What is malware exploit validation?

Hackers never stop to steal. They tend to create new tricks and spread it across the network to infect private computers. These, are called Trojan horse or malware.

There are millions machines infected by malware or Trojan horse. FraudLabs Pro detects and highlights if the IP address has been infected by malware. An exploited machine can be controlled remotely to perform fraud transactions without leaving a trace.

How to prevent sensitive information being spy by malware and protect your browsers against exploit attacks?

How to configure malware exploit validation?

  1. Login to the FraudLabs Pro Merchant Control Panel.
  2. Click on the Rules then click Add Rule.
  3. add fraud validation rule

  4. Select Visitor IP under the IP Validation category.
  5. malware exploit validation

  6. Select the Condition and then select Malware Exploit Record.
  7. configure fraud rules - malware exploit validation

    configure fraud rules - malware exploit validation

  8. Select the action you want.
  9. configure fraud rules - malware exploit validation

  10. Click Add Rule and don't forget to click Save and you are done.

Micro Plan

Free fraud prevention plan to start protecting your business from fraud.


Sign Up Now