SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Downloaden Sie, um offline zu lesen
Ethical Hacking and
CountermeasuresCountermeasures
Version 6
Mod le LVIIIModule LVIII
Credit Card Frauds
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.wtoctv.com/
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.sfgate.com/
Module Objectives
This module will familiarize you with:
• E-Crime
• Credit Card Fraud
• Credit Card Generator
• Credit Card Fraud Detection
• Credit Card Prank
Ti M M d C di• Tips to Manage Money and Credit
• Best Practices
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
E-Crime Credit Card Prank
Credit Card Fraud Tips to Manage Money and Credit
Credit Card Fraud Detection Best Practices
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
E-Crime
E-crime is when a computer or other electronic communicationsE crime is when a computer or other electronic communications
devices (e.g. mobile phones) are used to commit an offence; be it
the target of an offence or act as a storage device in an offence
Source: http://www.netalert.gov.au/
Common offences committed via
E Crime:
• Credit Card Fraud
O li ti f d
E-Crime:
• Online auction fraud
• Computer Hacking
• Forwarding of Offensive/Menacing or Harassing
Emails
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Statistics
Source: http://www.idsafety.net/
2007
2008
Source: http://www cybersource com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.cybersource.com
Credit Card
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://i197.photobucket.com/
Credit Card FraudCredit Card Fraud
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Case Study
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.bfso.org.au/
Case Study
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.krollfraudsolutions.com/
Credit Card Fraud
Credit card fraud is a theft and fraud carried out using a credit card or any alike
t h i f k f f d t tipayment mechanism as a fake source for fund transaction
Common type of credit card fraud happens when an offender purchases an item
online or by telephone, by utilizing a credit card number that they have obtained
l f llunlawfully
These numbers can be obtained from:
• A credit card generator site on the Internet
• An unscrupulous retail merchant retaining credit card numbers processed
These numbers can be obtained from:
• An unscrupulous retail merchant retaining credit card numbers processed
through a retail outlet and using them unlawfully
• Offenders who utilize skimming machines to record multiple credit card
numbers via retail outlets
• Sourcing discarded copies of credit card vouchers via waste receptacles
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g p p
• Hacking into computers where credit card numbers are stored
Credit Card Fraud Over Internet
Credit Card Fraud Over Internet is a term used for unauthorized and
ill l f dit d t h t th I t tillegal use of a credit card to purchase property over the Internet
The fraudster uses the credit card or debit card of another person for
t titransaction
Types of fraud:
Credit Card Mail
Order Fraud
Chargeback
Fraud
Skimming
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Net Credit/Debit Card Fraud In The
US After Gross Charge-OffsUS After Gross Charge Offs
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.epaynews.com/
C dit C d G tCredit Card Generators
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Credit Card Generator
www.darkcoding.netwww.darkcoding.net
Credit Card Generator is a command line
h h h dPython program which uses PHP script and
JavaScript
It generates credit card numbers that are used
to test e-commerce sites
It generates 13 and 16 digit VISA, MasterCard,
and Amex numbers
If installed, it can steal passwords, credit card
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
numbers, and bank details
RockLegend’s !Credit Card
GeneratorGenerator
RockLegend’s !Credit Card Generator Generates/Validates
Credit card NumbersCredit card Numbers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Credit Wizard
www.creditcardgenerator.orgg g
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
C di C d F d D iCredit Card Fraud Detection
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
http://www.businessweek.com/
Credit Card Fraud Detection
Technique: Pattern DetectionTechnique: Pattern Detection
This technique identifies a person as a fraudster if:q p
Multiple orders are placed which are to be
delivered to the same address, but using, b g
different credit cards
Multiple orders are being sent from the
IP ddsame IP address
The credit card number varies by only a fewy y
digits
User repeatedly submits same credit card
