
{"id":1967,"date":"2012-06-29T00:00:00","date_gmt":"2012-06-29T00:00:00","guid":{"rendered":"http:\/\/otava.test\/international-credit-card-data-theft-operation-revealed\/"},"modified":"2012-06-29T00:00:00","modified_gmt":"2012-06-29T00:00:00","slug":"international-credit-card-data-theft-operation-revealed","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/","title":{"rendered":"International Credit Card Data Theft Operation Revealed"},"content":{"rendered":"<p>A two-year FBI operation led to the arrest of 24 credit cardholder data thieves from eight different countries &#8211; the crime ring, dubbed \u201cOperation Card Shop,\u201d involved the buying and selling of stolen identities, credit cards, counterfeit documents and hacking tools, according to DarkReading.com.<\/p>\n<p>One defendant sold malware with remote access tools that allowed hackers to view and remotely control an infected computer. If the user visited a banking website and logged into their account, the hacker could record and use the information to access their account and resources.<\/p>\n<p>Another hacker stole data from internal databases of banks, hotels and several online retailers, and mistakenly sold the credit cardholder data to an undercover FBI agent. Another defendant had information for more than 50,000 credit card accounts that he used to sell counterfeit encoded credit cards. One hacker sold information he stole by hacking into an online hotel booking site &#8211; including cardholder names, addresses, Social Security numbers, birthdates, mother\u2019s maiden names and bank account information.<\/p>\n<p>The massive crime ring exemplifies the need to secure databases and credit cardholder data by using a multi-layered approach &#8211; the requirements of PCI DSS compliance address many vulnerabilities and areas that can be secured with the right technology. PCI technical requirements include (but might not be limited to):<\/p>\n<ul>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Antivirus<\/a><\/li>\n<li>OS <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Patch Management<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/cloud-backup\/\">Backup<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\">Disaster Recovery<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">SSL Certificate<\/a><\/li>\n<li><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">File Integrity Monitoring<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Web Application Firewall<\/a><\/li>\n<li>Encryption<\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Two-Factor Authentication<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Vulnerability Scanning<\/a><\/li>\n<li><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">Log Monitoring<\/a><\/li>\n<\/ul>\n<p>If you outsource your application and data hosting to a <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">PCI compliant hosting<\/a> provider that can prove their attestation of compliance, you can ensure credit cardholder data is safe in <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/pci-compliant-data-centers\">PCI compliant data centers<\/a>. What\u2019s a PCI compliant data center? It\u2019s one that has all of the needed physical and logical security in place, and has been audited and found to be in full compliance.<\/p>\n<p>For additional PCI resources, read:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/clarifying-levels-of-pci-compliance\/\">What is PCI Compliance?<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">Levels of PCI Compliance<\/a><br \/>\n<a href=\"https:\/\/www.onlinetech.com\/resources\/e-tips\/pci-compliance\/pci-compliant-hosting-guide\">PCI Compliant Hosting Guide<\/a><br \/>\n<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/pci-compliant-hosting\/resources\/who-needs-to-be-pci-compliant\">Who Needs to Be PCI Compliant?<\/a><br \/>\n<a href=\"https:\/\/www.onlinetech.com\/resources\/e-tips\/pci-compliance\/risk-assessments-for-the-pci-compliant-cloud\">Risk Assessments for the PCI Compliant Cloud<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.darkreading.com\/database-security\/167901020\/security\/attacks-breaches\/240002781\/manhattan-u-s-attorney-fbi-assistant-director-in-charge-announce-24-arrests-in-eight-countries-as-part-of-international-cyber-crime-takedown.html\">Manhanttan U.S. Attorney, FBI Assistant Director in Charge Announce 24 Arrests in Eight Countries as Part of International Cyber Crime Takedown<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A two-year FBI operation led to the arrest of 24 credit cardholder data thieves from eight different countries &#8211; the crime ring, dubbed \u201cOperation Card Shop,\u201d involved the buying and selling of stolen identities, credit cards, counterfeit documents and hacking tools, according to DarkReading.com. One defendant sold malware with remote access tools that allowed hackers to view and remotely control an infected computer. If the user visited a banking website and logged into their account, the hacker could record and use the information to access their account and resources. Another hacker stole data from internal databases of banks, hotels and several online retailers, and mistakenly sold the credit cardholder data to an undercover FBI agent. Another defendant had information for more than 50,000 credit card accounts that he used to sell counterfeit encoded credit cards. One