The value of Payment Card Data Flashcards

1
Q

Top targeted industries for stealing payment card data

A
  • Retail
  • Information/Financial
  • Food Services
  • Hospitality/ Accommodation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the methods being used to remove stolen data from the environment?

A
  • use of stolen credentials to access the POS environment
  • use of backdoor/ command-and-control (C2)
  • The use of default or static vendor credentials/ Brute force
  • POS skimming malware being installed on POS controllers
  • POI physical skimming devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How Data is Targeted?

A
  • Skimming

- Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Skimming

A

Copying payment card numbers either by tampering with:

  • POS Devices
  • ATMs
  • Kiosks

Or by copying the card’s magnetic stripe manually using handheld skimmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

1- Reconnaissance
2- Social Engineering
3- Break-In

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Information gathering from various online sources and social networking sites.
  • Business applications and software
A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Phishing emails or messages coming from a target’s social network
  • Phone calla from assumed known entity
A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Delivery through email

- Software Vulnerabilities

A

Break-In

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common methods for monetizing stolen card data

A
  • Skimmed full track data and transaction information used to replicate a physical payment card, which can then be used for fraudulent transactions in face-to-face environments, or ATM transactions
  • Captured cardholder data is used where not-present transactions are accepted, such as e-commerce or mail-order/ telephone order (MO/TO) transactions
  • Stolen cardholder data and sensitive authentication data are sold in bulk to other criminals who perform their own fraud using the stolen data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly