10202221 - Master - Cyber Pandemic Training Book.pdf

What Happens Post Data Exfiltration?

Once a threat actor obtains data and scans the data for important/valuable information, they will either utilize this data for their own personal gain or sell it to a 3 rd party. Credit cards and payment details are the most sought-after marketplace goods on the deep and dark web. • 3 rd parties, or “brokers”, will buy the card details from a marketplace and resell them to a “carder”. • Carders will spend as much funds as possible before the respective owner and/or bank discovers the compromise. • Oftentimes carders will buy online gift cards and then use these to purchase electronics, which can be quickly resold due to high demand.

20

Made with FlippingBook - Online catalogs