Threat Intelligence

4/12/2016
08:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

How To Monetize Stolen Payment Card Data

The carding value chain not only relies on carders and buyers, but individuals who don't even know they're involved.

Bosses of the operations that turn stolen payment card data into cash have been known to take home as much as $1 million of profit in one year. One of the reasons they're so profitable: They scam and stiff thousands of the people who make the operation work.  

In a new report today, Hewlett Packard Enterprise Security Research outlined the process and the players in this value chain. To monetize stolen payment card data, organized criminals buy goods and then sell them for cash. According to HPE, in nearly all cases, card data was stolen from US accountholders, goods were bought in the US from online retailers in the US, and goods were shipped to Russia via intermediaries located in the US.

Beneath the bosses leading the operation are a network of administrators, "stuffers," and "drops," mostly managed via the Web. More specifically:  

  • Admins notify "stuffers" about what goods need to be purchased and, sometimes, what retailers they should be purchased from. Walmart, BestBuy, AT&T, Sprint, and Verizon were popular choices.
  • Stuffers, located in the US, buy goods online -- a wide variety of products ranging from electronics, to nutrition products, to toys, to rifle scopes. Stuffers are paid a 25- to 40% cut, depending upon the item.
  • The stuffers have the goods shipped to "drops," located in the US. 
  • Admins purchase labels from fraudulent shipping label services that forge labels for legitimate parcel delivery services like FedEx, UPS, and the US Postal Service.
  • Admins send the labels to drops.
  • Drops repackage goods with fraudulent labels and reship goods to Russia, using legitimate delivery services. The drops do not know that the items were bought illegally or that the shipping labels are fraudulent.

The drops were often "recruited" -- or, more accurately, scammed -- through social media advertising "work from home" opportunities that required no special skills but promised base salaries of as much as $2,500 per month.

However, the drops are almost never paid at all, according to the report. In fact, the admin's workflow software includes a system for tracking when drops sign up, quit, and become "dangerous" -- meaning they're expected to quit soon when they realize they are never going to see a dime for their reshipping efforts. Adding insult to injury, when drops sign up, they are convinced to submit a host of personal information -- including scans of government-issued IDs and proof of address -- as part of their "onboarding" process for the job.

From the report:

Recruiters find it more cost effective to recruit new drops from those looking for a "work from home" opportunity than to actually maintain and pay drops on an ongoing basis. This practice has the added benefit of isolating the most exposed part of the operation from the rest of the organization. Drops are exposed to very little if any of the true organization. ...

It's important to understand that drops are not a part of the organization; rather, they are as much a victim as others in the types of fraud schemes targeting human assets for exploitation.

Admins and stuffers, however, are key members of the organization. Admins manage the day-to-day technical functions of the Web interface through which business is conducted -- including taking orders for the products Russian buyers want, notifying stuffers about what those products are, connecting stuffers with drops, and tracking packages.

The operability and user interfaces of different re-shipper sites are so similar that researchers believe that these different operations must use the same software developers. 

     

Gain insight into the latest threats and emerging best practices for managing them. Attend the Security Track at Interop Las Vegas, May 2-6. Register now!

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
The Role of KPIs in Incident Response
John Moran, Senior Product Manager, DFLabs,  4/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.