Target hackers will be tough to find, experts say

Jan 22, 2014 by Bree Fowler
Credit cards that were confiscated are displayed at the McAllen Police Department in McAllen, Texas, after McAllen police arrested a man and a woman on fraud charges, Monday, Jan. 20, 2014. According to a South Texas police chief, the suspects used account information stolen during the Target security breach to buy tens of thousands of dollars' worth of merchandise, but a spokesman for the U.S. Secret Service said Tuesday that an investigation is ongoing into the possibility of a link between the Target data breach and the arrests. (AP Photo/The Monitor, Gabe Hernandez)

The hackers behind the recent Target data breach are likely a world away and nearly impossible to find.

That's the consensus among outside cybercrime experts as Target, the Secret Service and the FBI continue their investigation of the pre-Christmas data heist in which hackers stole about 40 million debit and and also took personal information—including email addresses, phone numbers, names and home addresses—for another 70 million people.

The information can be used in a variety of nefarious ways. Criminals can attempt to use the credit card numbers and place charges on the original owners' accounts or they can use other pieces of personal information to steal people's identities and apply for new lines of credit.

In cases where such a massive amount of information is stolen, criminals generally divide the data into chunks and sell the parcels through online black markets, says Chester Wisniewski, senior security adviser for the computer security firm Sophos.

In many ways, those markets behave much like any legitimate marketplace ruled by the forces of supply and demand. Groups of higher-end cards are worth significantly more than those with lower credit limits and so are cards tied to additional personal information, such as names, addresses and postal codes, which make them easier to use.

A McAllen Police detective collects credit cards that were confiscated by police after arresting a man and a woman on fraud charges, Monday, Jan. 20, 2014, in McAllen, Texas. According to a South Texas police chief, the suspects used account information stolen during the Target security breach to buy tens of thousands of dollars' worth of merchandise, but a spokesman for the U.S. Secret Service said Tuesday that an investigation is ongoing into the possibility of a link between the Target data breach and the arrests. (AP Photo/The Monitor, Gabe Hernandez)

After thieves purchase the numbers, they can encode the data onto new, blank cards with an inexpensive, easy-to-use gadget. Or they can skip the card-writing process and simply use the card numbers online.

The underground markets where hackers sell the bundles of stolen numbers always have a steady supply of card numbers on sale and their locations are always moving as they try to elude law enforcement, says Daniel Ingevaldson, at Easy Solutions Inc., a firm that sells anti-fraud products and tracks the activity of the online black markets. A big jump in inventory usually indicates there's been a breach of a major retailer. That's what Ingevaldson's firm saw in the cases of both Target and Neiman Marcus, which also recently reported a breach.

While many of these online bazaars and forums are based in Russia and Eastern Europe, much of the chatter is in English and appears to have been written by Americans, Ingevaldson says.

The types of criminals who buy the card numbers run the gamut, ranging from purely online white-collar crooks to street gangs.

"In reality, card numbers can be bought by anybody with access to the forums and a few Bitcoins in their pocket," Ingevaldson says.

Wisniewski says the people who buy online and produce the fake cards generally aren't the ones who try to use them. Using the cards is the riskiest part of the fraud scheme, so the task is usually farmed out to others who are often recruited through spam emails. The recruiters then send them fraudulent debit and credit cards and instruct them to buy large quantities of expensive merchandise or gift cards in exchange for a small percentage of their value.

Card users, once caught, often only have a handler's email address to share with police, making it nearly impossible to find the recruiters, Wisniewski says.

It's likely that the authors of the malicious software used in the Target breach are making a nice living just by selling copies of the code to other hackers and not doing any hacking themselves, says Wisniewski.

"Keep in mind, it isn't illegal to write these kind of codes, just to use them," Wisniewski says. "And selling them is a lot less risky than taking (fake) cards into an Apple store."

Explore further: Neiman Marcus is latest victim of security breach

5 /5 (1 vote)
add to favorites email to friend print save as pdf

Related Stories

Neiman Marcus is latest victim of security breach

Jan 12, 2014

Luxury merchant Neiman Marcus confirmed Saturday that thieves stole some of its customers' payment card information and made unauthorized charges over the holiday season, becoming the second retailer in recent ...

Target: Customers' encrypted PINs were stolen

Dec 27, 2013

Target said Friday that debit card PIN numbers were among the financial information stolen from millions of U.S. customers who shopped at the retailer earlier this month.

Weak US card security made Target a juicy target

Dec 22, 2013

The U.S. is the juiciest target for hackers hunting credit card information. And experts say incidents like the recent data theft at Target's stores will get worse before they get better.

Recommended for you

Man pleads guilty in New York cybercrime case

Nov 22, 2014

A California man has pleaded guilty in New York City for his role marketing malware that federal authorities say infected more than a half-million computers worldwide.

How to keep the world's eyes out of your webcam

Nov 21, 2014

There are concerns that thousands of private webcams around the world could be streaming live images to anybody who wishes to view them – without their owner knowing – thanks to a Russian website provi ...

Britain urges Russia to shut down webcam spying site

Nov 20, 2014

A Russian website offering thousands of live feeds peering into bedrooms and offices around the world by accessing poorly secured webcams should be taken down immediately, British officials said on Thursday.

NSA Director: China can damage US power grid

Nov 20, 2014

China and "one or two" other countries are capable of mounting cyberattacks to shut down the electric grid in parts of the United States. That's according to Admiral Michael Rogers, the director of the National Security Agency ...

Some in NSA warned of a backlash

Nov 20, 2014

Current and former intelligence officials say dissenters within the National Security Agency warned in 2009 that secretly collecting American phone records wasn't providing enough intelligence to justify ...

Russia hacking site spying webcams worldwide: Britain

Nov 20, 2014

Britain's privacy watchdog on Thursday called on Russia to take down a site showing hacked live feeds from thousands of homes and businesses around the world and warned it was planning "regulatory action".

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.