{"version":"1.0","provider_name":"ESET Eesti Blogi","provider_url":"https:\/\/blog.eset.ee\/et\/en\/","title":"5 ways cybercriminals steal credit card details","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Hj9bkLTMQv\"><a href=\"https:\/\/blog.eset.ee\/et\/en\/2022\/08\/18\/5-ways-cybercriminals-steal-credit-card-details\/\">5 ways cybercriminals steal credit card details<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.eset.ee\/et\/en\/2022\/08\/18\/5-ways-cybercriminals-steal-credit-card-details\/embed\/#?secret=Hj9bkLTMQv\" width=\"600\" height=\"338\" title=\"&#8220;5 ways cybercriminals steal credit card details&#8221; &#8212; ESET Eesti Blogi\" data-secret=\"Hj9bkLTMQv\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.eset.ee\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2022\/08\/credit-card-theft-hacking.jpg","thumbnail_width":1920,"thumbnail_height":1080,"description":"The cybercrime underground is a well-oiled machine worth&nbsp;trillions of dollars&nbsp;annually. On dark websites hidden from law enforcers and most consumers, cybercriminals buy and sell huge quantities of stolen data as well as the hacking tools needed to obtain them. There are thought to be as many as&nbsp;24 billion illegally obtained usernames and passwords&nbsp;currently circulating on"}