Utilizing the stolen data is generally fairly easy: criminals just type in the stolen card quantities when they want to purchase some thing online, Based on copyright Advisory's Thomas. Even though it is a bit trickier for card-existing fraud, which requires using a blank credit card and imprinting the stolen info on to that card by using the magne