No credit card required
Browse credit cards from a variety of issuers to see if there's a better card for you.
Aavard..... the fraudulent charge on mine was for the SAME organization, same day. We need to report that to Hyatt as well. It's not the organization doing it, but the fact that someone feels comfortable enough to try running the $2 and $3 fraudulent charges through that organization as a "test."
Sorry it happened to you as well. ![]()
That's what Chase told me. 
There was a breach in Hyatt's database not long ago, so maybe it's the cause? I'm not sure about that because I haven't used this card at any Hyatt property.
@Aarvard wrote:
Aavard..... the fraudulent charge on mine was for the SAME organization, same day. We need to report that to Hyatt as well. It's not the organization doing it, but the fact that someone feels comfortable enough to try running the $2 and $3 fraudulent charges through that organization as a "test."
Sorry it happened to you as well.
That's what Chase told me.
There was a breach in Hyatt's database not long ago, so maybe it's the cause? I'm not sure about that because I haven't used this card at any Hyatt property.
No.... the Hyatt breach involved people staying at Hyatt properties during a 3 month period of time (mid-August- Dec 8), before you and I even had our cards approved). I have not stayed at any either during that time. This is a Chase issue, I am sure.
Why pick that specific organization? It's weird. You could run $1, $2, or $3 charges through the card almost anywhere to test it. Why that one?
@Anonymous wrote:Why pick that specific organization? It's weird. You could run $1, $2, or $3 charges through the card almost anywhere to test it. Why that one?
I suppose the culprit is an Israeli employee working for Chase ![]()
@core wrote:
@Anonymous wrote:Thanks Salsa - it's a Mac and is fully updated at this point. On a Mac, I'm not sure what else I can update, but the security updates with El Capitan were recent. None of my accounts display my full credit card numbers, but it is a good thought and is much appreciated.
It doesn't matter what operating system you have, and it doesn't really matter how updated it is. If I write a custom keylogger and send it to you _and_ you run it, Apple is not going to have a signature of that malware so they can't defend you against it. Apple has nothing to do with it. But I will have your credit card numbers.
Agree this. Why I use avast. No false positives, only one to pick up actual malicious code. Windows defender, not so much. I also use two firewalls, one on router, one on laptop,, and two browsers, Firefox for personal (very rare now, since I moved most of that to iPad), and Chrome for work (naturally integrates with avast).
@Anonymous wrote:
@core wrote:
@Anonymous wrote:So, how do you fix it? I doubt that is what has happened here, as I don't type in my credit card numbers nor enter them on my computer. I'm still wiling to loon into every possible avenue.
I'm not a Mac programmer, so I cannot say. Even on Windows or Unix, the necessary steps to "fix" a keylogger would far exceed the customary length of a forum post. I seriously don't think anything of the sort was used in your case so don't worry about it. I was just responding to your post which said "I have a Mac". I'm not even sure what that meant. Macs generally aren't targeted because there's no money in it (given the users). Doesn't mean something can't happen.
Perhaps you can suggest steps people can take to determine if they have this on their computer, or a program that checks for it? I'm just thinking that other people reading this might want to know.
Malware bytes and other programs pick up key loggers. They are not as popular as before, along with using the home computer for spam email, because: folks use more laptops wirelessly than connected desktops now, and they turn them off when not in use (mine goes in sleep mode). Most folks know not to hit the two # image emails going out in force. Selling emails is now a desparate business. Opening said emails on iOS will probably do nothing, so in a multi device household, they can not tell which device opens the email. Then the download needs to be effective for the system, windows, Mac, iOS, android, Linux, bb, and others. Out of all that, they do get lucky.
I believe in this situation we have discovered it to be a Chase internal fraud issue where someone has gotten hold of our card data within Chase internally and will report it to them as such. At least two of us had cards that were new, compromised on the same day to the same organization in Israel.
@core wrote:
@Anonymous wrote:Perhaps you can suggest steps people can take to determine if they have this on their computer, or a program that checks for it? I'm just thinking that other people reading this might want to know.
Already responded via PM. Not a Mac guy. I am however a Windows and Unix guy. And I can safely say there is no way to defend against a single individual on a mission. If you've got an SO then don't let them near your machine, is the best advice I can give. Or visit a forum like hijackthis a few times.
Bulk-crook-type people do not want to fuss with keyloggers. At least I've not seen it, and I've seen all. It would be trivial to put all keystrokes through LUHN-10 and send successes to the server, but why? Way too much fuss.
Given all that's been said about Chase lately, it's Chase employees. Or their 3rd party employees. Doesn't matter which to the consumer. This is getting ridiculous.
Didn't receive a PM, but thanks anyway.
Thread to this point has been reviewed. Have a great day all ![]()