Digital criminals posted customers’ payment card details exposed in the 2019 Wawa data breach for sale on a dark web marketplace.
In December 2019, the Joker’s Stash first announced what it called the “BIGBADABOOM-III” breach.
Advertisements posted by the dark web marketplace announced that the breach included over 30 million payment card details exposed in a nationwide security incident that allegedly affected over 40 states. They said that the breach also contained an additional one million payment card records from Europe, Asia and elsewhere.
Upon learning of BIGBADABOOM-III, Gemini Advisory decided to investigate the origins of the breach. The security firm ultimately traced its point of compromise to a 2019 security incident involving Wawa.
Back in mid-December, Wawa announced that it had discovered malware on its payment processing systems earlier in the month. A subsequent investigation determined that the malware could have exposed as many as 30 million payment cards used at all 850 of Wawa’s U.S. gas station and convenience store locations between March 4, 2019 and early December, 2019.
Gemini Advisory analyzed the initial set of data released for BIGBADABOOM-III and found that it contained approximately 100,000 records. Most of those linked back to cardholders located in the United States, with Florida and Pennsylvania receiving the greatest share of the exposure. A minority of cards belonged to consumers in Latin America, Asia and elsewhere.
The average price of a U.S. record offered in the breach was $17, while international records went for as high as $210.
In a blog post detailing its findings, Gemini Advisory explained that BIGBADABOOM-III fit the model of what Joker’s Stash has done with some of its other advertised breaches:
Notably, major breaches of this type often have low demand in (Read more…)
Click here to go to the original author and source to this story.
Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .