{"id":4493,"date":"2014-01-14T10:12:02","date_gmt":"2014-01-14T15:12:02","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=4493"},"modified":"2014-01-14T10:12:02","modified_gmt":"2014-01-14T15:12:02","slug":"target-hackers-have-more-data-than-they-can-sell","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2014\/01\/14\/target-hackers-have-more-data-than-they-can-sell\/","title":{"rendered":"Target hackers have more data than they can sell"},"content":{"rendered":"<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2087560\/target-hackers-have-more-data-than-they-can-sell.html\"><img data-recalc-dims=\"1\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/nccomputertech.com\/techtalk\/wp-content\/uploads\/2014\/01\/target-100220677-gallery.png\" \/><\/a><\/p>\n<p>What\u2019s the downside to successfully stealing 40 million credit card numbers from Target? Trying to sell the data.<\/p>\n<p>There\u2019s a thriving economy among cybercriminals, some of whom specialize in stealing credit card numbers to others who figure out a way to profit. But it\u2019s also constrained by supply and demand.<\/p>\n<p>Too many card numbers on the market inevitably drives the price of a set of details down. Card information, referred to in underground forums as \u201cdumps,\u201d are often priced according to how recently the details were stolen, its likely spending limit and whether the hackers have captured a PIN for the card.<\/p>\n<p>Prices can range from a few dollars up to $100. Cybercriminals often advertise the kind of data they\u2019ve captured from the card\u2019s magnetic stripe, which has three so-called \u201ctracks,\u201d each containing data.<\/p>\n<p>\u201dTrack 1\u201d data contains a card number, the victim\u2019s name and the card\u2019s expiration data, and Track 2 data contains the card number and expiration data. The third track is rarely used.<\/p>\n<p>\u201dYou can imagine that having a lot of stolen credit cards will not net the hackers, say $35 per card for all 40 million,\u201d said Alex Holden, who runs a cybercrime consultancy, Hold Security. \u201cEven if the hackers are willing to sell cards for $1 a card, no one will buy the stolen goods in these amounts.\u201d<\/p>\n<p>Target said attackers likely intercepted 40 million debit and credit card numbers between Nov. 27 to Dec. 15, 2013, one of the busiest shopping periods in the U.S. Target CEO Gregg Steinhafel said in an interview with CNBC on Sunday that malware was discovered on point-of-sale terminals.<\/p>\n<p>How those terminals were infected is still a mystery. Computer security experts are keeping a close eye on underground forums where the data is traded, looking for clues as to who may be responsible.<\/p>\n<p>So far, they haven\u2019t seen much.<\/p>\n<p>\u201dWe have seen some comments by other hackers that would suggest that there was no sound exist strategy by the thieves,\u201d Holden said. \u201cRight now, they are maybe laying low knowing that everyone is looking for them.\u201d<\/p>\n<p>via <a href=\"http:\/\/www.pcworld.com\/article\/2087560\/target-hackers-have-more-data-than-they-can-sell.html\" target=\"_blank\">Target hackers have more data than they can sell | PCWorld<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What\u2019s the downside to successfully stealing 40 million credit card numbers from Target? Trying to sell the data. There\u2019s a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7],"tags":[453,1066],"class_list":["post-4493","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-target"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-1at","jetpack-related-posts":[{"id":9387,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/07\/29\/this-week-in-tech-677-to-serve-cat\/","url_meta":{"origin":4493,"position":0},"title":"This Week in Tech 677: To Serve Cat","author":"NCCT","date":"July 29, 2018","format":false,"excerpt":"https:\/\/youtu.be\/9koTMZi05pk This Week in Tech Facebook's stock crash, Tesla surfboards, Russia hacks utilities, and more. -- Jason Calacanis tells us what's going on with his buddy Elon Musk. -- Apple fixes the MacBook Pro's throttling issue. -- Facebook and Twitter stock takes a dive over poor growth numbers, but Google\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/9koTMZi05pk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9405,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/10\/07\/odorless-and-weightless-hackers-this-week-in-tech-687\/","url_meta":{"origin":4493,"position":1},"title":"Odorless and Weightless Hackers &#8211; This Week in Tech 687","author":"NCCT","date":"October 7, 2018","format":false,"excerpt":"https:\/\/youtu.be\/lb4rnqfNdas Chinese Spy Chips, Microsoft Highs and Lows, Pixel 3 Event Predictions, and More! Bloomberg reports that China used tiny chips to spy on Apple, Amazon, and the US government. Apple and Amazon deny it. How do we know who is right? All the news from the Microsoft Surface event,\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/lb4rnqfNdas\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9364,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/06\/03\/this-week-in-tech-669-15-minutes-of-fun\/","url_meta":{"origin":4493,"position":2},"title":"This Week in Tech 669: 15 Minutes of Fun","author":"NCCT","date":"June 3, 2018","format":false,"excerpt":"https:\/\/youtu.be\/KQc0YlNQNfY --Apple's WWDC this week looks like it may be a disappointment for anyone hoping for new hardware. --Facebook is killing its \"Trending Topics\" section. --Teens prefer Instagram and Snapchat to Facebook; close to half are \"almost constantly\" online. --The Atari VCS is coming soon for expensive retro gaming. --Scooters\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/KQc0YlNQNfY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9522,"url":"https:\/\/nccomputertech.com\/techtalk\/2019\/02\/24\/will-it-bend-this-week-in-tech-707\/","url_meta":{"origin":4493,"position":3},"title":"Will It Bend? &#8211; This Week in Tech 707","author":"NCCT","date":"February 24, 2019","format":false,"excerpt":"https:\/\/youtu.be\/qC0DabXmX8Q Folding phones at MWC, Hololens 2, conspiracies on YouTube, and more. -- Foldable Phones Hit MWC 2019 -- Microsoft Announces Hololens 2 -- Netflix at the Oscars -- Apple and Goldman Sachs Release Credit Card Linked to iPhone -- Apple to Combine iPhone, iPad and Mac Apps -- YouTube:\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/nccomputertech.com\/techtalk\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/qC0DabXmX8Q\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9886,"url":"https:\/\/nccomputertech.com\/techtalk\/2024\/12\/08\/12gb-vram-10-faster-than-4060-and-only-249-intel-arc-battlemage-is-going-to-be-nuts\/","url_meta":{"origin":4493,"position":4},"title":"12GB VRAM, 10% faster than 4060 and only $249?? Intel ARC Battlemage is going to be nuts!","author":"NCCT","date":"December 8, 2024","format":false,"excerpt":"https:\/\/youtu.be\/K9fUlvOsxCI Intel dropped the details on the new Xe2 GPUs, the B570 and B580 GPUs... aggressively priced and targeting the 1440p gaming resolution, will these be competitive options outside of AMD and NVIDIA?","rel":"","context":"In &quot;Hardware&quot;","block_context":{"text":"Hardware","link":"https:\/\/nccomputertech.com\/techtalk\/category\/hardware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/K9fUlvOsxCI\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9936,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/nvidia-is-at-it-again-more-crumbs-for-gamers\/","url_meta":{"origin":4493,"position":5},"title":"NVIDIA is at it again&#8230; More &#8220;crumbs&#8221; for gamers&#8230;","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/cBeQWEtBB0k 5060 and 5060Ti Rumors seem to be very plausible... and if these rumors are true then you should avoid them at all costs...","rel":"","context":"In &quot;Hardware&quot;","block_context":{"text":"Hardware","link":"https:\/\/nccomputertech.com\/techtalk\/category\/hardware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/cBeQWEtBB0k\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/4493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=4493"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/4493\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=4493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=4493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=4493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}