Language Selection

English French German Italian Portuguese Spanish

Black Market in Stolen Credit Cards

Filed under
Security
Web

"Want drive fast cars?" asks an advertisement, in broken English, atop the Web site iaaca.com. "Want live in premium hotels? Want own beautiful girls? It's possible with dumps from Zo0mer." A "dump," in the blunt vernacular of a relentlessly flourishing online black market, is a credit card number. And what Zo0mer is peddling is stolen account information - name, billing address, phone - for Gold Visa cards and MasterCards at $100 apiece.

It is not clear whether any data stolen from CardSystems Solutions, the payment processor reported on Friday to have exposed 40 million credit card accounts to possible theft, has entered this black market. But law enforcement officials and security experts say it is a safe bet that the data will eventually be peddled at sites like iaaca.com - its very name a swaggering shorthand for International Association for the Advancement of Criminal Activity.

For despite years of security improvements and tougher, more coordinated law enforcement efforts, the information that criminals siphon - credit card and bank account numbers, and whole buckets of raw consumer information - is boldly hawked on the Internet. The data's value arises from its ready conversion into online purchases, counterfeit card manufacture, or more elaborate identity-theft schemes.

The online trade in credit card and bank account numbers, as well as other raw consumer information, is highly structured. There are buyers and sellers, intermediaries and even service industries. The players come from all over the world, but most of the Web sites where they meet are run from computer servers in the former Soviet Union, making them difficult to police.

Traders quickly earn titles, ratings and reputations for the quality of the goods they deliver - quality that also determines prices. And a wealth of institutional knowledge and shared wisdom is doled out to newcomers seeking entry into the market, like how to move payments and the best time of month to crack an account.
The Federal Trade Commission estimates that roughly 10 million Americans have their personal information pilfered and misused in some way or another every year, costing consumers $5 billion and businesses $48 billion annually.

Full Story.

More in Tux Machines

Latest Ubuntu Touch SDK Updates Focus on Convergence Features for OTA-6

On the last day of July 2015, Canonical's Zoltán Balogh posted an important email on the Ubuntu Touch mailing list, informing us all about the work done lately on the Ubuntu SDK (Software Development Kit) software. Read more

Wifislax 4.11.1 Linux Distro Arrives with Linux Kernel 4.1.3 LTS, Xfce 4.12.3

The developers of the popular Wifislax Linux distribution based on the well-known Slackware operating system and built around the KDE and Xfce desktop environments announced the release of Wifislax 4.11.1. Read more

5 Best Linux Desktop Environments With Pros & Cons


Picture

If you are new to Linux then I'm sure you are giving up lots of time choosing Desktop Environment of your Linux Distribution. You are probably thinking to give a try to each one of them but that's very time consuming. Edit - There are other good DEs also That's why I'm reviewing the 5 Best Linux Desktop Environments with the pros & cons. The article gives you what you should know for choosing a DE. So let's get started!

Redis open source DBMS overview

Redis runs on Linux. Although the Redis project doesn't directly support Windows, Microsoft Open Technologies develops and maintains a Windows port targeting Win64. The Redis open source DBMS is available as a BSD license. The Redis community offers support through the official mailing list as well as #redis on Freenode. Commercial support is available through Pivotal, the official sponsor of Redis. Pivotal offers two levels of professional support. Read more