My wife and I keep getting our debit cards stolen online. We notice the charges and are able to dispute them and cancel our cards, but it sure is annoying.

We don’t put our card information on suspicious websites. They’re on well known websites like amazon and Facebook.

We ran out emails through a data breach checker and it found nothing.

I don’t think there’s any malware on our devices.

Any idea what could be happening and how to prevent it?

  • @[email protected]
    link
    fedilink
    English
    241 year ago

    To be fair, factory resets are a huge pain in the ass. Might as well try other things before busting out the nuclear option.

    • @[email protected]
      link
      fedilink
      English
      91 year ago

      Once you suspect a device is infected the only good option is the nuclear option. Anything else will not be guaranteed to 100% remove it, or really, anywhere near close to that, or even detect everything wrong in the first place or after attempted removal. And with a month long period between attacks that is a long time to wait and see to see if any other option might work.

        • @[email protected]
          link
          fedilink
          English
          11 year ago

          Absolutely. Use an efficient disk imager that can take incremental snapshots and you can keep backups for months or years without needing a ton of storage.

      • @[email protected]
        link
        fedilink
        English
        0
        edit-2
        1 year ago

        True, but I would confirm a device is compromised before nuking the OS, not just do it willy-nilly because maybe it could be. A better way to phrase what OP is asking is: what are some ways to troubleshoot this without making a ton of potentially unnecessary work for myself?

        …to which I would say, run a netstat on any systems that you can, check those IP’s against WHOIS and/or traceroute. Anything that traces to Eastern Europe, Russia, China, most of SEA is a red flag. Dig a little deeper with Wireshark or Glasswire to inspect some actual packets for suspicious content. I think there’s a network logger that can trace the process using a given connection, but the name eludes me).

        Find your smoking gun, then torch the OS.

    • @[email protected]
      link
      fedilink
      English
      51 year ago

      Less of a pain in the ass than using a compromised device and having your payment card info stolen repeatedly?

      • @[email protected]
        link
        fedilink
        English
        31 year ago

        If it ends up not being the culprit, kinda yeah. I’m just saying, try some less disruptive troubleshooting first.