blackhat

Cubby

IRL Name: 
Mark Caparelli
Biography: 

Mark Caparelli is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he engaged in a so-called “Apple call-in” scheme in which he used stolen credit cards and social engineering skills to fraudulently obtain replacement products from Apple Inc., which he then resold for profit.The scheme involved Caparelli obtaining serial numbers of Apple products he had not bought. He would then call Apple with the serial number, claim the product was defective, arrange for a replacement product to be sent to an address he designated, and give Apple a stolen credit card number to charge if he failed to return the purportedly defective product."

References

iAlert, Jason Kato

IRL Name: 
Lee Jason Jeusheng
Biography: 

Lee Jason Jeusheng is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Joshua Hicks a.k.a OxideDox each sold dumps which is a term used by carders to refer to stolen credit card data in a form in which the data is stored on the magnetic strips on the backs of credit cards."

References

OxideDox

IRL Name: 
Joshua Hicks
Biography: 

OxideDox is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and and Lee Jason Jeusheng a.k.a 'iAlert' / 'Jason Kato', each sold dumps which is a term used by carders to refer to stolen credit card data in a form in which the data is stored on the magnetic strips on the backs of credit cards".

References

Badoo

IRL Name: 
Ali Hassan
Biography: 

Ali Hassan a.k.a Badoo is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he also sold fulls, a term used by carders to refer to full credit card data including cardholder name, address, Social Security number, birthdate, mother’s maiden name, and bank account information."

References

kool+kake

IRL Name: 
Alex Hatala
Biography: 

kool+kake is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Steven Hansen a.k.a theboner1, sold stolen C-V-V's, a term used by carders to refer to credit card data that includes the name, address, and zip code of the card holder, along with the card number, expiration date, and security code printed on the card."

References

theboner1

IRL Name: 
Steven Hansen
Biography: 

theboner1 is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he and Alex Hatala a.k.a kool+kake, sold stolen C-V-V's, a term used by carders to refer to credit card data that includes the name, address, and zip code of the card holder, along with the card number, expiration date, and security code printed on the card."

References

JoshTheGod

IRL Name: 
Mir Islam
Biography: 

JoshTheGod is a member of the group “UGNazi,” which has claimed credit for numerous recent online hacks and that he is the founder of “Carders.Org,” a carding forum on the Internet. He was arrested together with Cosmo and other carders in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he trafficked in stolen credit card information and possessed information for more than 50,000 credit cards. Islam was placed under arrest after he attempted to withdraw illicit proceeds from an ATM using one of the cards."

Pictures: 
References

xVisceral

IRL Name: 
Michael Hogue
Biography: 

xVisceral is one of the guys who was arrested in a multi-state FBI sting targeting credit card fraud and other services that could facilitate carding activity. (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he offered malware for sale, including remote access tools (RATs) that allowed the user to take over and remotely control the operations of an infected victim-computer. Hogue’s RAT, for example, enabled the user to turn on the web camera on victims’ computers to spy on them and to record every keystroke of the victim-computer’s user. If the victim visited a banking website and entered his or her user name and password, the key logging program could record that information, which could then be used to access the victim’s bank account. "

References

zer0, zer0iq

IRL Name: 
Jarand Moen Romtveit
Biography: 

Jarand Moen Romtveit a.k.a zer0 is one of the carders who was arrested in a multi-state FBI sting targeting credit card fraud (International Cyber Crime Takedown 2012). According to a two-year FBI Undercover Carding Operation report, "he used hacking tools to steal information from the internal databases of a bank, a hotel, and various online retailers, and then sold the information to others."

References

Cosmo, CosmotheGod

Biography: 

Cosmo a.k.a CosmotheGod is a social-engineering mastermind who weaseled his way past security systems at Amazon, Apple, AT&T, PayPal, AOL, Netflix, Network Solutions, and Microsoft (year 2012) at the age of 15. With his group, UGNazi (short for “underground nazi” and pronounced “you-gee” not “uhg”), Cosmo took part in some of the most notorious hacks of the year (2012). Throughout the winter and spring, they DDoS’ed all manner of government and financial sites, including NASDAQ, ca.gov, and CIA.gov, which they took down for a matter of hours in April. They bypassed Google two step, hijacked 4chan’s DNS and redirected it to their own Twitter feed, and repeatedly posted Mayor Michael Bloomberg’s address and Social Security number online. After breaking into one billing agency using social-engineering techniques this past May, they proceeded to dump some 500,000 credit card numbers online. Cosmo was the social engineer of the crew, a specialist in talking his way past security barriers. His arsenal of tricks held clever-yet-idiot-proof ways of getting into accounts on Amazon, Apple, AOL, PayPal, Best Buy, Buy.com, Live.com (think: Hotmail, Outlook, Xbox) and more. He was able to hijack phone numbers from AT&T, Sprint, T-Mobile and your local telco.

References
Syndicate content