Because it took so long several months, in some cases to find and contact the companies using the software, online offenders were able to exploit this vulnerability
and collect thousands of credit card numbers. In most cases such as this, the difficulty of finding the sites that are running the vulnerable software helps slow down the attackers.