Who and how steals money from bank cards and how to protect yourself on the Internet? "Paper" spoke with a former carder - a man who was engaged in Internet fraud with bank cards. Carding forum is a place for carders who sell stolen cards
Let's say a person issued a card in a bank to pay via the Internet and immediately went to buy any trash. He goes to a dubious store selling perfume, buys them, they arrived safely - and everything seems to be fine. Carding forum is probably not the best product for crooks who are willing to engage in such activities
But the store may not be very secure and save all the card data. There are two ways to go. Either the site will be hacked and will have access to the database of maps, or it will be sold or merged by the store employees themselves. The price rises depending on what data you get.
The more information about the user, the more you can exploit someone else's card. Usually, an attacker has special electronic systems: virtual machines or rented servers in other countries. That is, if the card belongs to an American, American servers are used to simulate that a person is buying something in the States.
Having card data, on the Internet you can pay bills, replenish the phone and buy almost everything. Bank cards, as a rule, are used for petty fraud: from 10 to 200 dollars, but sometimes they "buy" from one card for more than $ 1000. Everyone knows hackers love to hack people and sell them to carders and they sell them on carding forum
Who steals money and how?
Malware is used to work with bank accounts. There are two types of Trojans: grabbers and formgrabbers. Grabber Trojans simply steal all stored passwords. Gradually, the security system began to evolve: there were secret questions, it was necessary to enter additional data - it became quite difficult to access the accounts.
But smart people have come up with a phenomenal thing — formgrabbers: the virus steals not only what is saved, but also what you enter. It became even easier when it became possible to force the user to enter what is needed. Let's say you have a bank account with online access. Twice a week you go there to top up the phone or pay for the apartment. It's not very big payments that don't empty your account. Some banks (mainly in Europe) have a TANITAN security system. When issuing a card and registering in online banking, the client receives a sheet on which from ten to hundreds of passwords. Each of them has from 4 to 8 characters.
Whenever he enters the bank or conducts any financial transaction, the system asks for, for example, the 53rd password or the first (fourth, fifth, seventh) character of the 22nd password. At first, the system worked very well: the banks just wrote with boiling water from the fact that no one can steal anything.
But still, there was a way to deceive this system. The Trojan simply climbed into the browser and embedded its code in the final page. When all the data is entered, a huge pop-up appears that says: "Security error, you entered the wrong code, try again." The user, of course, enters the password again, because externally it is the same site with the same design. Then he safely enters his personal account, and there everything is in place. But during this time, half of the money was gone, and he did not even notice.
How does it work?
When the pop-up appeared, the real page with a bank account had already loaded. In fact, the client has already been allowed everywhere, but because of the malicious code, the page shows that he did not enter. In fact, the translation has already been generated, the necessary names have already been substituted and the virus is waiting only for confirmation of the code. The user enters it, and the translation is carried out. Something is spinning on the screen, supposedly loading the page.
During this time, the usual mathematical formulas of the system calculates how much a person spends per week and how much he wants to leave, so that in the next two or three days he did not notice the theft and you can safely cash everything out. When the client returns, the same way the page is changed, transfers are removed from the transaction lists, and the balance looks intact. Carders are caught because of greed, carelessness and stupidity or the human factor. The main reason is greed. The more you want to steal, the better you will be sought. The policy of banks is that they do not look for a criminal if the write-offs are up to $ 5,000 from one account.
It is cheaper for them to make up for the loss than to look for who stole the money. The most dangerous and profitable type of carding is the one that does not use virtual data, but works with real cards. For example, a visitor in a cafe take a card and carry to pay. First, nothing prevents attackers from rewriting data and paying on the Internet. Secondly, nothing prevents them from using a skimmer - a device that stores data from magnetic tapes. It is put on an ATM or assembled manual models. Criminals buy blank cards and a special device that programs and records new cards. By the way, in cashing out from credit cards, all dropas are conscious, they know what they are doing.