Presentation is loading. Please wait.

Presentation is loading. Please wait.

Phishing to Fraud What if they don’t want one person’s account? Lee Heath

Similar presentations


Presentation on theme: "Phishing to Fraud What if they don’t want one person’s account? Lee Heath"— Presentation transcript:

1 Phishing to Fraud What if they don’t want one person’s account? Lee Heath (madhat@gmail.com)

2 Phishing to Fraud Introduction The Phishing Hole New Targets – Beyond Banks Fraud Cash Cracking Downfall

3 Phishing to Fraud Phishing Fraud Credit Cards – Sources – Card Not Present – Carding – BINs – CCV/CVC

4 Phishing to Fraud Phishing Hole – Compromised Server – Old School – Extremely Common – More Obvious Phishing Hole – Phished/New Hosting Account – Brandjacking – Register.com – GoDaddy – Yahoo! Scripting Packageify it…

5 Phishing to Fraud Payment Processors – PayPal – BoA Merchant Services – Chase Paymentech – Intuit Payment Solutions – Merchant One Hosting/Registrars – GoDaddy – Register.com – Intuit – Yahoo! Vulnerability Assessment Providers – Qualys – Trustwave

6 Phishing to Fraud How are the CC’s used? – Purchasing – Selling to card numbers – Cash How to get Cash? – Refunds – Transfers – Phishing

7 Phishing to Fraud Payment Processors – Credit Card No. Generation – Cracking CVV/CVC – Carding – BIN Attacks

8 Phishing to Fraud How they get caught… – Trending – Referencing Hosted Data Images Javascript CSS What is wrong with this picture? – Too many transactions per second – Too many authorizations – Sudden increase in cost to the victim merchant

9 Phishing to Fraud Conclusion


Download ppt "Phishing to Fraud What if they don’t want one person’s account? Lee Heath"

Similar presentations


Ads by Google