A longtime reader recently asked: "How do online fraudsters get the 3-digit card verification value (CVV or CVV2) code printed on the back of customer cards if merchants are forbidden from storing this information? The answer: If not via phishing, probably by installing a Web-based keylogger at an online merchant so that all data that customers submit to the site is copied and sent to the attacker's server.
Kenneth Labelle, a regional director at insurer Burns-Wilcox.com, wrote:
"So, I am trying to figure out how card not present transactions are possible after a breach due to the CVV. If the card information was stolen via the point-of-sale system then the hacker should not have access to the CVV because its not on the magnetic strip. So how in the world are they committing card not present fraud when they don't have the CVV number? I don't understand how that is possible with the CVV code being used in online transactions."
First off, "dumps" -- or credit and debit card accounts that are stolen from hacked point of sale systems via skimmers or malware on cash register systems -- retail for about $20 apiece on average in the cybercrime underground. Each dump can be used to fabricate a new physical clone of the original card, and thieves typically use these counterfeits to buy goods from big box retailers that they can easily resell, or to extract cash at ATMs.
However, when cyber crooks wish to defraud online stores, they don't use dumps. That's mainly because online merchants typically require the CVV, criminal dumps sellers don't bundle CVVs with their dumps.
Read the rest of this article on KrebsonSecurity.com