Tuesday, January 28, 2025
HomeDark Web1 Million Payment Cards Data From South Korea Comes to Sale on...

1 Million Payment Cards Data From South Korea Comes to Sale on Darkweb for $24 USD

Published on

SIEM as a Service

Follow Us on Google News

Over 1 million payment card records that stolen from south Korea sold on the dark web market for the past few months and the price fixed approximately $24.

Cybercriminals posted the stolen records in Dark web since May 2019, and these stolen payment card data have been obtained from breach of a parent company that operates several different businesses.

Stolen data’s are South Korean-issued CP records, and the data believed to be leaked from point-of-sale (POS) integrator breach, where attackers possibly stole many merchants data.

Cyber attacks on E-commerce business are continuously growing in APAC, especially in South Korea, but the exact compromised point of purchase (CPP) remains unclear.

Based on the research report, 42,000 compromised South Korean-issued CP records posted for sale in the dark web in May 2019, 230,000 records in, June 2019 and 890,000 records were posted in the dark web in July month alone.

payment card

According to Gemini advisory research, This spike currently consists of over 1 million compromised South Korea-issued CP records posted for sale in the dark web since May 29, 2019. 

“Among these records, 3.7% of card records issued by the US. One of the most affected US financial institutions was a credit union that primarily serves the US Air Force; the Air Force maintains multiple air bases in South Korea.”

Card records posted on the dark web mostly belong to US cardholders since 1 million U.S visitors had been visited South Korea in the past 12 months.

Cybercriminals charging $40 for single payment card data and the price is higher than the median price of South Korean CP records across the dark web overall, which is approximately $24 in last year.

The researcher believes that card data was obtained from a POS integrator breach, if threat actor gained access to a single integrator service then they possibly gain access the individual POS devices that issued by integrator service.

Eventually, The threat actor would then have access to payment data from multiple sources, accounting for the lack of a common merchant among the compromised payment card.

you can read the 10 Important Components of PCI Compliance Checklist for Protecting the Customers Payment Card Data.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

Hackers Could Bypassing EDR Using Windows Symbolic Links to Disable Service Executables

A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own...

Microsoft Unveils Phishing Attack Protection for Teams Chat

Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing...

Apple Security Update – Patch for iOS Zero-day, MacOS & More

Apple has responded to a newly discovered zero-day vulnerability affecting its operating systems by...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in...

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious...

Threat Actor IntelBroker Allegedly Claiming Breach of Hewlett Packard Enterprise Data

A threat actor known as IntelBroker has taken to a prominent dark web forum...