Attackers have developed complex and successful methods to monetize the stolen card data once it’s been captured. Stolen payment card values are often warehoused and sold wholesale to other criminals who each have their own fraud network.
Common methods for monetizing stolen card data:
-Skimmed full track data and transaction information used to replicate a physical payment card, which can then be used for fraudulent transactions in face-to-face environments, or ATM transactions.
-Captured cardholder data is used where card-not-present transactions are accepted, such as e-commerce or mail order, telephone order transactions.
-Stolen cardholder data and sensitive authentication data are sold in bulk to other criminals who perform their own fraud using the stolen data.