Who Supplied Joker Stash With Data?

 The exact identity of who supplied Joker’s Stash with stolen data remains largely unknown, as the marketplace operated on the dark web with strict anonymity. However, based on cybersecurity investigations and reports by threat intelligence firms, here’s a summary of who likely supplied data to Joker’s Stash:




🧠 1. Cybercriminal Syndicates & Hacking Groups

jokerstash received data from sophisticated hacking groups, including:

  • FIN6: Known for targeting point-of-sale (POS) systems to steal credit card information.

  • Magecart Groups: These are multiple criminal groups that inject skimming code into e-commerce websites to steal card data.

  • Cobalt Group: Linked to financial crimes and ATM heists, and sometimes involved in selling data via markets like Joker's Stash.


🖥️ 2. Individual Hackers & Dark Web Affiliates

Joker’s Stash operated as a marketplace, so it had a wide range of suppliers:

  • Individual hackers who breached retailers, financial institutions, or third-party processors.

  • Insiders within companies (e.g., employees selling access or data).

  • Data brokers who purchased data from one source and resold it through Joker’s Stash.


🌍 3. Sources of Data

Stolen data sold on Joker’s Stash often came from:

  • POS Malware Attacks: Targeting retail chains, restaurants, hotels, etc.

  • E-commerce Skimming: Injecting malicious code into online checkout pages.

  • Banking Trojans: Used to extract data directly from infected users' systems.

  • Data Breaches: Large breaches of financial institutions or vendors handling payments.


🔍 Examples of Known Data Breaches Linked to Joker’s Stash

  • Wawa Breach (2019) – 30+ million payment cards were put up for sale.

  • Sonic Drive-In Breach (2017) – Millions of cards surfaced on Joker’s Stash.

  • Bajaj Finance (India) – Alleged Indian card data was also seen for sale.


🧩 Final Thought

While Joker’s Stash shut down in early 2021, its operations left a lasting legacy in the cybercrime world. The data came from global, decentralized sources, making attribution difficult. Law enforcement agencies like the FBI, Europol, and private cybersecurity firms continue to investigate these supply chains.

Comments

Popular posts from this blog

New Links to Crawl jAN21

Abu Dhabi New Crawl work

Skin Care treatments in Enfield Royal Clinic Saudia