How is data targeted?How is Data Targeted?

So how do criminals get the tools they need to steal payment card data?