
How card fraud is powered by underground card checkers
Payment card "checkers" are used by criminal hackers to check the validity of stolen payment card details. Here's how this in-demand underground service works.

Threat actors doing crime online use a variety of precautions and technologies to avoid getting caught. Mick Deben is a cybersecurity consultant with DMC Group in the Netherlands. He recently completed his master’s degree thesis, which focused on creating a knowledge base around these anonymity techniques. The knowledge base is called Concealment Layers for Online Anonymity and Knowledge (CLOAK), and it’s intended to give CTI practitioners another way to fingerprint threat actors. In this Studio 471, Deben discusses how he developed CLOAK and how practitioners can use it.
Participants:
Mick Deben, Cybersecurity Consultant, DMC Group
Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471

Payment card "checkers" are used by criminal hackers to check the validity of stolen payment card details. Here's how this in-demand underground service works.

Threat actors are increasingly using methods to circumvent multifactor authentication, which poses a risk of account takeover. Here’s a briefing on some types of attacks and defenses to put in place.

Check fraud in the U.S. is booming. Fraudsters steal checks and sell them on underground channels where they are purchased, modified and deposited in hopes of a payment. Here's a briefing on this multi-layered crime.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.