The most popular ways to steal c plastic cards

There are many ways to steal credit card numbers. The most popular - remote operation via the Internet with 'hacking' database of commercial site. Oddly enough, most of the problems with dimeetnymi and credit cards - the most common user carelessness. Law enforcement agencies and banks are quite reasonable written instructions for users, but who reads them? These and enjoy electronic fraudsters - how not to take, if the information itself is floating up.

There are many ways to steal credit card numbers. The most popular - full remote operation via the Internet with the "breaking" database of commercial site - for example, online store with books, flower delivery service, and so on. D. That is, any place where there is often open to outsiders files are credit card numbers , user names and numbers of the means of payment. Now, of course, authorization when buying through the Internet passes through a secure communication channel with encrypted SSL, but who are insured by the fact that the administrator of an online store does not know how to configure the security program?

The second method is more elegant - fake popnosayty where the credit card number is requested to confirm the alleged legal age visitor. With existing sites for adults taken a few pictures, it is a solid title page, where for a modest fee of $ 2-3 per month promised anything. Naive user specifies the number of your credit card and the name - it comes in response to a message that the site, they say, is temporarily unavailable - come back later. Meanwhile, the number and the credentials are known, they can either use themselves or sell.

There are also more interesting ways - they often "raid" travelers - is a fraud in retail outlets. Pay you dimeetnoy (not credit) card in the gift shop - is carried through the card reader, type the PIN (standard procedure), "machine" beeps and ... nothing happens. Seller smiles and politely said that, apparently, something did not work, it is necessary to repeat the procedure. Well, repeat the procedure, and, lo and behold, the payment takes place, wrapped purchase, and we can leave. A few days later when attempting to pay this card even in any product revealed that money is no longer present. You can directly contact the law enforcement agencies, and it's pretty fast spins - is in store between the first and second holding card dealer switched the switch under the counter. Thus, for the first time information from the card and PIN are read into the computer under the counter, and the second time already where it is necessary - to the payment system.

Often, the scammers use a device that, when installed on the ATM, helping them to get information about the card. It can be installed on a special keyboard "nozzle", which apparently repeat the original button. In this case the cardholder withdraws money from the account without any problems, but the fake stores all keyboard keystrokes - naturally including PIN. Tip: Read and understand an unfamiliar ATM keypad before you withdraw money from the account.

Another device - what the English are called lebanese loops. This plastic envelopes which are slightly larger than the card - they lay in the slot machine. The owner of credit trying to withdraw money, but the ATM machine can not read data from the magnetic strip. In addition, the structure of the envelope to return the card fails. At this time, it fits the attacker and said that just days ago with him, "the same thing happened." To return to the map, you just have to enter a PIN code and click twice on Cancel. Cardholder tries, and, of course, nothing happens. He decides that the card is left in the ATM, and leaves to contact the bank. Rascal quietly pulls out a credit card with an envelope with the help of simple improvised means. Pin it already knows - the owner of the (now former) "plastic" he had brought into the presence of a swindler. The thief can only withdraw money from the account.

Technically difficult, but it is possible to intercept the data that ATM sends to the bank in order to check the availability of the requested amount of money in the account. To do this, the fraudsters have to connect the corresponding cable and read the required data. Given that the Internet is easy to find the corresponding instructions in the public domain, and technological progress does not stand still, we can say: this option will become increasingly common.

In order to know the pin code, some speculators are left near a miniature video camera. They themselves at this time are in a car near a laptop, the screen is visible numbers entered by the cardholder. Enter a PIN, cover the keypad with your free hand.

Expensive, but a sure way to a hundred. There are cases where fraudsters pose in a crowded place your own "ATM." He, however, for some reason does not work and, of course, no money issues. But successfully reads the card all the necessary data. And then it turns out that yesterday you have removed all the money from the account and for some reason do not want to remember!

At the time, the scammers from the UAE installed in the holes for credit cards, special device that stores all the data inserted into the ATM card. Attackers could only peep pin or the above-described method, the first and fourth or corny peeping over his shoulder. Well, I liked the local Aboriginal people your ring or your watch, or there is something else ...

And it is a special case - a merging of criminal groups with employees of banks. To deal with this impossible. We can only accept. There is nothing to depend on your care, caution or prudence. It happens that a deal with crooks take those people who get to your credit card, and so is very simple: employees of banks, for example. This happens very rarely, but from such cases, no one is immune.

