Skip Links

Target hackers try new ways to use stolen card data

For the first time, hackers market stolen data with info on the location of store where card was used; experts say new strategy will slow detection

By Jaikumar Vijayan, Computerworld
December 23, 2013 03:51 PM ET

Computerworld - The techniques used by hackers to access credit and debit card data from target shoppers suggests that the cyber crooks have found a troubling new way to stay ahead of the latest fraud detection processes.

Security blogger Brian Krebs, who first reported the Target data breach news last week, said on Sunday that compromised cards are being marketed online with information on the state, city and ZIP code of the Target store where they were used.

Fraud experts say the location information will likely allow buyers of the stolen data to use spoofed versions of cards issued to people in their immediate vicinity, Krebs wrote. "This lets crooks who want to use the cards for in-store fraud avoid any knee-jerk fraud defenses in which a financial institution might block transactions that occur outside the legitimate cardholder's immediate geographic region," he said.

This is believed to be the first time that security experts have observed hyper-localized selling of stolen credit and debit card information following a retail breach.

Target last week disclosed that hackers had accessed data stored on some 40 million credit and debit cards belonging to shoppers who bought merchandise in its stores between Nov. 27 and Dec. 15.

The information exposed in the incident includes the cardholder's name, the credit or debit card number, the card's expiration date and the CVV security code used to activate the card in a store, Target said.

The breach is believed to have exposed data from cards distributed by most major U.S. credit card issuing banks and credit unions. JP Morgan Chase on Saturday announced that it had put restrictions on the amount that customers affected by the Target breach could spend or withdraw daily.

James Huguelet, an independent consultant who specializes in retail security, said Krebs' report concurs sporadic reports after the breach that that stolen Target cards were used fraudulently in areas close to where the owners of the cards lived.

Local use of a card makes it more likely that the crooks can use it for a relatively long period of time before a block is put on it, he said. "That makes such cards much more valuable to a criminal. This is a very clever tactic to increase the monetary value of each stolen card. It's one I've not seen used before," Huguelet said.

Card thieves typically sell stolen data to buyers around he world, making it likely that fraud detection tools used by banks will detect the crimes.

Fraud detection tools used by banks and other card issuers look closely at the location where a card is used and the frequency of its use to determine potential criminal use. Banks often decline transactions or require additional authentication for card transactions that originate from new or unexpected locations.

Such detection is harder when a stolen card is used within the area where the card is typically used.

"Whoever is behind this breach appears to have a tremendous amount of not only technical, but also retail operations and payment industry knowledge. This could indicate someone who has previously worked in the retail payments industry." Huguelet said.

Originally published on www.computerworld.com. Click here to read the original story.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News