Look around, it is the 21st century, the world has become a global village and time waits for no one anymore. One of the strongest indications of this is the fact that every nation on the surface of the earth is now connected to the internet and the main reason why the world has become so small and compact, is predicated on the rise and global acceptance of the phenomenon. Yes! The internet is a phenomenon!
.
The internet as a tool is so powerful that it has enhanced communications across borders and as it stands now, it is safe to say that communicating with someone from thousands of miles away is now as simple as picking up a glass of milk from the fridge. From a simple voice call to emails, scanned documents, business transactions, social networking and even criminal activities etc. the internet is a big host.
Our daily activities are being influenced greatly by the internet, but commerce/trade is one area that has received a major breakthrough. At this point, It worthy to note that the internet has diversified and also revolutionised the way business is carried out in the 21st century and the result is, Mr X, located in a remote area in Morocco, can now purchase items from Japan, America, UK or any other place in the world. All Mr X needs is an internet enabled PC and a credit/debit card with money in it.
As a virtual environment that comprises everything present in the real world, the internet is home to the good, the bad and the ugly. Sadly, financial frauds/data breach on the internet has become a major setback and according to statistics; over 13.8 million consumers in America had their credit/debit cards breached in 2014, making up 47% of global incidents, followed by the UK, France, Australia, Canada and Germany.
Going forward, there are certain terms used by credit card fraudsters that readers should get conversant with;
i. CVV or CC – full credit card details including victims full name, credit card number, card expiry date, card owner’s address and phone number
ii. CVV2 – the three digits at the back of the card
iii. Fullz info – the full information of a victim, including full credit card details, SSN, Date of Birth, Drivers License, Mother’s maiden name and bank routing number etc.
iv. Cardable sites: vulnerable websites where stolen credit cards are easily used to purchase items or services.
v. Bank Logins – Bank details used for online banking and money transfer e.g. user name, passwords etc
vi. VPN – everyone knows VPN, they are used for cloaking IP
vii. Drop – Someone that helps to receive items bought with stolen cards
viii. Carding – the art of buying stuff online with stolen cards
ix. Carding forums; online meeting place where hackers, buyers, vendors and newbies meet.
x. Noobs – someone that is new in the business
xi. RDA – used by hackers to remotely log into a victim’s computer
xii. MIRC – a relay chat where the biggest and brightest hackers meet on the internet.
xiii. Deep Web: This is hell fire. This is home to every illicit trade imaginable. This is where you can do anything on the internet without any fear of being traced! The deep web is completely anonymous!
xiv. Vendor: He buys from the hacker and resells
xv. Spamming: sending random messages to prospective victims
xvi. Fake Login Page: Used by hackers to steal victims data
There are basically two types of credit card fraudsters out there and they are the hacker/vendor and the buyer. The hacker is basically the tech guy, the geek, the eastern European from Russia , Ukraine or the North African from Egypt , Tunisia or Morocco . Other countries with a rich pool of hackers are Vietnam , India , America and the UK . While on the side, we have the buyers who basically are from everywhere on earth. A buyer can be anyone that has knowledge of the underground trade, meaning anyone that knows where to look, can easily buy stolen credit card details online.
Hackers are those intelligent guys with impressive degrees in computer science and most times in carding forums, they brag about being too big to earn minimum wages and that’s why they choose to compromise peoples’ data online and do what?? Sell!
Hackers do not need or make use of 98% of the information they hack, however, they hack!
Down in the chain is the guy called the vendor! The vendor is the guy with plugs and connections, he knows a couple of good hackers capable of compromising website data-bases consistently and his duty is to buy from them! Why?? To resell!
Before we go any further, keep this in mind, hackers also develop and sell software used by non-hackers i.e. buyers to compromise victims, through spamming.
Now further down the line is the consumer or the buyer! The buyer can be anyone and 90% of the time, the buyer has no personal contact with the hacker. However, he buys whatever he needs from the vendor. And whatever he needs could be credit card details, bank logins, PayPal accounts, fake login page, emails and passwords, paid accounts, RDP and VPN etc. The list is long!
Vendors used to and still advertise their services in forums like www.kurupt.ru, www.l33t.org, www.altenen.com (the most popular one right now) and countless others. These places are called carding forums and they a gathering of like minds i.e. people interested in ripping off others online. www.altenen.com is a classic example of a proper carding forum and I say so because the site is visited by thousands daily. Not just that, the hackers here are so skilled and generous that they give away free hacked credit card details (called freebies) to noobs (newbies in the business). The downside of this is that over 700 persons can get hold of the same card details at once and the fastest to use it, is the winner. If a victim’s card is posted on a free forum, it takes a maximum of 10 minutes for it to be used up and dry.
Vendors, who have bought their cards privately from hackers, advertise their services in these forums and get tons of orders from buyers. A card bought from a vendor is called a private card and mind you the cheapest cards are those emanating from America . The prices are;
US visa $4
US MasterCard $4.5 - $5
Amex -$5
And so on.
As a result of the constant need for compromised information, vendors are physically over-worked due to tons of orders from buyers! So what do they do? They create what is now called an online CVV SHOP! Examples are; www.cardershop.su, www.privatecc.co and www.kingscard.su.
There are thousands of CVV shops on the internet selling compromised information and like I said earlier, anyone can be a buyer if he/she knows where to look. A simple search on google using the keywords ‘cvv shop’ will show you just how close these things are to everyone.
NOTE: This is just a tip of the iceberg: in the episode two of this topic, I’ll talk about Mirc, Deep Web, Cardable sites, Carding with stolen cards, protecting yourself from hackers and also ways of preventing your personal data from being compromised.