But suffer not only cardholders. Suffer and large firms, shops, banks. And here the losses already number in the hundreds of thousands of dollars. And sometimes millions.

Experts from law enforcement agencies around the world believe that the crimes committed with the use of plastic payment means can be attributed to one of the most dangerous economic crimes. And they are committed not only in the computer banking system, but also through the Internet.

By some estimates, today there are about 30 kinds of illegal operations with cards via the World Wide Web. The most common of them - non-existent payment cards, the creation of false virtual shops, electronic theft, false payment in gambling establishments.

There was even a special term - carding. This illegal use of bank cards to buy goods or services via the Internet. Catching carding, you can either get the information about the actual map or generate all the data, but that all systems will take for the real fake. Anyone interested can freely find links to websites that are openly traded stolen credit cards. The standard price for the card - from 40 cents to $ 5. Most sellers in the former Soviet Union, buyers, on the other hand, are concentrated in the Far East, the victims - mostly citizens of the United States and Europe. According to the FBI, the Ukraine and Russia has earned a reputation as a country in which they live the most skilled hackers.

Virtual markets are arranged almost like a real exchange, prices fluctuate according to demand. They are placed on the hacked pages and therefore short-lived - the majority of these pages live only a couple of days. Experts agree that the center of the world of carding is St. Petersburg, where the credit goes to the counter parties of 500-5000 units at the price of $ 1 per share.

Mined same credit card by breaking large financial firms. For example, in 2003 after refusing to pay hush money to hackers known financial firm CD Universe admitted the loss of a database of the 300 000 cards. Only one carding England lost to in 2003, 411 million pounds. In 2005, this figure had grown to a billion. Therefore, the fight against cybercrime has been allocated 25 million pounds.

By the way, in Russia in the early 90s one of the first affected Vnesheconombank. By simply hacking a computer network domestic hackers "facilitated" his safes at 130 thousand dollars.

All in all "electronic Sherlock Holmes' share 9 main types of cybercrime.

1. Operations with counterfeit cards.

2. Operations with stolen / lost cards.

3. Multiple payment for services and goods.

4. Fraud mail / telephone orders.

5. Multiple withdrawals.

6. Fraud using forged slips.

7. Fraudulent use of ATM in the issuance of cash.

8. Connect the electronic recording device to the POS-terminals / ATM (Skimming).

9. Other types of fraud.

We talk only about some of the most common.

Operations with counterfeit cards

This type of fraud accounts for the largest share of the loss of the payment system.

The mechanism of fraud may be different: the swindler gets a bank card in the normal legal way, making a special card account minimum required amount. Then, it extracts necessary information about the holder of a plastic card of the same company, but with a solid score, and makes the thus obtained new data in the card. To implement this method of fraud criminal should get information about the code number surname, first name, middle name of the card holder, the sample of signatures, etc.

To carry out such a forgery can be different:

 - Changing the information available on magnetic media;

 - Change the information embossed (embossed) on the front side;

 - And by doing that, and another;

 - Forged the signature of the legitimate cardholder.

When forging signatures used several options, but at the same time take into account the fact that the sample of the signature can not be erased, because when you try to do it in the signature tread word VOID - «invalid». Therefore, it is often simply painted over with white paint.

One of the most dangerous methods of counterfeit plastic cards - production completely false cards. The most widely used method of copying was complete in some countries of Southeast Asia. Such a method often used by organized criminal groups, which usually consists of employees of restaurants and other service establishments. The latter are used to collect information on credit cards, which fall into their hands when paying for restaurants and other services.

Credit information is used in the production of counterfeit credit cards can be collected in various countries around the world. The most frequently used data from Canada, the United States, European countries, as well as from the Asian region.

Operations with stolen or lost cards

The fraudulent use of stolen credit cards remains the most common crime. Methods to counter theft and fraudulent use of plastic cards improved over the years, but currently companies prefer to produce cheap card to reduce the amount of possible losses from their illegal use. When the amount of losses increase sharply, companies are making efforts to introduce new security measures.

In the case of the abduction of cards when sending it by e-mail feature of fraud is that the owner does not know about the loss of the card. Prevent theft by this method of fraud is very difficult.

Criminals have numerous ways of using the stolen cards. Organized criminal groups are paid between 100 and 500 US dollars for the stolen card depending on whether signed or not, how long have stolen, whether it is on the list of stolen, how long it was used by the rightful owner, dredged a limit, is there any additional documents, identity.


See also

New and interesting


We on Google+