Tuesday, March 4, 2025
HomeCyber Security News1M Stolen Bank Credit/Debit Card Data Available For Free in Underground Markets

1M Stolen Bank Credit/Debit Card Data Available For Free in Underground Markets

Published on

SIEM as a Service

Follow Us on Google News

Recently, the threat intelligence team Group-IB along with the attribution system has discovered a post that is quite unusual, as it has been found in numerous carding panels in the underground forums.

After investigating it thoroughly, the experts found a user named AW_cards, who has posted a link that directly opens up to a file that is having stolen payment records of 1 million bank cards.

According to the report, the file was available for free and it has data from nearly 1000 banks from 100 different countries. However, the analysts have detected that there are countries like Mexico, Australia, Brazil, The US, India, and many more.

Data Stolen

As we said above that the file has been detected by the experts of the Group-IB team and reporter to GBHackers, and they have revealed the types of data that has been compromised by the hackers:-

  • Card number
  • Expiration date
  • CVV / CVC code
  • Name of the cardholder
  • Country
  • State
  • City
  • The address
  • Zipcode
  • Email
  • Phone numbers for some entries

All World Cards

The Group-IB, has gone through each and every detail of this finding, and they detected that the bank data that have been found were claimed to be of 2018-2019 data, but as per the experts, nearly 97% of the records in the database are still valid. 

The most interesting part of the investigation of Group-IB is that they have detected 810 expired cards, and out of which 30 of them expired in June 2021, and the rest 780 expired in July 2021.

All World Cards was initially recorded on the forum by the ekxperts of the Group-IB team on May 31, 2021, and All World Cards is an experimental credit card data marketplace.

Apart from this, the cybersecurity researchers discovered 3.8 million bank cards that were on sale during their whole investigation, and nearly 2.6 million of them are prepared for the purchase.

While the analysts of team Group-IB have also detected that the owners of the card shop were engaged on various forums that are utilizing two nicknames that are “AW_cards” and “AW_support.” 

The experts have claimed that the owners of the shop were active for 2 months, and nearly 400 messages were posted from both accounts.

According to the analysts of Group-IB, this case is quite unusual, as hackers are using new methods, and they have a total of 1 million cards allowed for free. 

However, this marketplace has come up with a new name and the actions of the owners of the card shop were the same who have developed new policies and sophisticated tactics.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...