Indian Debit and Credit card Details of Half-Million Sold on Darknet

cyber security industry trends 4/5 (1)

Nearly half a million Indian debit and credit cards sold on Darknet.

On February 5,  Group-IB, a Singapore based cybersecurity company detected a database containing over 460,000 payment card records on market card shops out of which 98 per cent of records were from the biggest Indian banks.

The underground market value of the database is estimated at more than USD 4.2 million. The source of this new data breach remains unknown.

Group-IB has immediately notified the Indian Computer Emergency Response Team (CERT-In) about the data breach.

The database exposed card numbers, expiration dates, CVV/CVC codes, cardholders full name, emails, phone numbers and addresses.

All the cards from the database are being sold for $9 for a piece, with the total underground market value of all the batch standing at $4,157,784. Till February 6 morning 16 cards we’re sold out from this database.

This is the second major breach related to Indian cardholders registered by Group-IB. Around 1.3 million credit and debit card records of mostly Indian bank customers were uploaded to Joker’s Stash in October 2019. The database contained details from various issuing banks and each card was being sold for $100.

“In the current case, we are dealing with so-called full – they have info on card number, expiration date, CVV/CVC, cardholder name as well as some extra personal info. Such type of data is likely to have been compromised online – with the use of phishing, malware, JS-sniffers – while in the previous case we dealt with card dumps (the information contained in the card magnetic stripe), which can be stolen through the compromise of offline POS terminals, for example. We have shared all the information discovered with our colleagues from CERT-In,” stated Dmitry Shestakov, the head of Group-IB cybercrime research unit.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.Y

You may be interested in reading: ASP.NET Hit by Ransomware

Comments

Please rate this content