Profiling a Newly Launched E-Shop for Stolen Credit Cards Data – An Analysis

I’ve just stumbled upon a newly launched and currently active E-Shop for stolen credit cards information and I’ve decided to take a deeper look potentially exposing it and offering actionable intelligence on its online infrastructure part of the “Expos… Continue reading Profiling a Newly Launched E-Shop for Stolen Credit Cards Data – An Analysis

Bilt Rewards banks $60M growth on a $350M valuation to advance credit card benefits for renters

The latest round comes just 90 days from Bilt’s launch. Continue reading Bilt Rewards banks $60M growth on a $350M valuation to advance credit card benefits for renters

Malicious Life Podcast: The State of Credit Card Security

In 2005, when Albert Gonzalez was hacking his way into the networks of many retail chains in the US (listen to Part 1, Part 2 and Part 3), credit cards were still very insecure: magnetic stripes and signed receipts did little to stop smart hacker… Continue reading Malicious Life Podcast: The State of Credit Card Security

No honor among thieves: Scammers target stolen credit card hubs

Two online hubs for stolen credit cards found themselves on the receiving end of hack-and-leak operations last month. User data from the card store Swarmshop was posted to a different underground forum on March 17, exposing hundreds of thousands of compromised payment card records, security vendor Group-IB said in a report out Thursday. That follows news from last month that another forum, Carding Mafia, had been hacked, also exposing hundreds of thousands of user accounts. Word of the nefarious activity only is the latest drama to emerge from the cybercriminal underground. Another notorious forum, Joker’s Stash, recently shut down after attention from global law enforcement officials. In an unrelated case, a Russian man pleaded guilty in January to running an illicit hosting service meant to further fraud schemes. In the case of Swarmshop, it’s also actually the second time cybercriminals have targeted it. “While the source of the breach remains unclear, […]

The post No honor among thieves: Scammers target stolen credit card hubs appeared first on CyberScoop.

Continue reading No honor among thieves: Scammers target stolen credit card hubs

Exposing a Currently Active Stolen Credit Cards E-Shop – An OSINT Analysis

I’ve recently came across to a currently active cybercrime-friendly online E-shop for stolen credit cards which basically empowers its customers with the necessary information including actual stolen and compromised credit cards information for the pur… Continue reading Exposing a Currently Active Stolen Credit Cards E-Shop – An OSINT Analysis

Web Credit Card Skimmer Steals Data from Another Credit Card Skimmer

MalwareBytes is reporting a weird software credit card skimmer. It harvests credit card data stolen by another, different skimmer:

Even though spotting multiple card skimmer scripts on the same online shop is not unheard of, this one stood out due to its highly specialized nature.

“The threat actors devised a version of their script that is aware of sites already injected with a Magento 1 skimmer,” Malwarebytes’ Head of Threat Intelligence Jérôme Segura explains in a report shared in advance with Bleeping Computer.

“That second skimmer will simply harvest credit card details from the already existing fake form injected by the previous attackers.”…

Continue reading Web Credit Card Skimmer Steals Data from Another Credit Card Skimmer

Hiding Malware in Social Media Buttons

Clever tactic:

This new malware was discovered by researchers at Dutch cyber-security company Sansec that focuses on defending e-commerce websites from digital skimming (also known as Magecart) attacks.

The payment skimmer malware pulls its sleight of hand trick with the help of a double payload structure where the source code of the skimmer script that steals customers’ credit cards will be concealed in a social sharing icon loaded as an HTML ‘svg’ element with a ‘path’ element as a container.

The syntax for hiding the skimmer’s source code as a social media button perfectly mimics an ‘svg’ element named using social media platform names (e.g., facebook_full, twitter_full, instagram_full, youtube_full, pinterest_full, and google_full)…

Continue reading Hiding Malware in Social Media Buttons

Cyberthreats to financial organizations in 2021

Let us review the forecasts we made at the end of 2019 and see how accurate we were. Then we will go through the key events of 2020 relating to financial attacks. Finally, we need to make a forecast of financial attacks in 2021. Continue reading Cyberthreats to financial organizations in 2021

Double-dipping scammers don’t need malware to grab card numbers and turn a profit, report says

Stolen credit card numbers sometimes spill onto the dark web for the most mundane reason: People carelessly give them up. According to researchers with Gemini Advisory, a China-based e-commerce scam appears to be harvesting payment information not through direct hacks on companies or using pernicious malware to skim data, but with a simpler approach. The fraudsters set up hundreds of websites that appear to sell legitimate goods, but instead capture card numbers for sale on the dark web, Gemini says. It ends up being a double-dip for the crooks: In addition to vending the card data and other information about shoppers in cybercriminal forums, they also collect money for items that are “faulty, counterfeit, or nonexistent,” Gemini says in a report published Thursday. The dark web sales have led to profits upwards of $500,000 over the past six months, but the total take is “likely significantly larger,” considering all the money the scammers […]

The post Double-dipping scammers don’t need malware to grab card numbers and turn a profit, report says appeared first on CyberScoop.

Continue reading Double-dipping scammers don’t need malware to grab card numbers and turn a profit, report says