What identity thieves are seeking is money, of course. But those who broker in stolen credit cards also are strongly motivated by status.What identity thieves are seeking is money, of course. But those who broker in stolen credit cards also are strongly motivated by status, says Dan Clements, CEO of CardCops.com , a credit card protection service agency that scours the Internet for compromised credit card and personal data and reports it to victims and banks.“Carders would love to root servers at e-commerce sites and own them, especially when credit cards are sitting there unencrypted,” Clements says. “Then they post them to carder Web sites and say, ‘Hey, rate me.’ The better your rating, the better your trading privileges.”Increasingly, carders are part of organized crime rings mostly from former Soviet Union states, Kilger says. In these cases, after the cards are used to purchase expensive items, they’re posted at carder sites to obscure their usage patterns and therefore confuse investigators. Attackers going after e-commerce sites also indiscriminately look for the weakest security . “I call these ‘targeted victim attacks.’ They gain root with the specific intent to steal something,” C&W’s Neal says. “I would expect the pattern of intrusion activity to be similar to a ‘target of opportunity’ attack.”Such an opportunity presented itself in January 2002 to a carder who had rooted at least one server at an e-commerce hosting provider. The case began to unfold in September, when CardCops investigators culled some 60 invoices (complete with purchaser’s names, addresses and phone numbers) off Carderplanet.com, a carder Web site since removed. “We noticed that the invoice numbers had the same long-digit formats. So we started calling the consumers whose card numbers, phone numbers and addresses were on the invoices. We asked them where they shopped. We were able to trace them all back to several merchants at a single hosting provider called Serve.com (since renamed as Datarealm).PATTERNS OF BEHAVIOURProfile 2:CREDIT CARD CROOKS •Act quickly and precisely to make their activities harder to detect.•Exploit perimeter through vulnerable ports, services and buffer overflows. •Use Trojan horses (hidden software) to leave back doors for re-entry. •Use sniffers to capture passwords. •Stick around until noticed. •Make few or no mistakes. COUNTER MEASURES For SELF-SUPPORTING e-commerce sites: •Spend resources protecting that which is most valuable (the customer database).•Encrypt credit cards in databases. For SELF-SUPPORTING e-commerce sites: •Contractually bind your hosting service to conduct quarterly vulnerability assessments.•Don’t collocate. Use a dedicated server. •Purchase extra security options. When he called the merchants whose invoices were heisted, they complained that they’d suspected problems for months because cards were approved at the time of purchase, but then declined two weeks later when they rechecked the cards before shipping backorders.Clements e-mailed Serve.com’s system administrator, who attributed the problem to a flaw in the shopping cart software that affected only 24 of Serve.com’s 4,000 e-commerce clients. Then in November, a skin care merchant hosted at Serve.com found an alteration to her directory – a page added on Jan. 23, 2003, titled “index.old.” She clicked on the page that read, “MuShrooM said That No RedeFace (sic) ! ! nitr0x Ownz serve.com …lol.”Clients of Serve.com, along with its CEO and systems administrator, didn’t return Network World’s calls about the incident, so details are not forthcoming as to how the carder gained root.However, Neal surmises that once the perimeter is exploited, carders act more professionally because they don’t want to be caught (see graphic, above.)Main | Next: Profile 3: Filching Files from Within Related content feature 5 ways to boost server efficiency Right-sizing workloads, upgrading to newer servers, and managing power consumption can help enterprises reach their data center sustainability goals. By Maria Korolov Dec 04, 2023 9 mins Green IT Green IT Green IT news Omdia: AI boosts server spending but unit sales still plunge A rush to build AI capacity using expensive coprocessors is jacking up the prices of servers, says research firm Omdia. By Andy Patrizio Dec 04, 2023 4 mins CPUs and Processors Generative AI Data Center feature What is Ethernet? History, evolution and roadmap The Ethernet protocol connects LANs, WANs, Internet, cloud, IoT devices, Wi-Fi systems into one seamless global communications network. By John Breeden Dec 04, 2023 11 mins Networking news IBM unveils Heron quantum processor and new modular quantum computer IBM also shared its 10-year quantum computing roadmap, which prioritizes improvements in gate operations and error-correction capabilities. By Michael Cooney Dec 04, 2023 5 mins CPUs and Processors CPUs and Processors CPUs and Processors Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe