What Really Happens After Your Credit Card Is Stolen

After a hacker steals your credit card number, you may receive an email, text or phone call from your bank to alert you of criminal or fraudulent activity with your credit card. This is a helpful and necessary measure implemented by financial institutions to help protect your accounts. However, sometimes the alert is too late and the cybercriminal has already replicated your card and gone on a shopping spree. Have you wondered though, what exactly happens to your stolen credit card number, and what is it worth to a criminal? Well, we took a peek inside the cybercriminal underground to explore this interesting and frightening reality.

Cybercriminals have to race against the clock to use your credit card information before you or your bank shuts down the card. So, where does a stolen credit card go when it gets into the wrong hands?

What Happens to Stolen Credit Card Info

Credit card thieves have to move fast once they have your data. Here’s a look at their methods:

  1. They take your stolen card data and add it to their stockpile.

  2. They sell a group of credit card numbers to other cybercriminals on websites designed to process these transactions (think of it as an eBay for eVil).

  3. The buyer of the group may resell them again or begin using the stolen data at online retailers.

  4. The criminals also have hardware on hand to print fake plastic cards in case they want to use the them at physical stores.

  5. The criminals make purchases of goods that they can resell for quick cash.

How Criminals Price Cards

Once they have your card data, the criminals selling the info have to price it. And not all credit cards are worth the same price to criminals who are buying. Here’s how they determine what’s “good.”

  1. The criminal who wants to purchase a batch of cards may make a few small transactions to test if the card is still active, or known as “live.”

  1. If the card is sold with the victim’s address and additional information can be appended to it, such as mother’s maiden name, SSN and date of birth, those additional details make the card more valuable.

  1. If the criminal selling the card can also provide purchasing behaviors, that’s even better. For example, the behavior data may indicate that you routinely used your card at Target and Lowes in South Carolina. By adding your shopping habits to the card, the card is worth even more money because the criminals know that the victim or financial institution might miss a fraudulent charge if they can pretend they are you and shop like you in your hometown.

Eventually, the card data reaches the hands of criminals who can use the cards and associated data to commit fraud. Armed with these stolen cards, the criminals have the tools to make fraudulent purchases of goods that can be resold, including gift cards and consumer electronics. Once those goods are sold, the value of the card is realized. All of the intermediate reselling of card data in the supply chain hinges on the ultimate purchase and reselling of goods in this process.