profile

Protecting Paysites from Password Abuse

It's a problem that is faced by all adult paysite operators — the unauthorized disclosure of member logins, where legitimate users provide friends and strangers with their user name and password, "sharing" access to your premium content and impacting your bottom line.

This impact costs operators both direct and indirect revenues: direct revenues because the person that receives access to your member's area for free will never become a paying customer; and indirect, as the increased server resource usage can slow down the overall user experience for both current and prospective customers — hurting both new sales as well as recurring sales.

Sometimes this sharing of passwords is intentional, with members providing logins to folks ranging from a relatively small circle of friends, to organized password-sharing websites that offer incentives — including cash payouts — in exchange for a supply of fresh login information.

Sometimes this sharing is unintentional, and even unnoticed, as in the case of malware and "zombie" systems that may be on a user's computer: recording keystrokes and then providing criminals with all sorts of login information; from online banking accounts to access to your paysite — and everything in between.

While inexperienced operators may discount the frequency with which this happens, statistics show that anywhere from 5-50 percent of member area accesses are performed using "shared" login information. This can lead to not only vastly increased bandwidth consumption and its associated fees, but to markedly increased costs from providing the leased feeds and third-party content that you are often charged for on a "per viewer" or "bandwidth used" basis.

It's not just sharing that's a problem, however, as any number of automated scripts are available to hackers that will facilitate what is known as a "brute force" attack, where the dictionary is literally thrown at your login page, in the hopes that a matching user/pass combo will be found. While I'm simplifying what can be a very subtle and sophisticated process of attack, the result is the same: everything slows down for legitimate users and you are stuck with the bill.

Regardless of how, why or where your member's logins are being shared, or the number of times hackers have attempted to "guess" their way in to your protected member's area, it behooves paysite operators of all sizes to take some defensive measures against these costly assaults; and one of the leading solutions to accomplish this goal is that provided by Phantom Frog.

What separates Phantom Frog from many of its competitors is its range of features, which not only provide the basic essentials of password protection, but also offers time-saving Automated Member Support tools that make it easier for paysite owners to keep their customers happy and returning for more.

For example, whereas some systems will simply block abused passwords and prevent what may be a legitimate member from entering your site, Phantom Frog can disable the problem login and provide an interface for legitimate users to retrieve a new password, without having to deal directly with the billing company. Phantom Frog does this by providing a customizable, template-driven interface that hooks into several of the most popular third-party billing platforms, such as CCBill, NetBilling, Epoch, 2000Charge, Jettis, 365Billing, Electracash and more, as well as being fully integrated with cascading billing and affiliate management solutions such as MPA3 and NATS, allowing for easy, automatic updating of member login information.

Additionally, daily bandwidth limits can be set on a per-user basis, preventing members from draining server resources and slowing down your website's performance through their use of automatic downloading tools.

While competitive systems rely on monitoring password trading sites, or simply counting IP addresses, which is problematic when dealing with proxy servers or users on dial-up connections with new IP addresses with each session, what truly makes Phantom Frog so effective is the means by which it detects fraudulent access attempts and password abuse.

Using an exclusive geo-IP tracking system that performs 15 different tests, including the analysis of a user's country, state, city, latitude and longitude, users in different locations that are attempting to share login information are easily identified. A "travel velocity" calculation helps protect legitimate travelers from being wrongfully flagged: for example, if a login occurs in Los Angeles at 8:00 am, a legitimate login could reasonably occur at 11:00 am in San Diego — but if it occurs at that time in Moscow, the travel velocity will have been exceeded and the access attempt blocked.

Logging into the Phantom Frog admin system provides a summary of password abuse that shows the number of member accounts being tracked; the number and percentage of those accounts that have been flagged as being abused; the number of abuse alerts that have been issued; and each member's login history — an especially useful function for dealing with "friendly fraud" claims that include a member's denial of accessing the site.

