• The World's No.1 Carding Forum. You can contact to admin for any query ICQ: 458761 & Jabber : DARKPRO@Jabber.at
  1. Donate Bitcoin To Keep Our Website Alive:
    Dismiss Notice
Dismiss Notice



Hello Dear Guest We Have Some Special Offers From Our Verified Sellers . Click Here To See




How thieves hack the credit card

Discussion in 'Carding Tutorials' started by Anonymous, Mar 4, 2016.

  1. Anonymous

    Anonymous Super Moderator Darkpro Vip Member Darkpro Member

    192
    139
    43
    The whodunit of stolen credit cards

    [​IMG]


    Gone are the days of the good old-fashioned purse snatcher. With little brute and more skill, thiev
    es only need a minute, sometimes a second, to pilfer your credit card data.

    "Back in the beginning, they got the imprint of credit cards from the carbon copies they dug out of the trash," says William Noonan, assistant special agent in charge of the Secret Service's criminal investigative division. "Technology has changed things."

    The number of compromised records has been on the decline the last two years, according to the Secret Service, after reaching a record high of 361 million records in 2008. The trend might reverse this year, however, after a recent string of mishaps.

    This spring criminals hacked, phished or skimmed their way into the systems of Michaels Stores, Sony, marketing firm Epsilon, Citibank and even security expert RSA, among others. In some cases, they only obtained names and emails. In the worst cases, they got credit card numbers.

    The schemes are simpler than you think. Bankrate presents the most common ways thieves pilfer your credit card information.

    Suspect: the waitress at the diner

    [​IMG]


    Modus operandi: The waitress whisks away your credit card and swipes it through the restaurant's register. Then, she pulls out a small device, about the size of an ice cube, from her apron and swipes it through that, says Sergeant David Schultz of the Fort Bend County Sheriff's Office in Texas. While you're scraping the last of the chocolate frosting from your plate, your credit card information has been stored in the device, known as a skimmer. The waitress returns your card and performs the same magic trick on dozens of credit cards in a week.

    Known whereabouts: The data-stealing waitress has been known to moonlight as a bartender, sales clerk or at any place where she can take your credit card out of sight.

    Suspect: the toy store trio

    [​IMG]

    Modus operandi: Sally, Simon and Bud walk into a toy store. Sally and Simon roam the aisles, while Bud waits in line to check out. When Bud is at the register, Simon comes running up to the clerk, screaming that his wife has fainted. As Sally and Simon distract the sales clerk, Bud switches the credit card reader at the register with a modified one of his own, says FICO's Fraud Chief Mike Urban. For the next week, the sales clerk unwittingly collects credit card data on the modified reader until the trio returns, takes back the modified reader and restores the original terminal.

    Known whereabouts: The trio will hit other retailers and restaurants, but sometimes the threesome will instead be a duo or a solo criminal.

    Suspect: the Gas Lass

    Modus operandi: The Gas Lass parks her car in front of a gasoline station off the turnpike. It's late. There's no one around except a sleepy attendant at the register inside. The Gas Lass attaches a skimmer over the credit card reader at the pump. It's a special skimmer: It emits a Bluetooth signal to a laptop close by, says Noonan. The Gas Lass pays, heads off to the motel next door and sets up her laptop to receive the data from the compromised pump over the next several days.

    Known whereabouts: The Gas Lass installs skimmers over ATMs, parking meters, vending machines and any other places with unmanned credit card readers.

    Suspects: Harry the Hacker and Phishing Phil

    Modus operandi: Harry the Hacker installs malware -- a type of software that damages or infiltrates a computer or network -- onto a legitimate website with low security. The malware instantly downloads onto your computer when you visit the site and allows Harry to access your information. In another scenario, Harry puts malware on public computers and gathers the information you share with that computer, says Urban. Harry also infiltrates the computer system of banks, retailers and other businesses and extracts personal account information, Noonan says.

    Phishing Phil uses malware to go after your laptop. He sends emails with attachments that promise dancing kittens or some other bait. When the user opens the attachment, malware instantly downloads onto the computer and leaves confidential information vulnerable. Phil also sends emails from a familiar sender with a link to a contaminated website that installs malware onto your computer. Some malware, called spyware, allows Phil to capture every keystroke including passwords to your financial accounts.

    Suspect: the rest of the criminal crew

    [​IMG]

    Modus operandi: So what happens to these pieces of data when they're in no-good hands? They get sold.

    The waitress, trio or Gas Lass sells each swipe for $20 to $40 a pop, says Urban. Harry the Hacker and Phishing Phil will get $5 to $10 a card and often sell the information online at the eBay of credit card activity. The person who buys the information verifies it and then sells it to a person who creates fraudulent credit cards with your account information attached to it. The card maker then sells it to other criminals who buy goods such as stereos or baby formula and sells them to regular consumers.
     
  2. Chikii

    Chikii Registered User Darkpro Member

    40
    12
    8
    Interesting Story .
     
    JoshuaCarlo likes this.
  3. j3itch

    j3itch Registered User Darkpro Member

    1
    0
    1
    that makes alot of sense
     
  4. satguru59

    satguru59 Registered User Darkpro Member

    10
    1
    3
  5. superfu

    superfu Registered User Darkpro Member

    11
    1
    3
    Male
  6. Darknet Carder

    Darknet Carder Registered User Darkpro Member

    38
    4
    8
    Male
  7. m0z3r1

    m0z3r1 Registered User Darkpro Member

    12
    1
    3
    Female
    Very interesting. Thx for the share.
     
  8. Swaktwatska

    Swaktwatska Registered User Darkpro Member

    6
    1
    3
    Male
    thank you - teşekkürler
     
  9. Pwr-CC

    Pwr-CC Registered User Darkpro Member

    26
    1
    8
    Male
    great share and great information ;)
     
  10. Tomskid

    Tomskid Registered User Darkpro Member

    5
    0
    1
    Male
    Great share.Was interesting
     

Share This Page