Exploring The Underground Credentials Market

Monetising on credit cards

In order to monetise credit cards, different factors must be taken into consideration. First, additional identifying information, for example, name and expiration date, are required to complete a transaction. Furthermore, CVV2 numbers are mainly requested during an online purchase. According to PCI regulations CVV2 values are not allowed to be stored at consumer sites, leading to these values being sold separately from the credit card numbers. Finally, a real purchase needs to be performed by the criminal and the real goods should be sold in order to cash-out.

Alternatively, monetising credit cards could be performed by manufacturing real plastic cards with the stolen number. The manufacturing and distribution of these stolen cards entail additional hardware expense, complexities and risks.

As anti-fraud mechanisms are set up to detect illegal activities, and given that many purchases leave a digital-trail, criminals seek to find other creative ways to cash-in on credit cards. One such way is for a criminal to enter a gambling site, such as Poker, under two accounts. The first account is attached to the illegal credit card, while the second is attached to a legal card that can be directly cashed by the culprit.

Both accounts, under the same user, play at the same table – one against the other- while the “illegal” account loses to the “legal” account. The credit card company sees that the illegal card was used at a gambling site but cannot track the criminal who, in the meantime, received the funds. Other alternatives include stock manipulation through online trading sites (that allow registration with credit cards) or generating fake transactions between two parties controlled by the culprit in applications such as Paypal, eBay and the like.

Although bank account numbers are sold for a relatively high sum, monetising on bank account numbers is not as simple either. Either an individual is required to come in person to the bank and show other identifying details. Or, given an ATM PIN, a plastic card needs to be manufactured whilst the criminal needs to avert security criminals.

Whether using the stolen cards physically or over the Internet, criminals take cautionary steps to avoid detection of their fraudulent activity. These steps require purchasing or transferring sums, only in small amounts, over a long period of time, and attackers attempt to find alternative methods to seek more profitable data.

The rise of online credentials

As opposed to 2006, 2008’s report already showed the incredible black market shift where email accounts were the third most available virtual product for sale. Furthermore, at the low end, the online credentials were going for $0.10 a credential – already higher than that of a credit card!

Online credentials are composed of username/ password combinations in order to gain access to different Internet applications, whether it is a social networking application, a bank account or a health-provider service.

Credentials to an online banking service allow the attacker to transfer funds from the victim’s account to accounts controlled by the criminal (or most often to a mule account that collaborates with the attacker). However, such transfers require a higher level of sophistication in order to avoid being detected by anti-fraud mechanisms deployed at banks.

Page: 1 2 3 4

adminuk

Recent Posts

Binance Co-Founder CZ Does Not Want To Return To Company

Binance co-founder Zhao Changpeng says no desire to return to role at company after serving…

10 hours ago

China’s BYD Overtakes Tesla On Quarterly Sales

Chinese carmaker BYD overtakes Tesla for first time in quarterly sales, as EU brings in…

11 hours ago

X’s Community Notes Fails To Stem US Election Misinformation – Report

Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…

3 days ago

Google Fined More Than World’s GDP By Russia

Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…

3 days ago

Spotify, Paramount Sign Up To Use Google Cloud ARM Chips

Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…

4 days ago