BadB
Professional
- Messages
- 1,662
- Reaction score
- 1,576
- Points
- 113
CARDER STOLE MILLIONS FROM OTHER PEOPLE'S CREDIT CARDS.
$4.2 million in 3 years of carding. Sounds impressive? In fact, it's pennies compared to what my former colleagues were doing. In 4 years, I stole more money than most people earn in a lifetime, and no one has caught me yet. In our business, only results and reputation matter. And yes, I've already quit. I've saved up enough to live peacefully for the rest of my days. But I'm sick of movies about cool hackers in black hoodies who become millionaires overnight.
I'll show you how it really works. I'll start from the very beginning. December 2019. I'm 19 years old, a second-year student at a local technical school, specializing in programming. I live with my mother in a Khrushchev-era building on the outskirts of the city. My father is gone, he left when I was seven. My mother works as a cleaner in a shopping center for 30 thousand a month. The problems began when my mother was diagnosed with a cyst in her kidney.
The operation is paid - 380 thousand rubles. Plus rehabilitation, medications ... In general, money that we never had and could not have. I knew how to program. Self-taught since 14. Python, JavaScript, a little C++. Freelanced on small things. Landings for local businesses. Simple Telegram bots. The maximum I could throw in was 40 thousand a month. I needed to save up for 2 years for the operation.
December 21, 2019. Sunday. I remember the date exactly, because on that day I received a message in Telegram from an unknown Easy Money user. I saw your work with bots. I have an interesting offer. You can earn more in an hour than in a month of freelancing. At first I thought it was a scam. But the user sent a link to his channel, 2000 subscribers, regular posts about testing payment systems and checking the security of online stores.
Nothing criminal at first glance. In the comments, people bragged about their earnings. Yesterday, 40 thousand. This month, already 200+. Wrote him a personal message. He responded quickly. We test foreign websites for payment vulnerabilities. We buy goods and use test cards to check if the payment went through. You only need to write a script to automate purchases. It sounded almost legal. The key word is almost. But 380 thousand for the operation outweighed my doubts.
The first task came on December 23. A text file with five to ten card numbers, CVI codes, and expiration dates. Check on the website of any European online store. I give 20 bucks for each working card. I created a simple Python script using Selenium. It automatically went to the website of a German electronics store, added a cheap item worth 5 or 10 euros to the cart, went to the payment page, and entered the card details. If the payment went through, the card was alive; if it was rejected, it was dead.
Of the 50 cards, 23 worked. $460 to my crypto wallet. In 2 hours of work, I earned more than in a month as a freelancer. And then I realized that I was not testing test cards. But I could not stop. A week later, a new task came. Then another one. By February 2020, I was already earning from 2 to 3 thousand dollars a month, just checking cards and sometimes finalizing scripts for other channel members.
In March, a person with a nickname that I will not name wrote to me. Let's just call him the Curator. He offered to move to a more serious level. You work well. There is an offer to join our group, the income will be different. I had already saved up for my mother's operation, but the excitement and money were addictive. I agreed. And then the real story began.
The first task from the new group seemed like child's play. It seemed like child's play only for the first five minutes. On April 7, 2020, the Curator sent me an encrypted archive with a password. Inside was not a text file with cards, but an entire folder with materials. Dumps of databases of three German banks, scripts for bypassing 3D Secure, instructions for setting up VPN chains and a list of two thousand cards with balances from five to fifty thousand euros.
"Welcome to real carding," the curator wrote. - Your task is to automate purchases in the top 10 European online stores. Drop addresses in Berlin, Frankfurt and Munich were ordered. Fifteen percent of the turnover is yours. I realized that I was in a completely different league. This was not a makeshift card check, but industrial carding.
