In the aftermath of a payment card breach, card issuers and affected customers take steps to mitigate risks. Card issuers will work to determine the entity that was breached and which cards were compromised. Fraudsters will work fast to test the stolen account data to ensure card numbers are still valid. Meanwhile, the fraudsters will sell the credentials on online card forums and then sell the data. The following infographic looks at the lifecycle of a breach from these three perspectives. It looks at each of these perspectives.”]
Source: https://www.cuinfosecurity.com/infographic-payment-card-breach-lifecycle-a-7812

