The value of Payment Card Data Flashcards
1
Q
Top targeted industries for stealing payment card data
A
- Retail
- Information/Financial
- Food Services
- Hospitality/ Accommodation
2
Q
What are the methods being used to remove stolen data from the environment?
A
- use of stolen credentials to access the POS environment
- use of backdoor/ command-and-control (C2)
- The use of default or static vendor credentials/ Brute force
- POS skimming malware being installed on POS controllers
- POI physical skimming devices
3
Q
How Data is Targeted?
A
- Skimming
- Phishing
4
Q
Skimming
A
Copying payment card numbers either by tampering with:
- POS Devices
- ATMs
- Kiosks
Or by copying the card’s magnetic stripe manually using handheld skimmers
5
Q
Phishing
A
1- Reconnaissance
2- Social Engineering
3- Break-In
6
Q
- Information gathering from various online sources and social networking sites.
- Business applications and software
A
Reconnaissance
7
Q
- Phishing emails or messages coming from a target’s social network
- Phone calla from assumed known entity
A
Social Engineering
8
Q
- Delivery through email
- Software Vulnerabilities
A
Break-In
9
Q
Common methods for monetizing stolen card data
A
- Skimmed full track data and transaction information used to replicate a physical payment card, which can then be used for fraudulent transactions in face-to-face environments, or ATM transactions
- Captured cardholder data is used where not-present transactions are accepted, such as e-commerce or mail-order/ telephone order (MO/TO) transactions
- Stolen cardholder data and sensitive authentication data are sold in bulk to other criminals who perform their own fraud using the stolen data