Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: [Dataloss] Debit Card Fraud Tied to OfficeMax Breach (fwd)
From: hypronix (hypronixgmail.com)
Date: Thu Mar 09 2006 - 10:55:09 CST
Catching is hard in most cases. The PINs are usually traded overseas
[from EU to N.Am. or otherwise] and 'cashing out' is done by one or
more independent people which all pay a certain comission back to the
PIN/CC# provider. Depending on one's will to risk themselves getting
caught, withdrawals of up to US$15000 a day are not all that common.
Short of utter stupidity or pushing one's luck too far, there is no
immediate way in which 'cash-outs' can be stopped. Short of, of
course, invalidating all CC#'s at the first sign of compromise.
But that doesn't seem to be as 'normal' as one would expect it...
On 3/9/06, Sharon Besser <sbessergmail.com> wrote:
> We have seen similar case in Israel ~ 2 years ago. Someone managed to
> get access to VISA cards information (including PIN numbers) by
> stealing an on-line processing machine, which apparently, had offline
> backup (....) Then he decrypted the data and build his own 'white
> card'. AFAIK they never caught the person that was leading the gang.
> The fraudulent transactions involve cloned Visa debit cards and may be
> linked to the theft of blocks of PINs from OfficeMax or an
> intermediary processor, sources familiar with the case said.
> Dataloss Mailing List (datalossattrition.org)
Dataloss Mailing List (datalossattrition.org)