
How Card-Testing Attacks Evolved in 2025 — and What Detection Actually Requires
Modern card-testing rings don't run 1,000 transactions from a single IP anymore. Here's what the current attack anatomy looks like and why velocity rules alone miss it.
Technical articles on payment fraud detection, ML scoring models, and real-time risk infrastructure from the InferX engineering team.

Modern card-testing rings don't run 1,000 transactions from a single IP anymore. Here's what the current attack anatomy looks like and why velocity rules alone miss it.

A fraud model trained last week is already slightly wrong. A model trained last quarter can miss entire attack categories. Here's the math behind retraining frequency decisions.

False positive rates are reported in percentages. The actual cost lands in customer support tickets, chargeback dispute hours, and merchant attrition. A framework for measuring the real number.

When the same device appears across 200 different card numbers at 12 different merchants, no single transaction looks unusual. Graph analysis catches what per-transaction scoring cannot.

BIN tables carry prepaid/credit/debit type, issuing country, and issuer fraud reputation. Most ML models either ignore this or encode it wrong. Here's how to do it correctly.

PCI DSS 4.0 introduced new requirements around fraud detection system validation. Most vendors haven't updated their documentation. Here's what actually changed and what it requires.

Device fingerprinting is only as good as the signals you collect and how you weight them. Canvas fingerprints are being spoofed. Here's what still holds up against modern fraud toolkits.

Synthetic identities are constructed from real SSN fragments, not stolen records. KYC passes. The fraud only surfaces at payoff. What behavioral signals catch it earlier.

Getting a fraud score under 50ms requires specific architecture decisions around feature extraction, model serving, and data locality. A walkthrough of the tradeoffs.

A processor can have a 99% detection rate and still hit Visa's chargeback monitoring threshold. The math of why — and what the actual lever is.

Tabular financial data, high-cardinality categoricals, and strict latency constraints favor gradient boosting over neural networks in most production fraud scenarios. The exceptions.

A year-end analysis of fraud patterns across the transactions InferX scored in 2024. Attack type distribution, seasonal patterns, and the fraud vectors that grew fastest.