recommended reading

Inside the Black Market That Buys and Sells Target’s Stolen Credit Cards

Yongcharoen_kittiyaporn/Shutterstock.com

The mass theft of credit-card data has spawned an underground black market where huge stacks of those cards are being purchased by identity thieves.

This black market is in the spotlight thanks to an expose from Brian Krebs, the same blogger who broke the story last week that Target was investigating a data breach of millions of credit- and debit-card accounts.

Krebs explains that a large bank knew Target had been breached after it went and bought "a huge chunk of the bank's card accounts from a well-known 'card shop' — an online store advertised in cybercrime forums as a place where thieves can reliably buy stolen credit and debit cards." He continues:

There are literally hundreds of these shady stores selling stolen credit and debit cards from virtually every bank and country. But this store has earned a special reputation for selling quality "dumps," data stolen from the magnetic stripe on the backs of credit and debit cards. Armed with that information, thieves can effectively clone the cards and use them in stores. If the dumps are from debit cards and the thieves also have access to the PINs for those cards, they can use the cloned cards at ATMs to pull cash out of the victim's bank account.

Target confirmed on Thursday that 40 million cards had been stolen in a nationwide data breach spanning from Nov. 27 to Dec. 15. Following the announcement, Krebs reached out to a small community bank in New England to see if it knew which of its cards had been stolen.

Krebs teamed up with the bank's fraud team to figure out which of its cards might be at risk for fraud given that "the tiny bank had not yet heard anything from the card as specific cards that might have been compromised as a result of the Target breach," despite the fact that almost 6,000 of the cards issued had been used in Target stores around the country. He began searching through a black-market card site and went shopping. What he found is nothing short of terrifying.

Some highlights:

Like other card shops, this store allows customers to search for available cards using a number of qualifications, including BIN; dozens of card types (MasterCard, Visa, et. al.); expiration date; track type; country; and the name of the financial institution that issued the card....

Another fascinating feature of this card shop is that it appears to include the ZIP code and city of the store from which the cards were stolen. One fraud expert I spoke with who asked to remain anonymous said this information is included to help fraudsters purchasing the dumps make same-state purchases, thus avoiding any knee-jerk fraud defenses in which a financial institution might block transactions out-of-state from a known compromised card.

Krebs also notes that the store doesn't let its customers buy up cards with their own credit cards. Instead, thieves must use virtual currencies like Bitcoin or wire transfers like Western Union to complete a transaction.

(Image via Yongcharoen_kittiyaporn/Shutterstock.com)

Threatwatch Alert

Software vulnerability

Malware Has a New Hiding Place: Subtitles

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.