DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Credit card fraud websites shut down on three continents

Posted on April 26, 2012 by Dissent

More shutdowns as law enforcement swoops in. Kevin Rawlinson reports:

Three men have been arrested and 36 criminal websites selling credit card information and other personal data shut down as part of a two-year international anti-fraud operation, police have confirmed.

The Serious Organised Crime Agency (SOCA), working with the FBI and US Department of Justice, as well as authorities in Germany; the Netherlands; Ukraine; Australia and Romania, swooped after identifying the sites as specialising in selling card and bank details in bulk.

Read more on The Independent.

Category: Of NoteUncategorized

Post navigation

← UK: After drive with client data sold on the Internet, Safe and Secure Insurance Services signs undertaking to improve data protection
Vermont Senate Approves Police Access To Drug Files →

2 thoughts on “Credit card fraud websites shut down on three continents”

  1. Jay says:
    April 27, 2012 at 6:50 pm

    The authorities are being way too soft here. They need to start closing down all websites that are selling credit card information and charging Internet Service Providers fines for hosting such sites. Once they begin doing that, the ISPs will start policing their customers for us. If the ISP is located in a shady jurisdiction and refuses to comply, block all of its websites. There won’t be many people who would want their websites to be hosted by an ISP whose servers are blocked in the Western world and eventually many other countries, who will feel compelled to join the blockade and not be seen as aiding and abetting cyber criminals.

    1. IA Eng says:
      April 30, 2012 at 8:00 am

      sorry doesn’t work that way; it’s easy to say do that, but what would YOU do if it was the only ISP in YOUR local area? Blocking ISP’s is not the answer. Shutting down the websites is not the answer, since it is soooo easy for a company to switch providers or simply move a website from one domain service to another. The only REAL way to turn the tap off is to remove the issue. These people hopefully will spend ALOT of time behind bars as an example. IF theyare guilty and spend time behind bars, it will definately make others think about doing the same thing.

      Blocking ISP’s can take the bottom dollar away from legitimate websites who try to do it as honestly as they can. The courts (and defense) would probably consider that a bit rash and civilians who pay the ISP could potentially sue the ISP and the entities that block their freedom of speech. Its more complicated than most people think.

      Its about building cases and making sure things stick in courts. In the past Law enforcement has had a hard time convincing the jury that the evidence in hand is enought to convict. Now, they ensure there is enough data, and that the case is pretty solid and the law wnforce agencies get a well deserved conviction and pat on the back.

      You can either blindly shoot and hope you dont miss or you can take a steady aim and take the big ones down. Remember, the buck doesn’t stop here – If they had warrants and seize capabilities, the websites or forums that WERE up are now in the hands of the authorities. You can bet that they are going through the list of visitors in the forums and ANY person that visited the forum casually just looking around. It builds a list of potential users and will ensure people who have, or are wanting to do this sort of illegal behavior constantly look over thier shoulders for at least a little while.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.