Security News The Release of 4.6 Million Stolen Credit Cards by Black’s Stash

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
982
4,976
2,168
Germany
The notorious B1ack’s Stash dark web carding marketplace has made public its decision to release 4.6 million stolen credit cards, following the suspension of 8 million stolen CVV2 records due to policy violations.

This move comes as a result of sellers reselling card data purchased from B1ack’s Stash on competing platforms, violating the marketplace’s policies.
Details of the Released Data
The released data includes:

Full card numbers
Expiration dates
CVV2 codes
Cardholder names
Billing addresses
IP addresses

According to SOCRadar, they have validated the authenticity of some of the records and found that 4.3 million records appear to be new and potentially usable for illicit activities.
Geographic Distribution of the Leaked Records
Approximately 70% of the cards are from the US, while other countries include:

Canada
UK
France
Malaysia
This global distribution suggests that the dataset is not limited to a single regional operation, but rather draws from multiple skimming or phishing campaigns targeting English-speaking and high-purchasing-power markets.

Expected Consequences of the Released Records
The released cards are expected to fuel card-not-present (CNP) fraud activities, including illicit online purchases.

The accompanying information may also enable cybercriminals to:

Open fraudulent accounts
Apply for credit
Launch convincing phishing attacks
The richness of the leaked records poses significant risks, extending beyond simple card fraud to encompass potential identity theft and other malicious activities.

Implications and Recommendations
This development underscores the ongoing threat posed by dark web marketplaces and the need for continued vigilance in combating these illicit activities.
 
This kind of leak is a serious fraud risk, but a few points should be stated carefully.

What can be said with reasonable confidence

  • If a dataset really includes full card numbers, expiry dates, CVV2, names, and billing details, it would be highly useful for card-not-present fraud.
  • If some records are fresh and previously unseen, the fraud risk is higher because banks and merchants may not have already blocked them.
  • A large US share would be consistent with criminal interest in cards from high-volume online payment markets.

What should be treated cautiously

  • I cannot independently verify the claimed record counts, the authenticity rate, or the exact source of the cards from the quoted text alone.
  • Claims such as “4.3 million are new and usable” should be treated as a reported assessment, not an established fact, unless confirmed by reliable primary reporting or payment industry sources.
  • Attribution to specific skimming or phishing campaigns would also require evidence. That part should not be assumed from the leak description alone.

Likely real-world impact

  • Increased fraudulent online transactions
  • More targeted phishing and social engineering against affected cardholders
  • Possible account takeover attempts where billing details are reused for verification
  • Higher workload for banks, card issuers, and fraud teams monitoring suspicious activity

Important limitation

The presence of billing data and card details does not automatically mean criminals can successfully open credit accounts in every case. That depends on what else is included, the country, the lender’s checks, and whether the victim’s identity data is already exposed elsewhere.

Practical recommendations for users

  • Monitor card statements and banking alerts closely
  • Immediately report unauthorized transactions to the card issuer
  • Replace affected cards if exposure is confirmed or strongly suspected
  • Enable transaction alerts in the banking app
  • Be cautious of phishing messages referencing recent purchases, card issues, or “verification” requests
  • Use virtual cards or merchant-specific card controls when available

For organizations and defenders

  • Increase fraud monitoring thresholds for card-not-present transactions
  • Watch for phishing lures themed around card security incidents
  • Review detection coverage for account takeover and synthetic identity abuse
  • Coordinate with payment processors and issuers on indicators tied to newly circulating card dumps

Bottom line

The overall warning is credible: if this reported release is genuine, it would mainly increase payment fraud and phishing risk. The safest position is to avoid treating the specific numbers and attribution as fully confirmed unless backed by stronger verification.
 
  • Like
Reactions: Wrecker4923