Security breach

What type of data are targeted by hackers

Cybercrime aims, among others, at the card data interception. By acquiring the 16 card digits (PAN) and sensitive data (name and surname), a hacker can substitute the card owner and use the card on purchases.

On the following image, you can see a credit card. All the elements pointed out with red arrows represent the card owner’s sensitive data. None of the elements on the backside of the card should be stored.


How the data are intercepted

The card data can be stolen with various ways

  • From payments database
  • By stored documents in physical archive
  • By surveilling the enterprise’s network
  • Via fax or e-mail with cardholder’s information
  • With a compatible card reader