{"id":4642,"date":"2023-02-09T11:33:25","date_gmt":"2023-02-09T11:33:25","guid":{"rendered":"https:\/\/ccbill.com\/kb\/?p=4642"},"modified":"2023-03-06T09:29:55","modified_gmt":"2023-03-06T09:29:55","slug":"bin-attack","status":"publish","type":"post","link":"https:\/\/ccbill.com\/kb\/bin-attack","title":{"rendered":"BIN Attack: What Is It and How to Protect Your Business?"},"content":{"rendered":"\n<p class=\"h3\">Introduction<\/p>\n\n\n\n<p>To protect their customers, merchants need to implement robust <a href=\"https:\/\/ccbill.com\/blog\/ecommerce-fraud-prevention\" target=\"_blank\" rel=\"noreferrer noopener\">fraud prevention policies<\/a>, invest in fraud detection tools, and learn about different <a href=\"https:\/\/ccbill.com\/blog\/online-payment-fraud\" target=\"_blank\" rel=\"noreferrer noopener\">types of payment fraud<\/a>.<\/p>\n\n\n\n<p>A particularly dangerous type of fraud is the BIN attack. It involves the use of bank identification numbers (BIN) and computer-generated number sequences to discover valid payment card numbers.<\/p>\n\n\n\n<p>Find out how BIN attacks work and take the necessary steps to secure your business.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png\" alt=\"BIN attack attempt where attackers try to guess the customer's credit card number.\" class=\"wp-image-4643\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud-300x150.png 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud-768x384.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Is a BIN Attack?<\/h2>\n\n\n\n<p>A Bank Identification Number (BIN) is the first 4-8 digits of a payment card number. It identifies the card issuer (i.e., financial institution, bank), card network, and the type of card being used - a <a href=\"https:\/\/ccbill.com\/blog\/credit-card-vs-debit-card\" target=\"_blank\" rel=\"noreferrer noopener\">credit or debit card<\/a>.<\/p>\n\n\n\n<p>BINs are publicly available and are easily obtained. During a BIN attack, an attacker takes the BIN of an issuer and uses computer software to generate the remaining digits of the cardholder\u2019s card number.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"391\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-card-number.jpg\" alt=\"BIN location on a credit card example.\" class=\"wp-image-4655\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-card-number.jpg 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-card-number-300x147.jpg 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-card-number-768x375.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<p>Once the attacker generates thousands of card numbers, they test them on actual online stores to determine which <a href=\"https:\/\/ccbill.com\/kb\/test-credit-card-numbers\" target=\"_blank\" rel=\"noreferrer noopener\">card numbers<\/a> correspond to existing, valid cards.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does a BIN Attack Work?<\/h2>\n\n\n\n<p>A BIN attack does not target a specific cardholder but tries to identify as many valid card numbers issued by the same issuer as possible.<\/p>\n\n\n\n<p>A BIN attack typically follows these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"1\">\n<li>The fraudster targets a specific card issuer and obtains their 4 to 8-digit BIN.<\/li>\n\n\n\n<li>They utilize special software to generate a vast array of potentially valid card numbers.<\/li>\n\n\n\n<li>Fraudsters then test the generated numbers by attempting small transactions at legitimate businesses to determine if a credit card number is valid. Sometimes attackers use merchant accounts they create specifically for this purpose.<\/li>\n\n\n\n<li>They use the card numbers identified as genuine to make high-value unauthorized purchases.<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/attacker-stealing-card-information.jpg\" alt=\"An attacker using a software program to initiate a BIN attack and steal card information.\" class=\"wp-image-4663\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/attacker-stealing-card-information.jpg 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/attacker-stealing-card-information-300x172.jpg 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/attacker-stealing-card-information-768x441.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background is-style-wide\"\/>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-alpha-channel-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<p><strong>Note<\/strong>: It is not uncommon for card numbers attained from BIN attacks to be sold on the dark web and used in other types of payment fraud such as phishing, identity theft, and <a href=\"https:\/\/ccbill.com\/kb\/account-takeover\" target=\"_blank\" rel=\"noreferrer noopener\">account takeover<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-alpha-channel-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Who Are the Targets of BIN Attacks?<\/h2>\n\n\n\n<p>A BIN attack targets the cardholder\u2019s card number. The attacker makes countless attempts with different card number sequences until they succeed in initiating a transaction.