Inside Payment Card Fraud: Part 2

In Inside Payment Card Fraud: Part 1, we examined why carding remains pervasive despite ongoing efforts to quash it, identified key intelligence requirements for teams tasked with fighting payment card fraud, and provided an overview of how criminals obtain victims’ card data. In this follow-up blog, we’ll look at what criminals do with stolen card data after obtaining it, the abundance of carding tutorials within online threat-actor communities, and the implications for defenders.

Default Author Image
October 3, 2019