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Use epeated y sub ts sa e c ed t ca d
number with different expiry dates
Credit Card Fraud Detection
Technique: Fraud ScreeningTechnique: Fraud Screening
It is a part of CyberSource Decision Manager
This technology is enhanced by Visa, which
provides fraud risk prediction scores by assessing
d i blover 150 order variables
These order variables include domestic andThese order variables include domestic and
international address validation, and domestic
and international IP address verification
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Credit Card Fraud Detection
Technique: Fraud Screening (cont’d)Technique: Fraud Screening (cont d)
Features:
• Shown to control fraud to as little as 0.5%
Features:
• Automatically identifies whether an order is valid or
potentially fraudulent in real time
• Patented global identity morphing detection
• Detailed, web-based reportsDetailed, web based reports
Benefits:
• Detects more single-event fraud as soon as it occurs
D t t f d t d i kl
Benefits:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Detects fraud trends more quickly
• Minimizes time, cost of manual review
Fraud Screening: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XCART: Online fraud Screening
ServiceService
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Card Watch
Card Watch is a UK banking industry initiative that aims to raise
awareness of card fraud prevention
It is managed by APACS, the UK payments association
• Providing fraud prevention training for retail staff through retailer training
programs and publications including the Spot & Stop Card Fraud training
The Card Watch prevents credit card fraud by:
programs and publications, including the Spot & Stop Card Fraud training
materials
• Encouraging staff vigilance and awareness to aid in the prevention of card
crime
• Providing fraud prevention advice for cardholders• Providing fraud prevention advice for cardholders
• Providing education and support to police and crime reduction officers
• Giving advice and assistance to other fraud prevention organizations such as
Crime stoppers
Running an annual card security initiative to increase awareness amongst
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Running an annual card security initiative to increase awareness amongst
the public and other relevant stakeholders
www.cardwatch.org.uk
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
MaxMind Credit Card Fraud
DetectionDetection
MaxMind's minFraud is a leading cross-industry and cross-platform fraud
d t ti l ti d b i i h d l d i tdetection solution powered by various in-house developed proprietary
technologies
It l d i k f t f h li t ti i l ti th tIt analyzes and scores risk factors for each online transaction in real-time so that
merchants can make better informed decisions, process more orders with less
staff, and reduce the amount of time spent on manual review
The minFraud service works in the background without the customer's
knowledge and does not require the customer to go through extra steps during
the checkout process
For example, if MaxMind detects suspicious activity from an IP address, it will
be flagged throughout the network in real-time, allowing for a more dynamic
d d ti h t f d d t ti
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
and adaptive approach to fraud detection
MaxMind Credit Card Fraud
Detection (cont’d)Detection (cont d)
Key Benefits
• Reduces chargebacks, losses from fraudulent orders, and fraud
attempts
• Mitigates the risks of selling cards worldwide where conventional
y
• Mitigates the risks of selling cards worldwide where conventional
card-authorization tools may not be available
• Saves on gateway and processing fees by filtering out fraudulent
orders
• Adds fraud detection capabilities for alternative payments likep b p y
PayPal and ACH
Key features
• Geographical IP address location checking
• High risk IP address and e-mail checking
Key features
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Issuing bank BIN Number country matching minFraud Network
• Post query analysis
www.maxmind.com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
3D Secure
3D Secure authentication requires cardholders to
register their card to take advantage of this service
It is a one time process which takes place on the card
issuer’s website and involves the cardholder answeringg
several security questions to which only the card issuer
and the cardholder have the answer
3D Secure can be thought of as an online version of
‘Chip and Pin’ technology, whereby the cardholder has
a personalized password registered with his/her card