The group consisted of four people, the curator coordinated operations and supplied card databases. The technician was engaged in hacking sites and bypassing protection. The logistician managed a network of drops throughout Europe. And I became the fourth programmer who automates the entire process. The first week I studied the materials. I realized that my previous scripts were kindergarten. Here it was necessary to imitate the behavior of a real user, random pauses between actions, different browser user agents, IP address rotation via VPN, even imitation of mouse movements.
On April 14, I launched the first test. A Swiss online electronics store. I ordered an iPhone 11 Pro. For 1,200 euros. The card went through, the order was confirmed. Three days later, a technician from Zurich received the parcel and resold the phone. My share was 180 euros. By May 2020, I was processing up to 50 orders a day. My script worked around the clock, buying goods in German, French, Swiss stores.
Equipment, clothes, cosmetics. Anything, as long as it was easy to resell. Then I got acquainted with the real geography of operations. Cards were bought mainly by American and Canadian ones. There, banks react more slowly to suspicious transactions. Drops worked all over Europe. Students in Berlin, immigrants in Paris, the unemployed in Madrid.
Everyone got a percentage, but most didn't even realize they were laundering stolen money. In the summer of 2020, my monthly income reached $8,000 to $10,000. I rented a decent apartment in the center, bought myself a MacBook Pro, and paid for my mother's surgery and rehabilitation in a private clinic. But the most important thing is that I understood how the modern carding machine works.
This is not the romance of lone hackers, but a real business with a clear division of labor. The curator bought databases from other groups or ordered hacks of specific banks. The technician provided the technical side - bypassing protection, phishing sites, fake documents for registering drops. The logistician coordinated couriers around the world, and programmers like me automated the process to an industrial scale. By the fall of 2020, our group already had 12 programmers.
Each processed their own sector - someone specialized in Germany, someone in France, someone in the Scandinavian countries. The technician created an entire infrastructure - proxy servers in 20 countries, virtual machine farms, automatic IP change systems. In December 2020, the Curator showed me a report for the year. The total turnover of the group was 8.3 million euros. Net profit after all expenses on drops, technical infrastructure and purchase of databases was 6.7 million.
My share was 127 thousand dollars for 8 months of work. But then I realized that this was just the beginning. The Curator talked about plans for 2021. Transition to corporate cards, automation of phishing through AI, creation of our own botnet network for data collection. Next year, we plan to fully enter the American market.
He told me on New Year's Eve. There are completely different money there. When I saw the real figures for the American market, I realized that we are in a completely different league. 47 million dollars. This is the turnover shown by our group's American operations in 2021. For comparison, the entire European segment yielded 8.3 million for the same period. The American market turned out to be 5 times more profitable. The difference was not only in scale, but also in approach.
In Europe, we worked with regular consumer cards. The limits ranged from 2 to 5 thousand euros for mass-market goods. In the US, Curator focused on the corporate segment. On January 15, 2021, he showed me a new database. 800 corporate cards of American companies with limits. From 50 to 500 thousand dollars. "One purchase can give more than a month of work in Europe," he explained.
But the technical complexity increased exponentially. Corporate cards had multi-stage protection. SMS confirmation to the phones of financial directors, email, notifications to corporate email. Additional checks for purchases over 10 thousand dollars. The group's technician developed a bypass system through phishing attacks. "We created fake letters from banks asking to confirm card information to update the security system." People entered their data on our duplicate sites themselves.
But the real breakthrough happened in May 2021, when the technician began using neural networks to generate phishing letters. AI analyzed the correspondence style of specific banks and created letters that were almost impossible to distinguish from real ones. My task became more complicated. Now it was necessary not only to automate purchases, but to create full-fledged systems for working with corporate payments. - imitation of the behavior of company employees, purchases of B2B goods, work with suppliers of equipment and software.
The first major transaction was June 23, 2021. We bought IBM server equipment for 180 thousand using a corporate card of a tech company from Seattle. The servers were sent to the address of a fictitious company in Miami, from where Drop resold them to South America. My share was $9,000, 2% of the transaction amount.