<\/p>\n\n\n\n<p>This type of attack targets participants in the payment process, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Card Issuers<\/strong> - The attacker identifies a specific BIN and tries to discover as many card numbers issued by a particular bank, financial institution, airline, gas company, etc.<\/li>\n\n\n\n<li><strong>Merchants<\/strong> - Attackers often target smaller merchants who may not have sophisticated fraud detection systems and procedures in place.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/ccbill.com\/payment-processing\" target=\"_blank\" rel=\"noreferrer noopener\">Payment Processors<\/a><\/strong> - Payment Service Providers (PSPs) have advanced fraud detection systems, but they process a large volume of transactions. Attackers try to mask the origin of the transaction and limit the number of attempts to stay undetected for as long as possible.<\/li>\n\n\n\n<li><strong>Customers<\/strong> - Once a valid card number is identified, customers will discover that their card was used for unauthorized transactions.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-alpha-channel-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<p><strong>Note: <\/strong>Learn everything about payment processing in our articles <a href=\"https:\/\/ccbill.com\/blog\/what-is-a-payment-processor\" target=\"_blank\" rel=\"noreferrer noopener\">What Is a Payment Processor?<\/a> and <a href=\"https:\/\/ccbill.com\/blog\/how-does-payment-processing-work\" target=\"_blank\" rel=\"noreferrer noopener\">How Does Payment Processing Work?<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-alpha-channel-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Are the Consequences of a BIN Attack for Merchants?<\/h2>\n\n\n\n<p>Consumers are not the only ones on the losing end when hit by a BIN attack. Credit card testing can have a significant impact on merchants too, with consequences including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Higher chargeback fees<\/strong> - Any form of payment fraud can lead to chargebacks and hurt the merchant\u2019s bottom end.<\/li>\n\n\n\n<li><strong>High-risk classification<\/strong> \u2013 The increase in chargebacks, if not put under control, leads to a business being classified as high risk. Not all payment processors want to work with a <a href=\"https:\/\/ccbill.com\/blog\/high-risk-merchant-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">high-risk merchant<\/a>, making online payment processing more difficult and costly for the merchant.<\/li>\n\n\n\n<li><strong>Higher interchange fees<\/strong> - The surge in transaction attempts due to card testing leads to higher interchange fees.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"418\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-consequences-1.jpg\" alt=\"Rising business costs due to BIN attacks. \" class=\"wp-image-4672\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-consequences-1.jpg 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-consequences-1-300x157.jpg 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-consequences-1-768x401.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Transaction restrictions <\/strong>\u2013 Due to the influx of transaction attempts, payment processors may limit the merchant\u2019s processing capabilities as a security precaution. While that may mitigate the BIN attack, it will also prevent some legitimate buyers from making a purchase. &nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How Can Merchants Detect BIN Attacks?<\/h2>\n\n\n\n<p>Indicators that a BIN attack is underway include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Multiple transactions from the same IP address<\/strong> - Attackers often use rudimentary software and attacks originate from a single location. Transactions coming from the same <a href=\"https:\/\/phoenixnap.com\/glossary\/what-is-an-ip-address\" target=\"_blank\" rel=\"noreferrer noopener\">IP address<\/a> using sequential card numbers should be viewed as highly suspicious.<\/li>\n\n\n\n<li><strong>Multiple purchases in quick succession - <\/strong>Once a credit card number has been compromised, attackers try to make as many automated purchases as possible.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"344\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/detect-bin-attack.jpg\" alt=\"Different ways to detect BIN attacks.\" class=\"wp-image-4670\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/detect-bin-attack.jpg 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/detect-bin-attack-300x129.jpg 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/detect-bin-attack-768x330.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>A sharp increase in declined transactions -<\/strong> Only a handful of card numbers generated during a BIN attack is valid. A sudden increase in declined transactions due to an invalid card number is an indicator that someone might be entering the wrong numbers by design.<\/li>\n\n\n\n<li><strong>CVV errors -<\/strong> <a href=\"https:\/\/ccbill.com\/kb\/cvc-vs-cvv\" target=\"_blank\" rel=\"noreferrer noopener\">CVV codes<\/a> are difficult to obtain as they are specific to each card. An increase in declined transactions due to wrong CVV entries can be an indicator that the merchant is under a BIN attack.