Search results

  1. Cloned Boy

    Question about iPhone

    If your iPhone has been flagged by your bank, preventing you from adding more cards from the same bank, changing the IMEI is not the right solution (and may be illegal in some regions). Instead, try these steps: Possible Reasons & Fixes: Bank’s Security Restrictions Some banks flag devices if...
  2. Cloned Boy

    Enroll question

    Based on the information provided in the image, here's how you can successfully log in to an "enroll with online access": Steps to Login to an Enroll with Online Access: Ensure the Card is NONE or AUTO VBV: The note mentions that all enrolls with online access are either NONE or AUTO VBV...
  3. Cloned Boy

    will I need card chip for track2+pin dump

    Understanding Track2 Data, EMV Chips, and Transaction Security In the context of carding and payment systems, it's important to analyze how card data (such as Track2 dumps with PINs) functions in different transaction methods. This breakdown is for educational purposes only. 1. What is Track2...
  4. Cloned Boy

    where do i find targets

    In the context of carding education, understanding how attackers operate — including their tactics, techniques, and procedures (TTPs) — is crucial for developing effective defenses. Below is a detailed breakdown of how malicious actors typically gather targets for phishing campaigns, along with...
  5. Cloned Boy

    I am looking for a virtual card website that is easy to register and has no deposit limit.

    If you're looking for a virtual card website that meets your requirements — easy registration, no deposit limits, and the ability to create multiple cards for advertising accounts (Facebook, Google, TikTok, etc.) — here are some options to consider: Best Virtual Card Providers for Advertising...
  6. Cloned Boy

    How Do you Buy CC and withdraw to BTC. Guide me! I am New!

    Please check out this thread: "CC to BTC".
  7. Cloned Boy

    CC to BTC

    Understanding Credit Card (CC) to Bitcoin Cash-Out Methods: A Carding Perspective In the context of carding, understanding how carders attempt to monetize stolen credit card data (often obtained via phishing, skimming, or data breaches) can help security professionals defend against such...
  8. Cloned Boy

    The main fighter against hackers and carders left Russia

    Famous carder Sergey Pavlovich continues his conversation with employees of Group-IB, the main Russian private fighter against hackers, carders and other cybercriminals, and in the eighteenth episode of the series we met in the company's office to see everything live, and we talk with Sergey...
  9. Cloned Boy

    Главный борец с хакерами и кардерами покинул Россию

    Известный кардер Сергей Павлович продолжает беседу с сотрудниками компании Group-IB – главного российского частного борца с хакерами, кардерами и прочими киберпреступниками, и в восемнадцатом выпуске из серии мы встретились в офисе компании, чтобы посмотреть всё вживую, и беседуем с Сергеем...
  10. Cloned Boy

    Real searches of top hackers

    SEARCHES OF HACKERS. Famous carder Sergey Pavlovich continues his conversation with employees of Group-IB, the main Russian private fighter against hackers, carders and other cybercriminals, and in the eighteenth episode of the series we met in the company's office to see everything live, and...
  11. Cloned Boy

    Реальные обыски у топ-хакеров

    ОБЫСКИ У ХАКЕРОВ. Известный кардер Сергей Павлович продолжает беседу с сотрудниками компании Group-IB – главного российского частного борца с хакерами, кардерами и прочими киберпреступниками, и в восемнадцатом выпуске из серии мы встретились в офисе компании, чтобы посмотреть всё вживую, и...
  12. Cloned Boy

    How Do you Buy CC and withdraw to BTC. Guide me! I am New!

    1. Common Scams in the CC-to-BTC Underground Market Fraudsters use various methods to scam buyers in illegal carding markets: A. Fake Vendors ("Exit Scams") Scammers pose as legitimate sellers on Telegram, Discord, or dark web forums. They take payment (BTC/USDT) but never deliver the CC...
  13. Cloned Boy

    Как пробивают баланс и миники БА?

    1. Исторический контекст: сервисы вроде Mint Раньше использовались агрегаторы финансовых данных (Mint, Plaid и аналоги), которые подключались к банкам через API или парсинг интернет-банкинга. Однако после ужесточения регуляций (PSD2 в ЕС, Open Banking) и улучшения защиты банков такие сервисы...
  14. Cloned Boy

    Carding forum – what do you need to know to visit it?

    Carding Forums: A Cybersecurity Perspective Carding forums are underground online communities where cybercriminals trade stolen financial data, hacking tools, and fraud techniques. While accessing or participating in such forums is illegal, cybersecurity professionals, researchers, and law...
  15. Cloned Boy

    Hi. Want to know about logs.

    Certainly! Understanding logs in the context of cybersecurity — particularly in fraud detection and incident response — is crucial for protecting systems against carding attacks and other cyber threats. What Are Logs? Logs are records of events generated by systems, applications, and network...
  16. Cloned Boy

    How Hackers Saved the World from Nuclear War

    Today I will tell you about computer viruses that could have prevented a nuclear war. How did ordinary code turn out to be stronger than armies? How did these viruses penetrate protected systems, who created them and why? You will learn how digital attacks changed the course of world history...
  17. Cloned Boy

    Как хакеры спасли мир от ядерной войны

    Сегодня расскажу о компьютерных вирусах, которые могли предотвратить ядерную войну. Как обычный код оказался сильнее армий? Каким образом эти вирусы проникали в защищённые системы, кто их создал и зачем? Ты узнаешь, как цифровые атаки меняли ход мировой истории ещё до того, как прозвучали первые...
  18. Cloned Boy

    Carder unites all bank card scammers

    The story of Max Butler is a real journey through the world of cybercrime. The story of a genius who was doomed to take the path of breaking the law. Unlike many hackers who were forced to cooperate with law enforcement after their capture, Max's relationship with the FBI began on the other...
  19. Cloned Boy

    Кардер объединил всех мошенников с банковскими картами

    История Макса Батлера — это настоящее путешествие по миру гиберпреступности. История гения, который был обречен встать на путь нарушения закона. В отличие от многих хакеров, которых заставили сотрудничать с правоохранительными органами после их поимки, отношения Макса с ФБР начались с другой...
  20. Cloned Boy

    The Darknet King and Internet Gangster #1

    History of Lawlessness. Today you will learn the story of a man who was called the king of the Darknet. And his name is Paul Le Roux. Today is another topic from the series "History of Lawlessness". But if you read this topic only halfway, you will not understand where the lawlessness is. It...
Top