In the previous article (PART 1), we discussed how attacker sets up their environment for being anonymous online. After the complete anonymous setup, The last step is to get a CC (Credit card), which they generally get from black market from a huge database of
BINs. Buying a CC is an…