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
p p g /
that is entered during the checkout process
Limitations of 3D Secure
3D Secure authentication should not be used as a complete3 p
fraud prevention tool, but should be used in conjunction with
existing fraud checks such as AVS and CVV2 to help minimize
your risk of fraud
Chargebacks can still occur even when they have been fully
th ti t d b D Sauthenticated by 3D Secure
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FraudLabs
FraudLabs is an XML-based service that validates online credit card
transactions
FraudLab’s web service screens and detects online credit card fraud
FraudLabs is a proven solution to prevent chargebacks and reduce fraud
for online merchants
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot 3
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
www.pago.de
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pago Fraud Screening Process
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
http://www.usdoj.gov/criminal/cybercrime/butcherIndict.htm
What to do if you are a Victim of
a Frauda Fraud
When you use a credit card, you can be vulnerable to fraud,y , y ,
whether you pay online, over the phone, or even in person at
your neighborhood grocery store
If you think you have been the victim of fraud or
a scam, immediately follow these steps:
• Close any affected accounts
• Change the passwords on all your online accountsg p y
• Place a fraud alert on your credit reports
• Contact the proper authorities
• Record and save everything
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facts to be Noted by Consumers
A thief goes through trash to find discarded receipts or carbons, and
then uses your account numbers illegally
A dishonest clerk makes an extra imprint from your credit or charge
card and ses it to make personal chargescard and uses it to make personal charges
You respond to a mail asking you to call a long distance number for aYou respond to a mail asking you to call a long distance number for a
free trip or bargain-priced travel package. You are told you must join a
travel club first and you are asked for your account number so you can
be billed. The catch! Charges you did not make are added to your bill,
and you never get your trip
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
and you never get your trip
Source: http://www.ftc.gov
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://chuckgallagher.wordpress.com
Best Practices
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Best Practices: Ways to Protect Your
Credit CardsCredit Cards
Sign your cards as soon as they arriveg y y
Never leave credit cards unattended
Protect your Personal Identification Number (PIN) or security code
Ch k d h t d t ft hCheck your card when returned to you after a purchase
Keep an eye on your card during the transaction, and get it back as quickly as
possiblep
Carry your cards separately from your wallet, in a zippered compartment, a
business card holder, or another small pouch
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Keep a record of your account numbers, their expiration dates, and the phone
number and address of each company in a secure place
Best Practices: Ways to Protect Your
Credit Cards (cont’d)Credit Cards (cont d)
Never sign a blank receiptg p
Report lost or stolen cards immediately
Destroy unwanted cards to avoid misuse
Maintain a list of all your cards and their respective numbers,
which is useful when lost or stolen cards are reported
i d b h h lNever give your card number over the phone unless you are
dealing with a reputable company
Report any questionable charges promptly and in writing to
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Report any questionable charges promptly and in writing to
the card issuer
Summary
E-Crime is a term used to classify investigation of criminal offences,
where computers or other electronic devices have been used in somewhere computers or other electronic devices have been used in some
manner to ease the commission of an offence
Theft and fraud carried out using a credit card or any alike payment
mechanism as a fake source of funds in a transaction
When you use a credit card, you can be vulnerable to fraud, whether
you pay online, over the phone, or even in person at your
neighborhood grocery storeneighborhood grocery store
Credit Card Generator software that generates credit card details to
fool the basic checks which certain online stores do when you pay for
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
fool the basic checks which certain online stores do when you pay for
goods
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Weitere ähnliche Inhalte

