NEW YORK — The hackers behind the recent Target data breach are likely a world away and nearly impossible to find.
That's the consensus among outside cybercrime experts as Target, the Secret Service and the FBI continue their investigation of the pre-Christmas data heist in which hackers stole about 40 million debit and credit card numbers, and personal information — including email addresses, phone numbers, names and home addresses — of an additional 70 million people.
In the aftermath of the breach, millions of Americans have been left to wonder what has become of their precious personal information. The information can be used in a variety of nefarious ways. Criminals can attempt to use the credit card numbers and place charges on the original owners' accounts, or they can use other pieces of personal information to steal people's identities and apply for new lines of credit.
In cases where such a massive amount of information is stolen, criminals generally divide the data into chunks and sell the parcels through online black markets, says Chester Wisniewski, senior security adviser for the computer security firm Sophos.
In many ways, those markets behave much like any legitimate marketplace ruled by the forces of supply and demand. Groups of higher-end cards are worth significantly more than those with lower credit limits, and so are cards tied to additional personal information, such as names, addresses and ZIP codes, which make them easier to use.
After thieves purchase the numbers, they can encode the data onto new, blank cards with an inexpensive, easy-to-use gadget. Or they can skip the card-writing process and simply use the card numbers online.
Crooks often have the option to buy cards last used in their area. That way, Wisniewski says, the cards attract less attention from the banks that issued them.
The underground markets where hackers sell data have a steady supply of card numbers on sale, and their locations are always moving as they try to elude law enforcement, says Daniel Ingevaldson, chief technology officer at Easy Solutions Inc., a firm that sells anti-fraud products and tracks the activity of online black markets. A big jump in inventory usually indicates there's been a breach of a major retailer.
While many of these online bazaars and forums are based in Russia and Eastern Europe, much of the chatter is in English and appears to have been written by Americans, Ingevaldson says.
The types of criminals who buy the card numbers run the gamut, ranging from purely online white-collar crooks to street gangs.
"In reality, card numbers can be bought by anybody with access to the forums and a few bitcoins (online currency) in their pocket," Ingevaldson says.
As for the original perpetrators of the Target attack, experts believe they'll be difficult to locate. Eastern Europe, Russia and former Soviet republics are a hotbed for that kind of activity, given the region's large population of well-educated computer science professionals and the short supply of legitimate employment prospects.
It's likely that the authors of the malicious software used in the Target breach are making a nice living just by selling copies of the code to other hackers and not doing any hacking themselves, Wisniewski says.