Now let us look into some of the methods that cybercriminals use to monetize stolen information like bank accounts, credit cards, and personal information. Stolen Payment Data on a Magento Website For example, we recently discovered such a malware injection used to steal payment information. As soon as the data is stolen, there is only a certain amount of time until the theft is detected and the card data becomes much less valuable due to card cancellation. The valuation of the stolen card data depends on a few factors but the two biggest ones are (1) whether they have been balance verified and(2) if they come with personal information associated with the stolen card, such as: Stolen Credit Cards Changing Hands A stolen credit card may pass through more than one reseller before reaching its final user. Although the reseller is more exposed through the numerous transactions, they still avoid having to physically expose their identity or use the stolen payment card data for fraudulent transactions.