hacker sold information he stole by hacking into an online hotel booking site &#8211; including cardholder names, addresses, Social Security numbers, birthdates, mother\u2019s maiden names and bank account information. The massive crime ring exemplifies the need to secure databases and credit cardholder data by using a multi-layered approach &#8211; the requirements of PCI DSS compliance address many vulnerabilities and areas that can be secured&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-1967","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>International Credit Card Data Theft Operation Revealed | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"International Credit Card Data Theft Operation Revealed\" \/>\n<meta property=\"og:description\" content=\"A two-year FBI operation led to the arrest of 24 credit cardholder data thieves from eight different countries &#8211; the crime ring, dubbed \u201cOperation Card Shop,\u201d involved the buying and selling of stolen identities, credit cards, counterfeit documents and hacking tools, according to DarkReading.com. One defendant sold malware with remote access tools that allowed hackers to view and remotely control an infected computer. If the user visited a banking website and logged into their account, the hacker could record and use the information to access their account and resources. Another hacker stole data from internal databases of banks, hotels and several online retailers, and mistakenly sold the credit cardholder data to an undercover FBI agent. Another defendant had information for more than 50,000 credit card accounts that he used to sell counterfeit encoded credit cards. One hacker sold information he stole by hacking into an online hotel booking site &#8211; including cardholder names, addresses, Social Security numbers, birthdates, mother\u2019s maiden names and bank account information. The massive crime ring exemplifies the need to secure databases and credit cardholder data by using a multi-layered approach &#8211; the requirements of PCI DSS compliance address many vulnerabilities and areas that can be secured...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-29T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"International Credit Card Data Theft Operation Revealed\",\"datePublished\":\"2012-06-29T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/\"},\"wordCount\":363,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/\",\"url\":\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/\",\"name\":\"International Credit Card Data Theft Operation Revealed | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2012-06-29T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"International Credit Card Data Theft Operation Revealed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"International Credit Card Data Theft Operation Revealed | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/","og_locale":"en_US","og_type":"article","og_title":"International Credit Card Data Theft Operation Revealed","og_description":"A two-year FBI operation led to the arrest of 24 credit cardholder data thieves from eight different countries &#8211; the crime ring, dubbed \u201cOperation Card Shop,\u201d involved the buying and selling of stolen identities, credit cards, counterfeit documents and hacking tools, according to DarkReading.com. One defendant sold malware with remote access tools that allowed hackers to view and remotely control an infected computer. If the user visited a banking website and logged into their account, the hacker could record and use the information to access their account and resources. Another hacker stole data from internal databases of banks, hotels and several online retailers, and mistakenly sold the credit cardholder data to an undercover FBI agent. Another defendant had information for more than 50,000 credit card accounts that he used to sell counterfeit encoded credit cards. One hacker sold information he stole by hacking into an online hotel booking site &#8211; including cardholder names, addresses, Social Security numbers, birthdates, mother\u2019s maiden names and bank account information. The massive crime ring exemplifies the need to secure databases and credit cardholder data by using a multi-layered approach &#8211; the requirements of PCI DSS compliance address many vulnerabilities and areas that can be secured...","og_url":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/","og_site_name":"OTAVA","article_published_time":"2012-06-29T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"International Credit Card Data Theft Operation Revealed","datePublished":"2012-06-29T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/"},"wordCount":363,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/","url":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/","name":"International Credit Card Data Theft Operation Revealed | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2012-06-29T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/international-credit-card-data-theft-operation-revealed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"International Credit Card Data Theft Operation Revealed"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1967"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1967\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1967"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}