Credit card skimmers target shopping websites popular with Singaporeans, 1,700 cards for sale on Dark Web

Credit card skimmers target shopping websites popular with Singaporeans, 1,700 cards for sale on Dark Web

SINGAPORE - A skimming software is said to have infected multiple e-commerce websites that are frequented by Singaporeans, resulting in the data of more than 1,700 credit cards being stolen and sold on the dark web in a single database - one of the biggest cases here. 


Singapore-based cyber security firm Group-IB said that this database is one of the many that have contributed to the 26,102 compromised payment cards issued by Singapore banks that it has found sold on the dark web from January to August this year. The estimated underground value of these cards is US$1.8 million (S$2.5 million).


The firm said that online card skimmers use malicious software designed to intercept payment card details from infected websites and sell the data on the dark web, which is a part of the Internet that is accessible only through special software, allowing users to remain anonymous or untraceable.








The case involving the e-commerce websites contained details belonging to 1,726 payment cards issued by Singapore banks. 


Group-IB said this figure is significant because on average, the number of compromised credit cards related to Singapore in a single database uploaded on the dark web rarely exceeds several hundred cards, based on its review period of January to August.


When asked by The Straits Times what were the infected e-commerce websites, the firm declined to reveal them but did say that they were websites frequented by Singaporeans and are based both locally and overseas.







Singaporeans are known to shop on e-commerce websites, be it those based here like Shoppee and Lazada, or those based overseas, like Amazon, eBay and Taobao. A study by online saving platform Flipit in 2017 showed that three in five Singaporeans shop online. 

Group-IB said the database in q ..

Support the originator by clicking the read the rest link below.