18 September 2014

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

511 | posts 1,306,405 | views 59 | comments

Underground Forums Selling Stolen Credit Cards

07 March 2012  |  4418 views  |  0

“Carders” are the people who buy, sell, and trade stolen credit card data online. This carding forum videoprovides an example of an online forum where stolen credit cards are bought and sold.

Hackers rely on a variety of techniques to obtain credit card data. One such data theft technique is wardriving, in which criminals hack into wireless networks and install spyware. Another is phishing, in which spoofed emails prompt the victim to enter account information. Phexting or smishing are similar to phishing, but with text messages instead of emails. Some hackers use keylogging software to spy on victims’ PCs. Others affix devices to the faces of ATMs and gas pumps in order to skim credit and debit card data.

NPR reports an FBI agent calling himself Master Splynter was assigned to the underground and had created an entire backstory for Master Splyntr to get the criminals on the underground sites to trust him.

In the course of his dealings with “carders” (criminal hackers dealing in stolen credit cards) he developed relationships with the leaders of a particular forum.  This relationship proved paramount as an attack came upon this forum jeopardizing its existence. Master Splynter convinced the forums leaders to move the forum off its current server and onto his own server that was “well hidden from law enforcement” and safe from other hackers.

Now the FBI had full control of all the traffic moving through the forum and was able to identify the credit card theft suspects, make some arrests and take down the forum.

While an accomplishment, it’s only a small one as carding forums pop up every day to take this one’s place. As long as credit cards as we know them are easy to compromise via skimming or hacking and anyone can make a card not present transaction over the web, credit card theft and underground forums like these will proliferate.

 

 

TagsSecurityRisk & regulation

Comments: (0)

Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

Is private NSA proof E-mail possible?

2 hours ago  |  225 views  |  0  |  Recommends 0 TagsSecurity

Identity proofing proves who You are

16 September 2014  |  1179 views  |  0  |  Recommends 0 TagsSecurity

Are All Hackers Bad?

09 September 2014  |  740 views  |  0  |  Recommends 0 TagsSecurity

How to Secure Your iCloud

03 September 2014  |  1596 views  |  1  |  Recommends 0 TagsSecurity

Family Identity Theft is Ugly

29 August 2014  |  982 views  |  0  |  Recommends 0 TagsSecurity
name

Robert Siciliano

job title

Security Analyst

company name

IDTheftSecurity.com

member since

2010

location

Boston

Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations througho...

Robert's expertise

Who is commenting on Robert's posts

Ketharaman Swaminathan
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Spyindiavimlesh kumar
Paul Love
Mike McCormack