Hi,
I am using Magento 2.4.2 with PayPal PayFlow.
It looks like a script testing CC's in checkout. It will run 500+ in a day. I have added CAPTCHA and it doesn't seem to help. Sometimes when I view the transactions in PP Manager there isn't even a billing address added. All the data looks legitimate except the email address. It is always the name of the person follow by a bunch of random numbers @ yahoo, gmail. etc. The originating IP address shown in PP is just about always different so I can't block it. Sometimes when I do a reverse lookup of the IP address it doesn't have a DNS record at all.
Also, there are no orders/transactions showing in Magento at all. I only see them in PP Manager.
Anyone else have this issue?
Thanks,
Stan
I can’t provide specific details about your Magento setup, but I’ve occasionally heard about this issue from merchants using various payment processors, particularly on older versions of Magento. We’ve also had some merchants experience success after switching to a different payment processor. It may be worth checking out the Adobe Payment Services setup. The integration uses a different type of setup with PayPal than the Payflow integration which may help with mitigating the script, especially if it is sidestepping the Magento flow entirely.
Based on your Magento version, the highest version of Payment Services available would be 1.6.0/1.6.1.
Harrison
This issue indicates that bots are targeting your Magento site to test stolen or fake credit card numbers by exploiting the PayPal PayFlow integration. Since these transactions don’t appear in Magento but show in PayPal Manager, the attack is happening at the payment gateway level. Here’s how you can address this issue:
Ensure CAPTCHA is enabled at all sensitive entry points, including:
Enable PayPal’s fraud management filters (FMP) in your PayPal PayFlow account. Specific filters you should enable or configure:
Enable Magento's built-in fraud protection tools:
Add backend validation to block $0 transactions in your payment processing scripts. For example:
Ensure that your PayPal webhooks are correctly set up and validate transactions at the Magento level. If transactions aren’t validated or created in Magento, it suggests bots are bypassing your site’s transaction flow entirely.
Reach out to PayPal support and report this as a card testing attack. They can assist in configuring your account with advanced fraud detection settings and additional security layers.
Invest in a third-party fraud protection solution like:
When I encountered a similar issue for a client’s site, I had to configure advanced fraud prevention tools to address the problem effectively. I paid for some additional security features and implemented backend validation to stop the $0 transactions. You can see how I approach secure development practices on a site.
By combining Magento’s built-in security features, PayPal’s fraud tools, and external security measures, you can significantly reduce or prevent these attacks. Let me know if you need help configuring any of these!