things we did so far:
1) activated stripe radar and decreased risk profile to filter weed
2) added captcha to our payment page
inspite of the above we kept getting fraudulent payments. This suggests that we have been hit by a manual attack as the attackers are able to circumvent captcha. However scale at which this is happening doesn’t seem manual But given the randomness of time element between each payment try, it starts seeming manual.
Question is - are there a set of best practices we are missing to thwart this in either case of attack being manual or automated?
Your goal here should be to make the friction on the card tester/fraudster enough that they move on to someone else while not derailing your actual prospective customers. Obviously, block all temp email providers. Maybe temporarily add an extra step for @gmail subscribers, like a phone confirmation. Introduce delays that wouldn't bother a normal customer but would bother a card tester.