Language Selection

English French German Italian Portuguese Spanish

Black Market in Stolen Credit Cards

Filed under
Security
Web

"Want drive fast cars?" asks an advertisement, in broken English, atop the Web site iaaca.com. "Want live in premium hotels? Want own beautiful girls? It's possible with dumps from Zo0mer." A "dump," in the blunt vernacular of a relentlessly flourishing online black market, is a credit card number. And what Zo0mer is peddling is stolen account information - name, billing address, phone - for Gold Visa cards and MasterCards at $100 apiece.

It is not clear whether any data stolen from CardSystems Solutions, the payment processor reported on Friday to have exposed 40 million credit card accounts to possible theft, has entered this black market. But law enforcement officials and security experts say it is a safe bet that the data will eventually be peddled at sites like iaaca.com - its very name a swaggering shorthand for International Association for the Advancement of Criminal Activity.

For despite years of security improvements and tougher, more coordinated law enforcement efforts, the information that criminals siphon - credit card and bank account numbers, and whole buckets of raw consumer information - is boldly hawked on the Internet. The data's value arises from its ready conversion into online purchases, counterfeit card manufacture, or more elaborate identity-theft schemes.

The online trade in credit card and bank account numbers, as well as other raw consumer information, is highly structured. There are buyers and sellers, intermediaries and even service industries. The players come from all over the world, but most of the Web sites where they meet are run from computer servers in the former Soviet Union, making them difficult to police.

Traders quickly earn titles, ratings and reputations for the quality of the goods they deliver - quality that also determines prices. And a wealth of institutional knowledge and shared wisdom is doled out to newcomers seeking entry into the market, like how to move payments and the best time of month to crack an account.
The Federal Trade Commission estimates that roughly 10 million Americans have their personal information pilfered and misused in some way or another every year, costing consumers $5 billion and businesses $48 billion annually.

Full Story.

More in Tux Machines

GNOME/Unity in Ubuntu

today's howtos

Leftovers: Software (Subsurface, GRUB, GIMP, and Todo.txt)

  • Announcing Subsurface 4.6.4
    The Subsurface development team proudly announces the release 4.6.4 of Subsurface, an open source dive log and dive planning program for Windows, Mac and Linux.
  • Subsurface 4.6.4 Open-Source Dive Log and Planning Tool Adds Many Improvements
    The development team behind the Subsurface open-source dive log and dive planning application was proud to announce the immediate availability for download of the Subsurface 4.6.4 release. Subsurface 4.6.4 is the latest stable version of the popular program developed by Linus Torvalds in collaboration with other developers, and adds a great number of improvements over previous builds. These include a new planner mode to calculate minimum gas, better handling of notes when replanning dives, as well as support for the border width setting in printing templates.
  • GRUB 2.02 Bootloader Officially Released with ZFS LZ4 & LVM RAID1 Support, More
    The long-anticipated GRUB 2.02 open-source bootloader software project was finally promoted to the stable channel after being in Beta stages of development for the past few years. The development team took their time to finalize the release of GRUB 2.02, which should soon make its way into the stable software repositories of your favorite operating system, but it's finally here and we want to thank them for all their hard work and the awesome new features and improvements implemented so far.
  • [New] GIMP review
    GIMP (short for GNU Image Manipulation Program) is a free alternative to Photoshop that more than holds its own. But don't think that the lack of a price tag means GIMP is lacking in features; it packs enough punch to genuinely rival Adobe's imaging behemoth. GIMP comes with impressive selection and montage features, various ways to retouch your images, cropping, noise reduction and colour adjustment tools, customisable brushes, gradients and so much more. There's plenty for the more advanced user, too, including layer masks, bezier curves, filters and even an animation package.
  • Todo.txt – A Nifty ToDo Indicator Applet for Ubuntu
    Todo.txt is an extremely simple indicator applet that lets you quickly tick off the tasks contained in your todo.txt file. It lives in the system tray and has options: Edit todo.txt, Clear completed, and refresh. Ultimately, its job is to help you edit your todo.txt file and mark tasks as completed without needing to open a full-fledged text editing application.

Red Hat News