跟踪我睡眠周期的黑客
The Hackers Who Tracked My Sleep Cycle

原始链接: https://glama.ai/blog/2026-03-26-the-hackers-who-tracked-my-sleep-cycle

一名开发者发现了一种针对其服务免费额度的复杂攻击。黑客创建数千个账户,添加有效的(但最终被拒绝的)支付方式,并使用每个账户进行少量、昂贵的LLM调用,每天净赚约1000美元。 攻击时机关键在于开发者的在线状态;活动仅在开发者离线时激增,表明黑客正在监控其Discord状态。这导致了一场有趣的“猫捉老鼠”游戏,开发者在看似离线的情况下部署安全措施(工作量证明、指纹识别等),观察黑客的适应速度。 虽然单个防御措施可以被绕过,但叠加它们会增加攻击者的成本和精力,最终阻止了他们。该事件凸显了卡测试漏洞——一种已知风险——并促使研究有效的缓解措施。开发者发现设备指纹识别、IP封锁、CAPTCHA和OTP效果甚微,而JA4指纹识别和ALTCHA与速率限制结合使用时显示出一定的潜力。最终,使攻击的成本足够高被证明是最成功的策略。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 追踪我睡眠周期的黑客 (glama.ai) 6 分,来自 statements 2 小时前 | 隐藏 | 过去 | 收藏 | 1 条评论 帮助 statements 26 分钟前 [–] 文章中我省略了一点,我们故意禁用了一些检查(比如 hCaptcha),让他们能够进入设置支付意图的阶段。我以前从未做过这件事,但基本上我想看看,如果未来攻击者能够绕过所有 IP/验证码/alt验证码等限制,并到达真正造成损害的地方会发生什么。这让我们能够观察他们如何尝试绕过我们专门为这一步添加的各种速率限制/检查。某种程度上是一个孤立的实验。回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

For a few nights in a row, I woke up to alerts about a huge spike in sign-ups. By the time I started troubleshooting, the activity had stopped. I activated CAPTCHA and moved on.

When the pattern repeated yet again, I decided to do a deep dive into the data.

The scheme

What I found was that the hackers were...

  1. creating thousands of accounts

  2. adding a valid payment method to each account

  3. running a single very expensive LLM call (2-3 USD)

This would let the first request go through, then trigger a charge to their payment method. The payment method gets rejected, but the request has already been processed. Using this method, they would get away with about a thousand dollars' worth of credits every night, which kept them interested in the service.

The timing

But what caught my attention wasn't the money – it was the timing. The attacks coincided with my sleep cycle.

Coincidentally, that day I decided to take a break and disconnect from my computer early. Just 30 minutes after I shut down my computer, I got the first notification.

I logged in to check, and it stopped.

Went to play some games and ... 30 minutes later, I got the second notification.

They were checking my Discord status to see if I was online.

Discord status

Sure enough, I confirmed this by setting myself as offline on Discord, and the attacks popped right back up.

The game

I didn't want to remove free credits for everyone, so I decided to mess with the hackers and use them as my personal pen testers.

The first thing I tried was requiring proof-of-work on sign-up. I shipped the change, went "offline," and watched the logs. Within an hour, the sign-up attempts resumed – they'd already integrated a solver. So I went back "online," and the attacks paused while I added JA4 fingerprinting. Back "offline." This time it took them most of the night to find a workaround. I'd watch them troubleshoot their automations until they figured out a way around it, then go back "online" and layer on the next thing.

I mostly forgot about the entire incident until they came back to try their luck again the following week. But despite a few nights of alerts about tripwires getting triggered, they never managed to get more than the few cents we deposited into new accounts – not enough of an incentive to keep trying.

In the end, it was the cat-and-mouse game that made the whole experience worth it. I got free pen testing; they got a few dollars.

Card testing vulnerability

I wasn't surprised about the overdraft feature being abused. This was something we were aware of and treated as a conscious trade-off between convenience and risk of abuse.

The bigger issue was that this made me realize that a malicious actor could abuse our system for card testing. That's a widespread problem and one that will get your Stripe account flagged. When researching this problem, I didn't find many effective solutions, so I wanted to dedicate part of this blog post to sharing what I learned.

Here's what I tried and how it held up:

Method

Effectiveness

Device fingerprinting

Ineffective. Fingerprints are great for detecting legitimate returning users (e.g. to bypass CAPTCHA), but because they are easy to fake, they are not effective at detecting malicious actors.

IP address blocking

Ineffective. Residential proxies are cheap and easy to get.

CAPTCHA

Mild deterrent. Ineffective. Many existing solutions to bypass CAPTCHA.

OTP

Mild deterrent. Ineffective. Many existing solutions to bypass OTP.

JA4

Somewhat effective. JA4 is a TLS fingerprinting method that identifies clients based on how they negotiate TLS connections. Of all data points that we collect, JA4 is the most stable identifier.

ALTCHA

Somewhat effective. ALTCHA is a proof-of-work challenge that requires the client to solve a computational puzzle before submitting a request. When combined with prior methods, can slow down the attacks enough to deter the attacker.

Rate limiting

Somewhat effective. Slows down the attacks, but may hurt legitimate users.

At the end of the day, each method is individually bypassable – the game is making the combination expensive enough that the attacker moves on.

Oh, and set your Discord status to offline.

联系我们 contact @ memedata.com