Web Fraud 2.0

March 17, 2016

Spammers Abusing Trust in US .Gov Domains

This post was originally published on this site Spammers are abusing ill-configured U.S. dot-gov domains and link shorteners to promote spammy sites that are hidden behind short links ending in”usa.gov”. Spam purveyors are taking advantage of so-called “open redirects” on several U.S. state Web sites to hide the true destination to which users will be taken if they click the link.  Open redirects are potentially dangerous because they let spammers abuse the reputation of the site hosting the redirect to get users to visit malicious or spammy sites without realizing it. For example, South Dakota has an open redirect: http://dss.sd.gov/scripts/programredirect.asp?url= …which spammers are abusing […]
March 21, 2016

Carders Park Piles of Cash at Joker’s Stash

This post was originally published on this site A steady stream of card breaches at retailers, restaurants and hotels has flooded underground markets with a historic glut of stolen debit and credit card data. Today there are at least hundreds of sites online selling stolen account data, yet only a handful of them actively court bulk buyers and organized crime rings. Faced with a buyer’s market, these elite shops set themselves apart by focusing on loyalty programs, frequent-buyer discounts, money-back guarantees and just plain old good customer service. An ad for new stolen cards on Joker’s Stash. Today’s post examines […]
April 26, 2016

All About Fraud: How Crooks Get the CVV

This post was originally published on this siteA longtime reader recently asked: “How do online fraudsters get the 3-digit card verification value (CVV or CVV2) code printed on the back of customer cards if merchants are forbidden from storing this information? The answer: If not via phishing, probably by installing a Web-based keylogger at an online merchant so that all data that customers submit to the site is copied and sent to the attacker’s server. Kenneth Labelle, a regional director at insurer Burns-Wilcox.com, wrote: “So, I am trying to figure out how card not present transactions are possible after a […]
May 12, 2016

Carding Sites Turn to the ‘Dark Cloud’

This post was originally published on this siteCrooks who peddle stolen credit cards on the Internet face a constant challenge: Keeping their shops online and reachable in the face of meddling from law enforcement officials, security firms, researchers and vigilantes. In this post, we’ll examine a large collection of hacked computers around the world that currently serves as a criminal cloud hosting environment for a variety of cybercrime operations, from sending spam to hosting malicious software and stolen credit card shops. I first became aware of this botnet, which I’ve been referring to as the “Dark Cloud” for want of a better term, […]