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">BIN Attack Prevention<\/h2>\n\n\n\n<p>Merchants can reduce the risk of BIN attacks by implementing the following measures:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/ccbill.com\/doc\/ccbill-velocity-controls\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Velocity Controls<\/strong><\/a> - Restrict the number of transactions a customer can initiate and the total amount they can spend within a given time frame.<\/li>\n\n\n\n<li><strong>Address Verification Service (AVS)<\/strong> - <a href=\"https:\/\/ccbill.com\/kb\/avs-meaning\" target=\"_blank\" rel=\"noreferrer noopener\">AVS systems<\/a> compare the address a customer enters on the payment form to the data their card issuer has on file. This means that attackers need to know the customer\u2019s correct address before attempting a transaction. AVS is an inexpensive and proven method for preventing unsophisticated payment fraud attacks.<\/li>\n\n\n\n<li><strong>Monitor for suspicious activity -<\/strong> Always investigate unusual payment activity, such as, transactions that originate from the same IP address but use different payment details, declines that use the same card number but different expiration dates, declines with sequential card numbers, or the use of generic email addresses.<\/li>\n\n\n\n<li><strong>Clear procedures and regular staff training -<\/strong> Employees need to recognize common threats and understand how their actions facilitate or prevent BIN attacks. They need to know how to recognize a BIN attack and what action to take once an attack is underway.<\/li>\n\n\n\n<li><strong>Payment Tokens -<\/strong> Check if your payment processor offers features that allow you to <a href=\"https:\/\/ccbill.com\/kb\/credit-card-tokenization\" target=\"_blank\" rel=\"noreferrer noopener\">tokenize payment information<\/a>. Substituting personally identifiable payment information with a token significantly increases the security of transactions.<\/li>\n\n\n\n<li><strong>Two-Factor Authentication -<\/strong> Adding an additional security layer with <a href=\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a> reduces the risks of payment fraud. Attackers looking to test card number variations avoid websites that require cardholders to authenticate themselves with their bank before a transaction can be completed.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"388\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/2-factor-authentication-payments.jpg\" alt=\"Customer confirming their identity during a payment.\" class=\"wp-image-4668\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/2-factor-authentication-payments.jpg 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/2-factor-authentication-payments-300x146.jpg 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/2-factor-authentication-payments-768x372.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Advanced fraud detection systems -<\/strong> Fraud detection methods that incorporate machine learning, AI, and predictive models are expensive for merchants to implement on their own. Using a payment processor with sophisticated detection systems enables you to better protect your business at a fraction of the cost. When <a href=\"https:\/\/ccbill.com\/kb\/how-to-choose-a-payment-processor\" target=\"_blank\" rel=\"noreferrer noopener\">choosing a payment processor<\/a>, find out more about the systems, tools, and procedures they use to manage risk.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What to Do in Case of a BIN Attack?<\/h2>\n\n\n\n<p>To minimize the damage caused by a BIN attack and prevent future attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Contact your bank or merchant services provider immediately to report the attack and close any fraudulent accounts.<\/li>\n\n\n\n<li>Review your transaction records to identify any unauthorized transactions or suspicious activity.<\/li>\n\n\n\n<li>Notify customers who may have been affected and provide them with information on how to protect themselves from fraud.<\/li>\n\n\n\n<li>Review and update your security protocols, including your BIN validation procedures, to ensure that they are as secure as possible.<\/li>\n\n\n\n<li>BIN attacks are a crime - report the incident to the authorities.<\/li>\n\n\n\n<li>Take steps to protect your business from future attacks, such as implementing advanced fraud detection and prevention tools, and educating your employees about how to spot and prevent BIN attacks.<\/li>\n<\/ul>\n\n\n\n<p>It is important to note that preventing and detecting BIN attacks is a continuous process. Remain proactive, take the necessary precautions, and continuously monitor for any suspicious activities.<\/p>\n\n\n\n<p class=\"h3\">Conclusion<\/p>\n\n\n\n<p>You now know how BIN attacks work, the best ways to prevent them, and what to do if your business is targeted. <\/p>\n\n\n\n<p>As a merchant, you need to collaborate closely with other participants in the payment process. Finding a reliable payment processor with an impeccable safety record will help you protect your business and customers from BIN attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article explains how BIN attacks work and discusses ways to detect and prevent them.