Was ist angesagt?

Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineeringVi Tính Hoàng Nam
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesVi Tính Hoàng Nam
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsVi Tính Hoàng Nam
 
Ce hv6 module 66 security convergence
Ce hv6 module 66 security convergenceCe hv6 module 66 security convergence
Ce hv6 module 66 security convergenceVi Tính Hoàng Nam
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introductionVi Tính Hoàng Nam
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksRohan Fernandes
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 

Was ist angesagt? (20)

Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
File000139
File000139File000139
File000139
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devices
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
File000149
File000149File000149
File000149
 
Ce hv6 module 66 security convergence
Ce hv6 module 66 security convergenceCe hv6 module 66 security convergence
Ce hv6 module 66 security convergence
 
Hacking3e ppt ch04
Hacking3e ppt ch04Hacking3e ppt ch04
Hacking3e ppt ch04
 
Hacking3e ppt ch09
Hacking3e ppt ch09Hacking3e ppt ch09
Hacking3e ppt ch09
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
Funsec3e ppt ch05
Funsec3e ppt ch05Funsec3e ppt ch05
Funsec3e ppt ch05
 
Hacking3e ppt ch01
Hacking3e ppt ch01Hacking3e ppt ch01
Hacking3e ppt ch01
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introduction
 
File000143
File000143File000143
File000143
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
The Bug Sweepers TSCM Guide
The Bug Sweepers TSCM GuideThe Bug Sweepers TSCM Guide
The Bug Sweepers TSCM Guide
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Security Wars
Security WarsSecurity Wars
Security Wars
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 

Ähnlich wie Ce hv6 module 58 credit card frauds

Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...Vesta Corporation
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummiesBACKSEATRIDER
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Kount
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechGeo Coelho
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International CommerceSecure Trading
 
How to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudHow to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudITIO Innovex
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The i-Capital Africa Institute
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
Fraud Detector - The easy-to-customize, high ROI, IT solution for detecting ...
Fraud Detector - The easy-to-customize, high ROI,  IT solution for detecting ...Fraud Detector - The easy-to-customize, high ROI,  IT solution for detecting ...
Fraud Detector - The easy-to-customize, high ROI, IT solution for detecting ...112Motion
 
Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Halo Metrics
 

Ähnlich wie Ce hv6 module 58 credit card frauds (20)

Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummies
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International Commerce
 
How to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudHow to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments Fraud
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Fraud Detector - The easy-to-customize, high ROI, IT solution for detecting ...
Fraud Detector - The easy-to-customize, high ROI,  IT solution for detecting ...Fraud Detector - The easy-to-customize, high ROI,  IT solution for detecting ...
Fraud Detector - The easy-to-customize, high ROI, IT solution for detecting ...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Atm theft
Atm theftAtm theft
Atm theft
 
Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!
 

Mehr von Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

Mehr von Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Ce hv6 module 58 credit card frauds

