Menu
Clone of Alibaba (BABA) IPO Shares Jump 36%

Alibaba (BABA) IPO Shares Jump 36%

The Sexiest Halloween Costumes of 2014

The Sexiest Halloween Costumes of 2014

Mazda Miata 2016 model revealed

Mazda Miata 2016 model revealed

Miley Cyrus New Butt Gets in Trouble with Law

Miley Cyrus New Butt Gets in Trouble with Law

Larry Ellison Steps Down as CEO of Oracle

Larry Ellison Steps Down as CEO of Oracle

Experts say that Target Hackers will be tough to find

Jan 22 2014, 2:51am CST | by , in News | Technology News

Experts say that Target Hackers will be tough to find
 
 

YouTube Videos Comments

Full Story

Experts say that Target Hackers will be tough to find

Target hackers remain hidden behind shadowy, multi-layered black market, experts say

NEW YORK (AP) — It doesn't surprise experts that some debit and credit card numbers stolen from Target's computer systems may have surfaced among nearly 100 fake credit cards seized by police in Texas this week.

Even so, they say the bust is unlikely to lead authorities directly to the hackers behind the breach, given the vast, labyrinthine nature of the global market for stolen data.

According to police in McAllen, Texas, two Mexican citizens arrested at the border used account information stolen during the pre- Christmas Target breach to buy tens of thousands of dollars' worth of merchandise. But the U.S. Secret Service said Tuesday its investigation into the possibility of a link between the Target data theft and the arrests remains ongoing.

Target says hackers stole about 40 million debit and credit card numbers from cards swiped at its stores between Nov. 27 and Dec. 15. The thieves also took personal information — including email addresses, phone numbers, names and home addresses — for another 70 million people.

In the aftermath of the breach, millions of Americans have been left to wonder what's become of their precious personal information. Chester Wisniewski, senior security adviser for the computer security firm Sophos, says in cases where such a massive amount of information is stolen, criminals generally divide the data into chunks and sell the parcels in online black markets.

In many ways, those markets behave much like any legitimate marketplace ruled by the forces of supply and demand. Groups of higher-end cards are worth significantly more than those with lower credit limits and so are cards tied to additional personal information, such as names, addresses and zip codes, which make them easier to use.

After thieves purchase the numbers, they can encode the data onto new, blank cards with an inexpensive, easy-to-use gadget. Or they can skip the card-writing process and simply use the card numbers online.

Crooks often have the option to buy cards last used in their area. That way, Wisniewski says, the cards attract less attention from the banks that issued them.

According to police, the pair arrested at the U.S.-Mexican border used cards containing the account information of Target shoppers from South Texas. Police say the two used fraudulent cards to purchase numerous items at national retailers in the area.

The underground markets always have a steady supply of card numbers on sale and their locations are always moving as they try to elude law enforcement, says Daniel Ingevaldson, chief technology officer at Easy Solutions Inc., a firm that sells anti-fraud products and tracks the activity of the online black markets. A big jump in inventory usually indicates there's been a breach of a major retailer. That's what Ingevaldson's firm saw in the cases of both Target and Neiman Marcus, which also recently reported a breach.

While many of these online bazaars and forums are based in Russia and Eastern Europe, much of the chatter is in English and appears to have been written by Americans, Ingevaldson says.

The types of criminals who buy the card numbers run the gamut, ranging from purely online white-collar crooks to street gangs.

"In reality, card numbers can be bought by anybody with access to the forums and a few Bitcoins in their pocket," Ingevaldson says.

Wisniewski says the people who buy card numbers online and produce the fake cards aren't the ones who try to use them. Using the cards is the riskiest part of the fraud scheme, so the task is usually farmed out to others who are often recruited through spam emails. The recruiters then send them fraudulent debit and credit cards and instruct them to buy large quantities of expensive merchandise or gift cards in exchange for a small percentage of their value.

Card users, once caught, often only have a handler's email address to share with police, making it nearly impossible to find the recruiters, Wisniewski says.

Both analysts say Russia and former Soviet countries are a hotbed for hackers behind these kinds of schemes. The region has a large population of highly educated computer science professionals and law enforcement is extremely lax when it comes to fraud that occurs overseas and not in the hackers' home country.

Wisniewski and Ingevaldson also believe the original authors of the malicious software used in the Target breach are likely based in Russia or Eastern Europe, as some reports on the breach have suggested. But it's unlikely the original programmers do any hacking themselves. They can make a nice living simply selling the code to those who do.

"Keep in mind, it isn't illegal to write these kind of codes, just to use them," Wisniewski says. "And selling them is a lot less risky than taking cards into an Apple store."

___

Bree Fowler can be reached at http://twitter.com/APBreeFowler

Source: AP

 

You Might Also Like

Updates


Sponsored Update


Advertisement


More From the Web

Shopping Deals

 
 
 

<a href="/latest_stories/all/all/30" rel="author">Associated Press</a>
The Associated Press (AP) is one of the largest and most trusted sources of independent newsgathering, supplying a steady stream of news to its members, international subscribers and commercial customers.

 

 

Comments

blog comments powered by Disqus

Latest stories

Sony’s Google Glass Rival Going On Sale In March
Sony’s Google Glass Rival Going On Sale In March
The PlayStation maker has released the SDK.
 
 
Jameis Winston will sit Tonight
Jameis Winston will sit Tonight
Florida State suspended its quarterback, Jameis Winston, for the entire game against Clemson. He will sit and not be playing tonight.
 
 
Roman Reigns’ fight with Seth Rollins will have its Consequences
Roman Reigns to face Consequences of fight with Seth Rollins
Roman Reigns’ fight or rather SmackDown with Seth Rollins will have its consequences.
 
 
iCloud Drive For Windows Users Now Available To Download
iCloud Drive For Windows Users Now Available To Download
The iCloud Drive feature integrates seamlessly into Windows Explorer, showing up as another drive in the list of connected devices.
 
 
 

About the Geek Mind

The “geek mind” is concerned with more than just the latest iPhone rumors, or which company will win the gaming console wars. I4U is concerned with more than just the latest photo shoot or other celebrity gossip.

The “geek mind” is concerned with life, in all its different forms and facets. The geek mind wants to know about societal and financial issues, both abroad and at home. If a Fortune 500 decides to raise their minimum wage, or any high priority news, the geek mind wants to know. The geek mind wants to know the top teams in the National Football League, or who’s likely to win the NBA Finals this coming year. The geek mind wants to know who the hottest new models are, or whether the newest blockbuster movie is worth seeing. The geek mind wants to know. The geek mind wants—needs—knowledge.

Read more about The Geek Mind.