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17,13],"tags":[],"class_list":["post-4642","post","type-post","status-publish","format-standard","hentry","category-online-security","category-payment-processing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BIN Attack: What Is It and How to Protect Your Business?<\/title>\n<meta name=\"description\" content=\"Learn everything about BIN attacks, the best ways to prevent them, and what steps to take if your business is targeted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ccbill.com\/kb\/bin-attack\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BIN Attack: What Is It and How to Protect Your Business?\" \/>\n<meta property=\"og:description\" content=\"Learn everything about BIN attacks, the best ways to prevent them, and what steps to take if your business is targeted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ccbill.com\/kb\/bin-attack\" \/>\n<meta property=\"og:site_name\" content=\"CCBill Knowledge Base\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ccbillBIZ\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-09T11:33:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T09:29:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png\" \/>\n<meta name=\"author\" content=\"Vladimir Kaplarevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CCBillBIZ\" \/>\n<meta name=\"twitter:site\" content=\"@CCBillBIZ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vladimir Kaplarevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack#article\",\"isPartOf\":{\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack\"},\"author\":{\"name\":\"Vladimir Kaplarevic\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644\"},\"headline\":\"BIN Attack: What Is It and How to Protect Your Business?\",\"datePublished\":\"2023-02-09T11:33:25+00:00\",\"dateModified\":\"2023-03-06T09:29:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack\"},\"wordCount\":1367,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png\",\"articleSection\":[\"Online Security\",\"Payment Processing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ccbill.com\/kb\/bin-attack#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack\",\"url\":\"https:\/\/ccbill.com\/kb\/bin-attack\",\"name\":\"BIN Attack: What Is It and How to Protect Your Business?\",\"isPartOf\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png\",\"datePublished\":\"2023-02-09T11:33:25+00:00\",\"dateModified\":\"2023-03-06T09:29:55+00:00\",\"description\":\"Learn everything about BIN attacks, the best ways to prevent them, and what steps to take if your business is targeted.\",\"breadcrumb\":{\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ccbill.com\/kb\/bin-attack\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage\",\"url\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png\",\"contentUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png\",\"width\":800,\"height\":400,\"caption\":\"BIN attack attempt where attackers try to guess the customer's credit card number.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ccbill.com\/kb\/bin-attack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"KB Home\",\"item\":\"https:\/\/ccbill.com\/kb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Security\",\"item\":\"https:\/\/ccbill.com\/kb\/category\/online-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BIN Attack: What Is It and How to Protect Your Business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ccbill.com\/kb\/#website\",\"url\":\"https:\/\/ccbill.com\/kb\/\",\"name\":\"CCBill Knowledge Base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ccbill.com\/kb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\",\"name\":\"CCBill\",\"url\":\"https:\/\/ccbill.com\/kb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png\",\"contentUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png\",\"width\":160,\"height\":70,\"caption\":\"CCBill\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ccbillBIZ\/\",\"https:\/\/x.com\/CCBillBIZ\",\"https:\/\/www.linkedin.com\/company\/ccbill\",\"https:\/\/www.youtube.com\/c\/CCBillBiz\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644\",\"name\":\"Vladimir Kaplarevic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g\",\"caption\":\"Vladimir Kaplarevic\"},\"description\":\"Vladimir is a resident Tech Writer at CCBill. He has more than 8 years of experience in implementing e-commerce and online payment solutions with various global IT services providers. His engaging writing style provides practical advice and aims to spark curiosity for innovative technologies.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BIN Attack: What Is It and How to Protect Your Business?","description":"Learn everything about BIN attacks, the best ways to prevent them, and what steps to take if your business is targeted.