Oct. 28, 2022, 11:56 p.m. | Dancho Danchev

Security Boulevard securityboulevard.com



Dear blog readers,



I've decided to share with everyone a currently active portfolio of E-Shops selling access to stolen credit cards including the necessary technical information to assist everyone in their cyber attack and cyber campaign attribution efforts. 
Sample screenshot includes:



Sample domains known to have been involved in the campaign include:

hxxp://ccgetmoney.com

hxxp://cvvshop.in
hxxp://cvvshop39.com
hxxp://evilshop.org
hxxp://shopccdumps.com
hxxp://trackgenerator.com
hxxp://validforver.com
hxxp://zunostores.com
hxxp://novlops.com
hxxp://pawnsh0p.com
hxxp://privatecvv.com
hxxp://privateshop1.com
hxxp://privateshop2.com
hxxp://selldumpsshop.com
hxxp://allmybins.com
hxxp://anyccard.com
hxxp://bases-valid.com
hxxp://batch-conf.com
hxxp://yalelodge.com
hxxp://vietnamworm.com
hxxp://freshcvv.com
hxxp://good-cvv.com
hxxp://dumpschecker.com
hxxp://jshop-pro.com
hxxp://dumpscvv2.com
hxxp://trdbz.com
hxxp://cyberxsh0p.net
hxxp://validmarket.biz …

analysis credit credit cards domains exposing selling stolen

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Solution Architect

@ Civica | London, England, United Kingdom

Information Security Officer (80-100%)

@ SIX Group | Zurich, CH

Cloud Information Systems Security Engineer

@ Analytic Solutions Group | Chantilly, Virginia, United States

SRE Engineer & Security Software Administrator

@ Talan | Mexico City, Spain