Keeping clients' computers safe and profitable for over 30 years | |||
Home Forms About Current Newsletter subscribe Search All Articles
Browse by Category
|
Online Credit card skimmersHow they work Article for: People who buy online
Difficulty: Easy Importance: Important safety tips plus information The frequency of online credit card skimmers, also known as digital card skimmers has surged. Currently, this is the biggest online threat, replacing ransomware and cryptomining. Hackers breached thousands of online retailers in 2018, including Ticket Master, NewEgg, Sotheby's and British Airways. Symantec claims they blocked over a million attempts against the sites they protect in just the last three months of 2018.
They implant these skimmers by direct attack against the site, but also indirectly through the victim's supply chain. They make the supply chain attacks against the victim by compromising their security firm, hardware or software vendor. The skimmer can get installed using the update mechanisms or infected computers of these vendors. There are also attacks against the software makers of the digital shopping carts online stores use.
According to recent Thales eSecurity research, 50% of all medium and large online retailers admit someone hacked them.
How they cash inOnce the hackers have a few thousand credit cards, including names, addresses, and even security codes, they sell them on the dark web. Prices range from $2 to $8 each, so 10,000 records can bring in around $50,000. Normally, they remove those cards from inventory and do not resell them. Hackers develop good or bad reputations depending on the quality and exclusiveness of the information.
The buyers clone the cards, making actual physical cards. They use these in brick and mortar stores. The cloned cards scan just like the original card.
What can I do about it?You can't do much to protect yourself. You are going to the correct site. There is no way to know if someone else is getting the credit card information you put in. It does not help to use their special app. They can still steal your information. But, some things can help mitigate the problem:
Further reading:
Date: June 2019
This article is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License. |
||
|