Black market explosion

Ghost computer networks serve as a campaign to distribute spam and steal credit card information sold for $ 2. This is just one of the easy-to-find items in the 'black market' of cybercriminals today, according to Panda Security.

Ghost computer networks serve as a campaign to distribute spam and steal credit card information sold for $ 2. This is just one of the easy-to-find items in the 'black market' of cybercriminals today, according to Panda Security.

According to researchers at PandaLabs, the criminal network is selling stolen credit card account information at online forums and stores.

Black market explosion Picture 1Black market explosion Picture 1
The stolen credit card is being actively sold on the black market.

That activity is thriving and cybercriminals are abetting the attempt to steal personal information for financial benefits. The black market of cybercrime focuses on distributing stolen credit and bank card details from every user in the world, diversifying business models in 2010 and currently selling secret information on A wide range of banking information, passwords, fake credit cards, .

In addition, PandaLabs also provides detailed information on prices and types of stolen information sold at the black market. Specifically, data can be purchased for $ 2/1 credit card. However, 2USD will not provide buyers with additional information or verify available account balances.

If the buyer wants to secure the available credit card line or bank balance, the price will rise to $ 80 for small account balances and raise to $ 700 to access accounts with a guaranteed balance of 82,000. USD.

The report also provides a complex pricing structure for accounts with online shopping history or using payment platforms like PayPal.

In addition, stolen credit cards are also used to rent ghost computer networks to serve spam campaigns. Prices range from 15-20USD when hiring SMTP or VPN servers, can also hire cyber criminals to help set up fake online stores, to use the technique of stealing user details. and profit when victims pay for fake antivirus software.

On the other hand, there are groups willing to provide 'turnkey' projects to design, develop and provide full stores, even put in search engines for the order.

4 ★ | 1 Vote