Gift ‘Carding’ Not As Nice As Sounds

By Scott Schober

What do you get for the person that has everything? Gift cards, while impersonal, do make gifting easy for those of us that are too busy or disinclined to search for that perfect gift. Hackers have gotten into the act of ‘carding’ but not like you think.

What is Carding?

Carding is when a stolen credit card is used to charge for pre-paid gift cards. A hacker will either steal or purchases stolen credit cards (usually on the Dark Web) and then purchase store-branded gift cards. These gift cards are then sold to consumers (on Ebay for example) to purchase goods or then re-sold sold for cash. Many of these gift cards are used to purchase high value electronics such as televisions since those goods can easily be resold but that hasn’t stopped many cyber thieves from also selling small $5 Amazon cards by the truckload as well. If the carder purchases a gift card for a retailer such as Target or Amazon, they may use a 3rd party to actually receive the goods and then have the shipment directed to other locations. This can distance and limit the attention that might be drawn to the carder which anonymous hackers love. And of course, carders often sell their fraudulently obtained electronics on the Dark Web providing further anonymity and fully completing their criminal cycle.

Credit card fraud continues to threaten consumers as hackers evolve their techniques to get into our wallets. Per CreditCard.com estimates of credit card fraud in 2018 globally expected to be in excess of $6.4 billion dollars.

Who are these carders?

Creating layers and complexity is nothing new to cyber thieves. Many hackers implant misdirection or subtle clues into their malware code. Many others steal consumers’ identity and then play a waiting game. The more time that transpires between the initial theft and the sale or use of that data, the more difficult it is for consumers to remember or trace back to the initial theft. Dark Web anonymity requires the TOR browser and a VPN to disguise the visitor’s identity and location so carders are already well versed in criminal subterfuge. Suffice it to say, carders (and most hackers) work in dark corners actively covering up their tracks making them much harder to bring to justice than your run-of-the-mill thief.

Where are all of these compromised cards coming from?

With so many data breaches in the headlines from Target to Home Depot and hundreds of companies in between, there are literally millions of compromised credit cards circulating on the Dark Web. And even though credit cards are typically and quickly cancelled upon being lost or stolen, cyber thieves will occasionally test the stolen card information to see if it still works. This is accomplished by submitting small purchase requests over the Internet.

Another huge source of stolen card numbers come from something every driver does. Gas pump skimmers have plagued credit and debit card users for years now but the ubiquity of low cost bluetooth skimmers and brazen hackers have led to a national epidemic of credit card fraud. Hundreds of gas stations currently continue to contain hidden skimmers that record thousands of credit card numbers daily. These numbers (and their associated security PINs) continue to fetch a high price across the Dark Web.

Brian Krebs Tweet

How can I stay safe?

I’m afraid there is no silver bullet to keeping your credit card safe from carders or any other type of identity thief. I can recommend that you never use your credit card but that’s not realistic, convenient or even good for your credit score. I will say that you should minimize your card footprint. That means you should not have your credit card(s) spread across multiple services such as Venmo, Paypal, Samsung Pay, Apple Pay, Google Pay, etc. because these services are somewhat redundant. Some are more secure than others but none are invulnerable to user or server level hacks so you will greatly reduce your chances of credit card fraud just by only using one service for example. Of course the same goes for retail stores, e-commerce sites, streaming services and even gas stations but try telling that to a millennial. If Chip and PIN is offered at POS terminal, use it; if it’s not, leave that store and do not return until they respect your privacy and security by updating to the latest POS security protocols.

Of course there are also skimmers of all types and their perpetrators out there waiting for you to sink your card into them. This also means that there are tools to fight these skimmer scams used by law enforcement but it’s up to consumers to stay safe by keeping credit and debit card use to a minimum while staying alert to any possible fraud.

Scott Schober

BVS, Inc. CEO | Author | Speaker | Cyber Security & Wireless Expert at Scott Schober LLC
Scott has presented extensively on cybersecurity and corporate espionage at conferences around the globe. He has recently overseen the development of several cell phone detection tools used to enforce a “no cell phone policy” in correctional, law enforcement, and secured government facilities. He is regularly interviewed for leading national publications and major network television stations including Fox, Bloomberg, Good Morning America, CNN, CGTN, CNBC, MSNBC and many more. He is the author of ‘Hacked Again’, his latest book as well as a contributor for Huffington Post and guest blogs regularly for Tripwire’s State of Security series. Scott also writes for Business Value Exchange, Fortune Magazine and IBM Big Data & Analytics Hub.

Source

Previous articleThe 2019 MER Conference Program
Next articleIG GURU® and Inside the Records Room Partner In Delivering News Related To The IG and RIM Industries

1 COMMENT

  1. Rather a hassle, but would using my credit card to purchase limited-value VISA gift cards from a reputable store, then using the VISA gift cards for all purchases provide any security? Or is that just creating work for myself for nothing.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.