Download presentation
Presentation is loading. Please wait.
Published byMyron Walters Modified over 9 years ago
1
Phishing to Fraud What if they don’t want one person’s account? Lee Heath (madhat@gmail.com)
2
Phishing to Fraud Introduction The Phishing Hole New Targets – Beyond Banks Fraud Cash Cracking Downfall
3
Phishing to Fraud Phishing Fraud Credit Cards – Sources – Card Not Present – Carding – BINs – CCV/CVC
4
Phishing to Fraud Phishing Hole – Compromised Server – Old School – Extremely Common – More Obvious Phishing Hole – Phished/New Hosting Account – Brandjacking – Register.com – GoDaddy – Yahoo! Scripting Packageify it…
5
Phishing to Fraud Payment Processors – PayPal – BoA Merchant Services – Chase Paymentech – Intuit Payment Solutions – Merchant One Hosting/Registrars – GoDaddy – Register.com – Intuit – Yahoo! Vulnerability Assessment Providers – Qualys – Trustwave
6
Phishing to Fraud How are the CC’s used? – Purchasing – Selling to card numbers – Cash How to get Cash? – Refunds – Transfers – Phishing
7
Phishing to Fraud Payment Processors – Credit Card No. Generation – Cracking CVV/CVC – Carding – BIN Attacks
8
Phishing to Fraud How they get caught… – Trending – Referencing Hosted Data Images Javascript CSS What is wrong with this picture? – Too many transactions per second – Too many authorizations – Sudden increase in cost to the victim merchant
9
Phishing to Fraud Conclusion
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.