  • 1. Ethical Hacking and CountermeasuresCountermeasures Version 6 Mod le LVIIIModule LVIII Credit Card Frauds
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.wtoctv.com/
  • 3. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.sfgate.com/
  • 4. Module Objectives This module will familiarize you with: • E-Crime • Credit Card Fraud • Credit Card Generator • Credit Card Fraud Detection • Credit Card Prank Ti M M d C di• Tips to Manage Money and Credit • Best Practices EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 5. Module Flow E-Crime Credit Card Prank Credit Card Fraud Tips to Manage Money and Credit Credit Card Fraud Detection Best Practices EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. E-Crime E-crime is when a computer or other electronic communicationsE crime is when a computer or other electronic communications devices (e.g. mobile phones) are used to commit an offence; be it the target of an offence or act as a storage device in an offence Source: http://www.netalert.gov.au/ Common offences committed via E Crime: • Credit Card Fraud O li ti f d E-Crime: • Online auction fraud • Computer Hacking • Forwarding of Offensive/Menacing or Harassing Emails EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Statistics Source: http://www.idsafety.net/ 2007 2008 Source: http://www cybersource com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.cybersource.com
  • 8. Credit Card EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://i197.photobucket.com/
  • 9. Credit Card FraudCredit Card Fraud EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. Case Study EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.bfso.org.au/
  • 11. Case Study EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.krollfraudsolutions.com/
  • 12. Credit Card Fraud Credit card fraud is a theft and fraud carried out using a credit card or any alike t h i f k f f d t tipayment mechanism as a fake source for fund transaction Common type of credit card fraud happens when an offender purchases an item online or by telephone, by utilizing a credit card number that they have obtained l f llunlawfully These numbers can be obtained from: • A credit card generator site on the Internet • An unscrupulous retail merchant retaining credit card numbers processed These numbers can be obtained from: • An unscrupulous retail merchant retaining credit card numbers processed through a retail outlet and using them unlawfully • Offenders who utilize skimming machines to record multiple credit card numbers via retail outlets • Sourcing discarded copies of credit card vouchers via waste receptacles EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g p p • Hacking into computers where credit card numbers are stored
  • 13. Credit Card Fraud Over Internet Credit Card Fraud Over Internet is a term used for unauthorized and ill l f dit d t h t th I t tillegal use of a credit card to purchase property over the Internet The fraudster uses the credit card or debit card of another person for t titransaction Types of fraud: Credit Card Mail Order Fraud Chargeback Fraud Skimming EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 14. Net Credit/Debit Card Fraud In The US After Gross Charge-OffsUS After Gross Charge Offs EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.epaynews.com/
  • 15. C dit C d G tCredit Card Generators EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Credit Card Generator www.darkcoding.netwww.darkcoding.net Credit Card Generator is a command line h h h dPython program which uses PHP script and JavaScript It generates credit card numbers that are used to test e-commerce sites It generates 13 and 16 digit VISA, MasterCard, and Amex numbers If installed, it can steal passwords, credit card EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited numbers, and bank details
  • 17. RockLegend’s !Credit Card GeneratorGenerator RockLegend’s !Credit Card Generator Generates/Validates Credit card NumbersCredit card Numbers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Credit Wizard www.creditcardgenerator.orgg g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. C di C d F d D iCredit Card Fraud Detection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited http://www.businessweek.com/
  • 21. Credit Card Fraud Detection Technique: Pattern DetectionTechnique: Pattern Detection This technique identifies a person as a fraudster if:q p Multiple orders are placed which are to be delivered to the same address, but using, b g different credit cards Multiple orders are being sent from the IP ddsame IP address The credit card number varies by only a fewy y digits User repeatedly submits same credit card EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Use epeated y sub ts sa e c ed t ca d number with different expiry dates
  • 22. Credit Card Fraud Detection Technique: Fraud ScreeningTechnique: Fraud Screening It is a part of CyberSource Decision Manager This technology is enhanced by Visa, which provides fraud risk prediction scores by assessing d i blover 150 order variables These order variables include domestic andThese order variables include domestic and international address validation, and domestic and international IP address verification EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Credit Card Fraud Detection Technique: Fraud Screening (cont’d)Technique: Fraud Screening (cont d) Features: • Shown to control fraud to as little as 0.5% Features: • Automatically identifies whether an order is valid or potentially fraudulent in real time • Patented global identity morphing detection • Detailed, web-based reportsDetailed, web based reports Benefits: • Detects more single-event fraud as soon as it occurs D t t f d t d i kl Benefits: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Detects fraud trends more quickly • Minimizes time, cost of manual review
  • 24. Fraud Screening: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. XCART: Online fraud Screening ServiceService EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Card Watch Card Watch is a UK banking industry initiative that aims to raise awareness of card fraud prevention It is managed by APACS, the UK payments association • Providing fraud prevention training for retail staff through retailer training programs and publications including the Spot & Stop Card Fraud training The Card Watch prevents credit card fraud by: programs and publications, including the Spot & Stop Card Fraud training materials • Encouraging staff vigilance and awareness to aid in the prevention of card crime • Providing fraud prevention advice for cardholders• Providing fraud prevention advice for cardholders • Providing education and support to police and crime reduction officers • Giving advice and assistance to other fraud prevention organizations such as Crime stoppers Running an annual card security initiative to increase awareness amongst EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Running an annual card security initiative to increase awareness amongst the public and other relevant stakeholders