Other screens show blocked members, listing the date and reason for their blockage and providing a manual option for unblocking the account. Ignored members – such as house accounts that are manually set to be monitored but not acted upon, are also listed, as are the IP addresses that have been blocked by the system.

A member search function and ability to associate email addresses with individual users are also provided, enhancing a site owner's ability to manage customer service in-house.

Context-sensitive help screens and the availability of support from the script's author, including installation, make the learning curve as flat as can be — an added bonus.

While this article is not meant to be an exhaustive listing of every one of Phantom Frog's benefits and features, prospective users can download a free trial of the software at the company's website and evaluate the feature set on their own system. Installation involves uploading a single file to the member's area root directory and adding a single snippet of code to the member's area home page. A quick email to the software's author will get you a thorough guided tour of the admin area and operational procedures via telephone.

Given the severity of the problem of password abuse and the negative financial impact it makes on your bottom line, giving Phantom Frog a try makes sense for paysite operators of all sizes. Give it a try and see for yourself!

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

The Search for Perfection in Your Payments Page

There has been a lot of talk about changes to cross sales and checkout pages. You have likely noticed that acquirers are now actively pushing back on allowing merchants to offer a negative option, upsell or any cross sales on payment pages.

Cathy Beardsley ·
opinion

Unpacking the Payment Card Industry's Latest Data Security Standard

The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements and guidelines that apply to all businesses that accept credit card payments, and is designed to ensure the security of those transactions.

Jonathan Corona ·
opinion

Compliance With State Age Verification Laws

During the past year, website operators have faced a slew of new state age verification laws entailing a variety of inconsistent compliance obligations.

Lawrence Walters ·
opinion

Merchants in Spotlight With Visa's VIRP

By now, most merchants know about the Visa Integrity Risk Program (VIRP) rolled out in spring 2023. The program is designed to ensure that acquirers and their designated agents — payment facilitators, independent sales organizations and wallets — maintain proper controls and oversight to prevent illegal transactions from entering the Visa payment system.

Cathy Beardsley ·
opinion

How to Know When Hosting Upgrades Are Really Needed

I was reminded about an annoyingly common experience that often frustrates website owners: upgrades. Sometimes, an upgrade of physical system resources like CPU, RAM or storage really is required to solve a problem or improve performance… but how do you know you’re not just being upsold?

Brad Mitchell ·
profile

WIA Profile: Natasha Inamorata

Natasha Inamorata was just a kid when she first picked up a disposable camera. She quickly became enamored with it and continued to shoot with whatever equipment she could afford. In her teens, she saved enough money to purchase a digital Canon ELPH, began taking portraits of her friends, shot an entire wedding on a point-and-shoot camera and edited the photos with Picnik.

Women in Adult ·
trends

Collab Nation: Top Creators Share Best Practices for Fruitful Co-Shoots

One of the fastest ways for creators to gain new subscribers and buyers, not to mention monetize their existing fan base, is to collaborate with other creators. The extra star power can multiply potential earnings, broaden brand reach and boost a creator’s reputation in the community.

Alejandro Freixes ·
opinion

Bridging Generational Divides in Payment Preferences

While Baby Boomers and Gen Xers tend to be most comfortable with the traditional payment methods to which they are accustomed, like cash and credit cards, the younger cohorts — Millennials and Gen Z — have veered sharply toward digital-first payment solutions.

Jonathan Corona ·
opinion

Legal and Business Safety for Creators at Trade Shows

As I write this, I am preparing to attend XBIZ Miami, which reminds me of attending my first trade show 20 years ago. Since then, I have met thousands of people from all over the world who were doing business — or seeking to do business — in the adult industry.

Corey D. Silverstein ·
opinion

Adding AI to Your Company's Tech Toolbox

Artificial intelligence is all the rage. Not only is AI all over the headlines, it is also top of mind for many company leadership teams, who find themselves asking, “How can this new tool help our company?”

Cathy Beardsley ·
Show More