Target hackers have more data than they can sell

Those who stole the data appear to be keeping a low profile on underground forums

What's the downside to successfully stealing 40 million credit card numbers from Target? Trying to sell the data.

There's a thriving economy among cybercriminals, some of whom specialize in stealing credit card numbers to others who figure out a way to profit. But it's also constrained by supply and demand.

Too many card numbers on the market inevitably drives the price of a set of details down. Card information, referred to in underground forums as "dumps," are often priced according to how recently the details were stolen, its likely spending limit and whether the hackers have captured a PIN for the card.

Prices can range from a few dollars up to US$100. Cybercriminals often advertise the kind of data they've captured from the card's magnetic stripe, which has three so-called "tracks," each containing data.

"Track 1" data contains a card number, the victim's name and the card's expiration data, and Track 2 data contains the card number and expiration data. The third track is rarely used.

"You can imagine that having a lot of stolen credit cards will not net the hackers, say $35 per card for all 40 million," said Alex Holden, who runs a cybercrime consultancy, Hold Security. "Even if the hackers are willing to sell cards for $1 a card, no one will buy the stolen goods in these amounts."

Target said attackers likely intercepted 40 million debit and credit card numbers between Nov. 27 to Dec. 15, 2013, one of the busiest shopping periods in the U.S. Target CEO Gregg Steinhafel said in an interview with CNBC on Sunday that malware was discovered on point-of-sale terminals.

How those terminals were infected is still a mystery. Computer security experts are keeping a close eye on underground forums where the data is traded, looking for clues as to who may be responsible.

So far, they haven't seen much.

"We have seen some comments by other hackers that would suggest that there was no sound exist strategy by the thieves," Holden said. "Right now, they are maybe laying low knowing that everyone is looking for them."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securityHold Securitymalwarefraud

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?