
Darknet Diaries
52: Magecart
Nov 26, 2019
Jonathan Kleinsma, Head of threat research at RiskIQ, discusses the alarming rise of credit card skimming, both at gas pumps and online. He delves into notable cyber heists by the Magecart groups, including the British Airways breach, which left millions exposed. Kleinsma highlights the vulnerabilities in e-commerce and the need for stringent security measures, urging website owners to adopt practices like content security policies to combat these evolving threats. He also sheds light on the dark web's role in the trafficking of stolen credit card information.
48:17
Episode guests
AI Summary
AI Chapters
Episode notes
Podcast summary created with Snipd AI
Quick takeaways
- Credit card skimming devices are being attached to gas pumps, while Magecart specializes in web skimming on e-commerce platforms.
- Implementing security measures and prioritizing web development security are crucial in protecting against credit card skimming.
Deep dives
Credit card skimming devices on gas pumps
Credit card skimming devices, small devices that can be attached to gas pumps, are used to steal credit card information. These devices are easy to install and can store a large amount of track data. Skimmer Carlos started planting them on gas pumps in Miami, Florida, and recruited others to help him use the stolen credit card data to buy gift cards. Eventually, they were caught and convicted of credit card fraud.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.