overhaul it.