  • 27. www.cardwatch.org.uk EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. MaxMind Credit Card Fraud DetectionDetection MaxMind's minFraud is a leading cross-industry and cross-platform fraud d t ti l ti d b i i h d l d i tdetection solution powered by various in-house developed proprietary technologies It l d i k f t f h li t ti i l ti th tIt analyzes and scores risk factors for each online transaction in real-time so that merchants can make better informed decisions, process more orders with less staff, and reduce the amount of time spent on manual review The minFraud service works in the background without the customer's knowledge and does not require the customer to go through extra steps during the checkout process For example, if MaxMind detects suspicious activity from an IP address, it will be flagged throughout the network in real-time, allowing for a more dynamic d d ti h t f d d t ti EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and adaptive approach to fraud detection
  • 29. MaxMind Credit Card Fraud Detection (cont’d)Detection (cont d) Key Benefits • Reduces chargebacks, losses from fraudulent orders, and fraud attempts • Mitigates the risks of selling cards worldwide where conventional y • Mitigates the risks of selling cards worldwide where conventional card-authorization tools may not be available • Saves on gateway and processing fees by filtering out fraudulent orders • Adds fraud detection capabilities for alternative payments likep b p y PayPal and ACH Key features • Geographical IP address location checking • High risk IP address and e-mail checking Key features EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Issuing bank BIN Number country matching minFraud Network • Post query analysis
  • 30. www.maxmind.com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. 3D Secure 3D Secure authentication requires cardholders to register their card to take advantage of this service It is a one time process which takes place on the card issuer’s website and involves the cardholder answeringg several security questions to which only the card issuer and the cardholder have the answer 3D Secure can be thought of as an online version of ‘Chip and Pin’ technology, whereby the cardholder has a personalized password registered with his/her card EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p p g / that is entered during the checkout process
  • 32. Limitations of 3D Secure 3D Secure authentication should not be used as a complete3 p fraud prevention tool, but should be used in conjunction with existing fraud checks such as AVS and CVV2 to help minimize your risk of fraud Chargebacks can still occur even when they have been fully th ti t d b D Sauthenticated by 3D Secure EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. FraudLabs FraudLabs is an XML-based service that validates online credit card transactions FraudLab’s web service screens and detects online credit card fraud FraudLabs is a proven solution to prevent chargebacks and reduce fraud for online merchants EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. www.pago.de EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. Pago Fraud Screening Process EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited http://www.usdoj.gov/criminal/cybercrime/butcherIndict.htm
  • 40. What to do if you are a Victim of a Frauda Fraud When you use a credit card, you can be vulnerable to fraud,y , y , whether you pay online, over the phone, or even in person at your neighborhood grocery store If you think you have been the victim of fraud or a scam, immediately follow these steps: • Close any affected accounts • Change the passwords on all your online accountsg p y • Place a fraud alert on your credit reports • Contact the proper authorities • Record and save everything EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Facts to be Noted by Consumers A thief goes through trash to find discarded receipts or carbons, and then uses your account numbers illegally A dishonest clerk makes an extra imprint from your credit or charge card and ses it to make personal chargescard and uses it to make personal charges You respond to a mail asking you to call a long distance number for aYou respond to a mail asking you to call a long distance number for a free trip or bargain-priced travel package. You are told you must join a travel club first and you are asked for your account number so you can be billed. The catch! Charges you did not make are added to your bill, and you never get your trip EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and you never get your trip Source: http://www.ftc.gov
  • 42. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://chuckgallagher.wordpress.com
  • 43. Best Practices EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Best Practices: Ways to Protect Your Credit CardsCredit Cards Sign your cards as soon as they arriveg y y Never leave credit cards unattended Protect your Personal Identification Number (PIN) or security code Ch k d h t d t ft hCheck your card when returned to you after a purchase Keep an eye on your card during the transaction, and get it back as quickly as possiblep Carry your cards separately from your wallet, in a zippered compartment, a business card holder, or another small pouch EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Keep a record of your account numbers, their expiration dates, and the phone number and address of each company in a secure place
  • 45. Best Practices: Ways to Protect Your Credit Cards (cont’d)Credit Cards (cont d) Never sign a blank receiptg p Report lost or stolen cards immediately Destroy unwanted cards to avoid misuse Maintain a list of all your cards and their respective numbers, which is useful when lost or stolen cards are reported i d b h h lNever give your card number over the phone unless you are dealing with a reputable company Report any questionable charges promptly and in writing to EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Report any questionable charges promptly and in writing to the card issuer
  • 46. Summary E-Crime is a term used to classify investigation of criminal offences, where computers or other electronic devices have been used in somewhere computers or other electronic devices have been used in some manner to ease the commission of an offence Theft and fraud carried out using a credit card or any alike payment mechanism as a fake source of funds in a transaction When you use a credit card, you can be vulnerable to fraud, whether you pay online, over the phone, or even in person at your neighborhood grocery storeneighborhood grocery store Credit Card Generator software that generates credit card details to fool the basic checks which certain online stores do when you pay for EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited fool the basic checks which certain online stores do when you pay for goods
  • 47. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited