Cam Harrison, also known as "kilobit," is a former prominent carder who spent eight years in prison for his role in a massive cybercrime operation. He shares his thrilling journey from a curious teenager to a skilled creator of counterfeit IDs, navigating shady forums and the moral dilemmas of a life steeped in deception. Cam details the reckless allure of cybercrime, the complexities of running a carding operation, and the sobering encounters with law enforcement that led to his fall, ultimately reflecting on the quest for redemption after a glamorous yet hollow lifestyle.
Cam began his criminal journey by cashing out stolen credit cards and gradually expanded his activities to include stealing credit card data, engaging in phishing scams, and buying/selling card details in bulk.
Cam constantly adapted and improved his carding techniques to stay ahead of law enforcement, utilizing stolen credit card data to encode blank cards, and finding ways to cash out the stolen cards using various methods like Western Union transfers and ATMs.
Despite facing legal consequences, Cam's time in jail did not deter him from returning to his criminal activities, where he honed his techniques, expanded his criminal network, and targeted small businesses with weak security measures to steal credit card data and engage in phishing scams.
Deep dives
Cam's Criminal Journey Begins
Cam's criminal journey began when he got involved in cashing out stolen credit cards. He started by making fake IDs and cashing out Western Union transfers, eventually expanding to using ATMs to withdraw money. Cam's skills and contacts in the criminal world grew, and he began stealing credit card data himself. He targeted small businesses that lacked strong security measures and used public Wi-Fi to gain access to their networks. With the stolen credit cards, he would buy and sell card details in bulk, using different methods to cash them out. His operation grew, and he even engaged in phishing scams to obtain people's login credentials. Despite a brief hiatus after getting caught for underage drinking, Cam's desire for money and reputation drew him back into the criminal world.
The Challenges of Carding
Cam faced various challenges in his carding operation. He had to constantly adapt and improve his techniques to stay ahead of law enforcement. Cam utilized stolen credit card data to buy blank credit cards, which he would then encode with the stolen information using software like DCDX. He found ways to cash out the stolen cards using Western Union transfers or ATMs, and even employed social engineering tactics to overcome potential obstacles. However, Cam's criminal activities carried significant risks, including the constant threat of being caught by law enforcement.
Lessons Learned and Further Expansion
Despite facing legal consequences, Cam's time in jail was not enough to deter him from returning to his criminal activities. He resumed his operations, taking cautionary measures to avoid detection. Cam honed his techniques, such as phishing scams and cashing out at ATMs, and built a network of contacts within the criminal underworld. He was driven by the excitement, the money, and the reputation he gained within the community. Over time, Cam expanded his criminal endeavors, involving others and improving his efficiency in carding and cashing out stolen credit cards.
Targeting Small Businesses and Network Intrusions
Cam shifted his focus to targeting small businesses that processed credit card payments. He identified businesses with weak security measures, visiting them to assess their Wi-Fi networks. By connecting to their public Wi-Fi, he could gain access to their internal networks and search for vulnerable machines, potentially compromising their cash register systems. This allowed him to steal credit card data directly from these businesses. With the stolen information, Cam continued his carding activities, buying and selling card details in bulk, while also engaging in phishing scams to obtain login credentials and further expand his criminal operation.
Finding vulnerable cash registers through remote desktop port
A hacker named Cam targets cash registers with open ports, specifically the remote desktop protocol (RDP) port. By scanning multiple stores, Cam gains access to a cash register at a barber shop and proceeds to copy credit card data from the computer. Cam utilizes Hydra, a brute force password guessing tool, to crack passwords and gain unauthorized access. This method allows him to build a database of stolen credit cards, which he later uses for financial gain.
Expanding operations: Automated hacking and scaling up
Cam's hacking operation expands as he acquires a list of IP addresses belonging to small businesses with vulnerable RDP connections. He uses Hydra to automate password cracking attempts on these computers remotely. With successful password guesses, Cam gains access to computers processing credit card transactions, downloads the credit card data stored within, and closes the connection. This enables Cam to accumulate a large number of stolen credit cards and withdraw cash from ATMs, often traveling to different locations to avoid suspicion. However, the high-stakes and stress associated with his illegal activities ultimately take a toll on him.
This is the story of Cam Harrison, aka “kilobit” and his rise and fall as a prominent carder.
Sponsors
Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
Support for this episode comes from Oracle for Startups. Oracle for Startups delivers enterprise cloud at a startup price tag, with free cloud credits and 70% off industry-leading cloud services to help you reel in the big fish—confidently. To learn more, visit Oracle.com/goto/darknet.