So your bank has told you your card is compromised

Status
Not open for further replies.

retired1

Administrator
Admin
Supporting Member
ECF Veteran
Verified Member
Apr 5, 2013
50,732
45,039
Texas
In today's world, card compromises are an all too common occurrence. Many automatically assume that it's an online store that's responsible due to all the news reports of companies that have been compromised. While this may be a possibility, all too often users forget to do the basics when their bank notifies them of a card compromise.

The very first thing you should do upon being notified is run multiple scans of your computer. Even today, computer infections are a very common source of card compromises. There is malware specifically designed to look for and steal your personal information as well as your banking credentials. And your run of the mill anti-virus programs are very poor in detecting some of the specialized malware programs designed to steal your information. Especially if it's a rootkit.

So, what should you do?

First thing to do is run several scanners, the first being Malwarebytes.

Free Anti-Malware & Internet Security Software

This is a free program that's very good in detecting common malware infections.

In addition to Malwarebytes, download and run the following rootkit scanners.

GMER

GMER - Rootkit Detector and Remover

TDSSKiller

TDSSKiller Download

Rootkit Buster - (32 bit versions of Windows only)

Trend Micro RootkitBuster Download

The problem with rootkits is there are different ways of hiding them on your machine. Unfortunately, there's no "one size fits all" program that can detect all rootkits. This is why it's best to run several scanners just to make sure.

Hopefully, you'll come up with a clean bill of health after running several scans. So what now?

Unfortunately, your information that's been stolen can take anywhere from a couple of weeks to several months to show up on sites that sell stolen information. This makes trying to track down the possible source virtually impossible, especially if you tend to use your card regularly.

The source of the compromise could be anywhere. A skimmer in the teller machine you last used to get cash, a skimmer in the gas pump when you filled up, even Point of Sale terminals are a juicy target for criminals. Once infected, a Point of Sale terminal will cheerfully forward every single card's information to a collection server. Once the crooks decide they've amassed enough information to make the sale worthwhile, they then post the information on sites that specialize in stolen credit card info.

And to make things even worse, cash teller machines often run on vulnerable versions of Windows. There are thousands of machines out there that still run Windows XP. And we're not just talking about those independent machines you see in a gas station or tucked away in the corner of a mall. There are thousands of teller machines used by banks that haven't been updated yet.

There's not much you can do about infected PoS terminals. However, if you shop online, there are steps you can take to help protect your information.

Before you click that "order" button

If you're cautious and do your homework prior to ordering on the Internet, you can greatly decrease your chances of getting nailed.

Granted, there's no sure fire method of ensuring your information doesn't get stolen short of not using a card and paying cash for everything and disconnecting from the Internet entirely. These days, it's not a question of "if your information gets stolen", but when.
 
Last edited:

retired1

Administrator
Admin
Supporting Member
ECF Veteran
Verified Member
Apr 5, 2013
50,732
45,039
Texas
As I'm called upon to check computers for infections on a somewhat regular basis, I took a couple of USB sticks and created a tool set that can be extremely valuable.

The first one has a myriad of malware scan tools copied to it so all I have to do is plug the drive in and install from the stick.

The second stick has Hiren's Boot CD installed to it.

Download Hiren’s BootCD 15.2 | HBCD Fan & Discussion Platform

If you do ANY type of computer troubleshooting at all, this is an absolute "must have" in your tool kit arsenal.
 

LoriP1702

Ultra Member
ECF Veteran
Verified Member
As I'm called upon to check computers for infections on a somewhat regular basis, I took a couple of USB sticks and created a tool set that can be extremely valuable.

The first one has a myriad of malware scan tools copied to it so all I have to do is plug the drive in and install from the stick.

The second stick has Hiren's Boot CD installed to it.

Download Hiren’s BootCD 15.2 | HBCD Fan & Discussion Platform

If you do ANY type of computer troubleshooting at all, this is an absolute "must have" in your tool kit arsenal.
That's excellent advice. I've seen first hand (at work) that installed programs can become impossible to access or run. :(
I need to do this!!
 
  • Like
Reactions: bnrkwest

retired1

Administrator
Admin
Supporting Member
ECF Veteran
Verified Member
Apr 5, 2013
50,732
45,039
Texas
I'm running on Linux. Is there something special I should use? I assume all the others were for Windows, right?

For Linux, the choices are a bit more challenging as there are no auto removal tools. You'll either need to know how to remove such things manually, or be prepared to do a nuke and pave and start over from scratch.

Three tools to scan a Linux server for Malware and Rootkits

I got several things listed after a quick scan using GMER. Doesn't prompt me as to what to do with them tho......

Did it say there was rootkit activity found? Or was it just listing what it checked?

Trend rootkit buster doesn't run for win7 64....

From the download page:

Windows XP/Vista/7/8
Can only be used on 32-bit operating systems.
 

retired1

Administrator
Admin
Supporting Member
ECF Veteran
Verified Member
Apr 5, 2013
50,732
45,039
Texas

r77r7r

ECF Guru
ECF Veteran
  • Feb 15, 2011
    13,640
    22,585
    Pa,LandOfTaxes

    bnrkwest

    ECF Guru
    ECF Veteran
    Verified Member
    Sep 6, 2011
    10,873
    36,891
    Somewhere out there
    • Like
    Reactions: LoriP1702
    Status
    Not open for further replies.

    Users who are viewing this thread