Black Friday, Cyber Monday Bring Open Season for Cyber-Criminals

For cyber criminals, the holiday shopping season offers what we used to call a “Target Rich Environment” back when I was in the military.

During the holiday seasons there’s a lot of the kind of activity that cyber-criminals love.

There are more customers buying things and that means that there are more credit card numbers floating around, there’s more personal information being stored in company databases and there’s less time for customers and companies to verify what’s real and what’s not.

In their haste to make sales, some companies may become careless about the purchase information they collect and they may collect information they don’t need. Worse, with the added load of higher than normal volume, IT departments may be forced to cut corners just to keep up.

Father Christmas tablet © Pressmaster Shutterstock

Black Friday

Add to the overall frantic pace of holiday shopping the change in credit card security technology and you have even more opportunity for fraud. This year, now that most credit card users have EMV chips in their cards, the instances of counterfeit cards is already dropping.

But in its place, is something called “card-not-present” fraud. This is when criminals use stolen credit card information to order products online or over the phone. They will then sell those products, or in some cases return them for cash reimbursements.

For your business, the overall environment is one in which you’re under attack from all directions. Criminals are using stolen credit cards on one hand while other criminals are trying to break into your network on the other. Adding to the excitement, there are new tools in the hands of cyber-criminals that are making their jobs more lucrative—at your expense of course.

Jeremy Manning, threat intelligence support manager at SecureWorks, tells me of a Remote Access Trojan (RAT) that appeared this fall, just in time for shopping to start.

This Trojan is delivered a company’s computer network through a phishing email and inserts itself into the Notepad application in Windows. Once there it captures and sends out the Track 1 and Track 2 credit card data if a card is read, but it can also send out other card data and it includes a key logger.

Read more on page 2…

Originally published on eWeek

Page: 1 2

Wayne Rash

Wayne Rash is senior correspondent for eWEEK and a writer with 30 years of experience. His career includes IT work for the US Air Force.

Recent Posts

OpenAI’s Lightcap To Take On Expanded Role

OpenAI chief operating officer Brad Lightcap to oversee international expansion as company consolidates lead in…

20 hours ago

China Unveils Deep-Sea Cable-Cutting Device

Chinese researchers publish details on device that could wreak havoc on undersea communications cables in…

21 hours ago

Pat Gelsinger Joins Faith-Based Tech Company Gloo

Former Intel chief Gelsinger expands role at Gloo, becoming executive chairman and head of technology…

21 hours ago

MEPs Ramp Pressure For Second EU Chips Act

MEPs add to Commission pressure for second EU Chips Act amidst industry calls for renewed…

22 hours ago

Xiaomi Raises $5.5bn In Expanded Share Sale

Smartphone maker Xiaomi reportedly raises about $5.5bn in Hong Kong share sale as it invests…

22 hours ago

BYD Launches Rival To Tesla’s Model 3 At Half Price

BYD's Qin L EV sedan starts at about half the price of Tesla's Model 3,…

23 hours ago