Stolen Credit Card Details Cost £1 Online

UK credit card details are on sale for as little £1 each online as fears rise over the security of personal data in the wake of the TalkTalk cyber-attack.

More than 600,000 individuals had their personal details stolen from UK companies in 2014, according to the Financial Times, underlining the scale of online crime in this country. It is likely that some of that data will have ended up on a website used by criminals wanting to buy high-end UK credit card data.

Visa and MasterCard details stolen on recently were offered to the Guardian the following day - provided payment was made in the crypto-currency bitcoin - on a website which is registered in Russia but run in English.
The site did not reveal where the details were harvested from, but the ownership of the cards was clear. One credit card was registered to a person in Craigavon in north County Armagh; another belonged to a resident of Chelmsford, Essex, who lost their platinum Visa card earlier this week. Platinum cards are particularly attractive to fraudsters because of their high credit limit. Scores more card details, registered to addresses up and down the country, from Aberdeenshire to Devon, were openly for sale on the site.

The example of the Russian-registered site is striking because it is on the “surface” web, and easily available to conventional Internet users. It has a high-end design and layout, offers customer support and promises an 80% success rate for the buyers of stolen cards. It sits at the luxury end of the identity theft market, and charges accordingly – it wanted $72 (£47) for each card sold to us.

To bulk buy stolen data at lower prices, however, fraudsters head to the dark web. This can be accessed via the Tor browser, rather than conventional browsers used by the vast majority of users. It bounces a connection through multiple encrypted relays before it hits its destination. This obscures where the site’s server is located, allowing would-be identity thieves to connect to hidden services, and sites not accessible to non-Tor users.

Searching through Tor, it is possible to access a site which will sell 100 credit cards (with the CVV2 digits – the three numbers on the reverse of the card) for just $150 (£98), around £1 per card. The site also sells PayPal accounts at $100 for 100, while other hidden services will offer €1,250 of counterfeited notes for €500. Free shipping is included.

Buying the stolen information is just the first step in a process that criminals use to convert digital data bought online into hard cash. The credit cards are used to load money onto easily obtained pre-paid debit cards. These are payment cards that function similar to credit cards, and can be used to shop online, but can be opened without the sort of checks wanted by banks when opening a current account.

These pre-paid debit cards are used to buy online gift cards. In turn, these gift cards are used to buy high-value electronics, such as iPhones or games consoles, which are sold at a discount – an iPhone 6S for $430 or an Xbox One for $240. That cash goes in the pocket. But how do these dark websites get the data? A significant source of stolen information, particularly in the US, is old-fashioned card-skimming: a compromised terminal or company employee on the take, who steals the details of a card in the process of completing a transaction.

Just as common is the 21st-century equivalent: malware. This is the catch-all term for malevolent software that infects an individual’s computer to monitor communications for confidential information such as banking passwords, credit card details and social media logins. The data is uploaded to a central server where it is sold on or used to further spread the malware.
The Gameover Zeus malware, disrupted by a joint UK-US operation in June 2014, was one such attack. This acted as a form of “ransomware”, encrypting the infected computer and demanding payment in bitcoin to release the data.

The third major source of data for sale is large-scale hacks, of the type that was flagged by telecoms operator TalkTalk on 23 October. Sometimes the stolen information can be used directly, especially where the company has irresponsibly stored credit card data or passwords on their servers in plaintext; or it may be used as the first step in stealing someone’s identity, where information from two or more hacks is linked to build a profile that can be used to apply for bank accounts or credit cards.

Security experts call the organised criminal hacks “advanced persistent threats”. But the attack on TalkTalk has left researchers bemused. A 15-year-old boy from Northern Ireland is on police bail in connection with the cyber-attack, while on Friday a 16-year-old boy was arrested in London.

TalkTalk appears to have been the victim of a relatively amateur and opportunistic hack, according to experts. The company’s chief executive, Dido Harding, said the perpetrator exploited a “sequential injection” attack. Security researchers, realising she meant to say “SQL injection” – a common form of attack in which a hacker tricks the website into releasing information from a database – had a field day.

“It’s not the lowest-hanging fruit of all,” said David Enn, a researcher at information security firm Kaspersky. “But certainly in terms of attacking core infrastructure of the business, we’re not looking at a concerted, targeted attack. What you’re talking about here is like managing to sneak through the security barrier just by slipstreaming an employee.”
 
TalkTalk declined to discuss its defences in detail, given the ongoing police investigation, but said it continually invested in improving its systems, and constantly monitored and scanned its network to detect any weaknesses.

“We defend against all manner of attacks on a day by day basis,” a statement said. “Each day we have to block over 170m scamming emails to our customers, and we block over 1m nuisance calls to our customers each day.

“It is a constantly evolving fight against cybercrime and individual companies on their own can’t tackle this problem.”

Guardian

 

« UK Forced To Backtrack on Internet ‘snooping’
RBS Says Most Scam Victims Recover Nothing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

National Cybersecurity Student Association (NCSA)

National Cybersecurity Student Association (NCSA)

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

Arculus Cyber Security

Arculus Cyber Security

Arculus Cyber Security enables customers to securely realise the benefits of digital transformation through pragmatic solutions, guidance and services.