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ccbill.com\/kb\/bin-attack","og_locale":"en_US","og_type":"article","og_title":"BIN Attack: What Is It and How to Protect Your Business?","og_description":"Learn everything about BIN attacks, the best ways to prevent them, and what steps to take if your business is targeted.","og_url":"https:\/\/ccbill.com\/kb\/bin-attack","og_site_name":"CCBill Knowledge Base","article_publisher":"https:\/\/www.facebook.com\/ccbillBIZ\/","article_published_time":"2023-02-09T11:33:25+00:00","article_modified_time":"2023-03-06T09:29:55+00:00","og_image":[{"url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png","type":"","width":"","height":""}],"author":"Vladimir Kaplarevic","twitter_card":"summary_large_image","twitter_creator":"@CCBillBIZ","twitter_site":"@CCBillBIZ","twitter_misc":{"Written by":"Vladimir Kaplarevic","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ccbill.com\/kb\/bin-attack#article","isPartOf":{"@id":"https:\/\/ccbill.com\/kb\/bin-attack"},"author":{"name":"Vladimir Kaplarevic","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644"},"headline":"BIN Attack: What Is It and How to Protect Your Business?","datePublished":"2023-02-09T11:33:25+00:00","dateModified":"2023-03-06T09:29:55+00:00","mainEntityOfPage":{"@id":"https:\/\/ccbill.com\/kb\/bin-attack"},"wordCount":1367,"commentCount":0,"publisher":{"@id":"https:\/\/ccbill.com\/kb\/#organization"},"image":{"@id":"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage"},"thumbnailUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png","articleSection":["Online Security","Payment Processing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ccbill.com\/kb\/bin-attack#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ccbill.com\/kb\/bin-attack","url":"https:\/\/ccbill.com\/kb\/bin-attack","name":"BIN Attack: What Is It and How to Protect Your Business?","isPartOf":{"@id":"https:\/\/ccbill.com\/kb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage"},"image":{"@id":"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage"},"thumbnailUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png","datePublished":"2023-02-09T11:33:25+00:00","dateModified":"2023-03-06T09:29:55+00:00","description":"Learn everything about BIN attacks, the best ways to prevent them, and what steps to take if your business is targeted.","breadcrumb":{"@id":"https:\/\/ccbill.com\/kb\/bin-attack#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ccbill.com\/kb\/bin-attack"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/bin-attack#primaryimage","url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png","contentUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2023\/02\/bin-attack-payment-fraud.png","width":800,"height":400,"caption":"BIN attack attempt where attackers try to guess the customer's credit card number."},{"@type":"BreadcrumbList","@id":"https:\/\/ccbill.com\/kb\/bin-attack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"KB Home","item":"https:\/\/ccbill.com\/kb\/"},{"@type":"ListItem","position":2,"name":"Online Security","item":"https:\/\/ccbill.com\/kb\/category\/online-security"},{"@type":"ListItem","position":3,"name":"BIN Attack: What Is It and How to Protect Your Business?"}]},{"@type":"WebSite","@id":"https:\/\/ccbill.com\/kb\/#website","url":"https:\/\/ccbill.com\/kb\/","name":"CCBill Knowledge Base","description":"","publisher":{"@id":"https:\/\/ccbill.com\/kb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ccbill.com\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ccbill.com\/kb\/#organization","name":"CCBill","url":"https:\/\/ccbill.com\/kb\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/","url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png","contentUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png","width":160,"height":70,"caption":"CCBill"},"image":{"@id":"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ccbillBIZ\/","https:\/\/x.com\/CCBillBIZ","https:\/\/www.linkedin.com\/company\/ccbill","https:\/\/www.youtube.com\/c\/CCBillBiz"]},{"@type":"Person","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644","name":"Vladimir Kaplarevic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g","caption":"Vladimir Kaplarevic"},"description":"Vladimir is a resident Tech Writer at CCBill. He has more than 8 years of experience in implementing e-commerce and online payment solutions with various global IT services providers. His engaging writing style provides practical advice and aims to spark curiosity for innovative technologies."}]}},"_links":{"self":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/4642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/comments?post=4642"}],"version-history":[{"count":21,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/4642\/revisions"}],"predecessor-version":[{"id":4780,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/4642\/revisions\/4780"}],"wp:attachment":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/media?parent=4642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/categories?post=4642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/tags?post=4642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}