By the end of 2021, I was processing corporate purchases for amounts up to 300 thousand bucks at a time. Apple equipment for startups, servers for IT companies, medical equipment for clinics. The geography of drops expanded - Los Angeles, New York, Chicago, Houston, Miami. But the higher the amounts became, the more I began to get irritated by the distribution of the share. The curator took 60% of each transaction, the technician received 20%, the logistician 15%.
I got 5%, although it was my scripts that ensured 80% of successful purchases. “You get a percentage of the turnover, and you don’t take the risks,” the curator explained when I raised the issue of revising the share. But I was the one taking the risks. My servers, my scripts, my IP in the store logs. If the operation had failed, I would have been the first to be identified. In December 2021, my income was 67 thousand bucks.
Sounds good, but it was only 2.8% of the group’s total profit of 2.4 million for the month. The last straw was the operation on February 8, 2022. Corporate card of a pharmaceutical company from Boston. Limit - $750,000. We ordered medical equipment for a hospital in Texas for $420,000. The operation went perfectly.
The total profit of the group is $357,000 after deducting the resale value. The curator's share is $200,000 - $14,200. My share is $17,850. I created the entire technical scheme of the operation, my script bypassed the three-level protection of the corporate card, I coordinated with the drop in Texas, and received less than 5%. On March 14, 2022, I wrote to the curator.
"I want to reconsider the terms of cooperation, I demand 20% with the operation." The answer came an hour later. "The terms remain the same. If you don't like it, you can leave." On the morning of March 15, 2022, I sent the last message to the curator and started a completely new game. 1. Solo order 1. iPhone 13 Pro Max 2.
For 1200 bucks from an American card 3. Delivery to Russia by regular mail 4. The package arrived on March 18, 2022 5. Sold the phone 2 days later for 85 thousand rubles 6. Net profit 7. $ 1050 8. I earned as much for one order as I received in the group from 10 operations 9. I worked carefully for the first months. I tested the scheme for delivering goods directly to Russia.
It turned out that most American online stores calmly send orders to the Russian Federation. The main thing is to use cards of the same region as the IP address when ordering. By the summer of 2022, I had worked out a clear scheme. I bought American and European cards with balances from 5 to 50 thousand dollars. I ordered Apple and Samsung equipment, game consoles, expensive watches, jewelry. Everything was delivered to Russia to the addresses of fictitious persons.
But the main discovery happened in June. I realized that the Russian market is much more profitable than the European or American ones. Some goods in Russia cost one and a half to two times more than in the USA. An iPhone for 1000 dollars easily sells for 80 or 90 thousand rubles. A MacBook Pro for 2500 bucks goes for 220 or 250 thousand. Plus no intermediate drops that take their percentage.
In July 2022, I earned 43 thousand bucks. In August - 61 thousand. In September - 78 thousand. But some goods were not popular in Russia. Specific medical equipment, professional equipment for a recording studio. Rare collectibles. For such orders, I had to organize a small network of drops.
I found one person in Berlin. A student from Ukraine agreed to receive parcels for 200 euros each. In the USA, I connected a guy from Los Angeles. An immigrant from Mexico worked for 300 bucks per parcel. The scheme became universal, he ordered mass-produced equipment to Russia. Specific goods. Through a European or American drop with subsequent resale on international platforms. In October 2022, there was a qualitative leap.
I began to use neural networks not only for phishing, but also for market analysis. I trained AI to analyze product prices in different countries and automatically find the most profitable positions for resale. The algorithm scanned American stores, compared prices with Russian marketplaces and issued a list of products with the maximum margin. The result exceeded expectations. AI found products with a price difference of up to 300%. A projector that cost $3,000 in the US was sold in Russia for 350 thousand rubles.
A professional mixing console for $8,000, in Russia it costs 900 thousand rubles. By the end of 2022, I was processing up to 30 orders a day fully automatically. My scripts themselves found profitable products, ordered them from stolen cards, tracked delivery, and even posted ads for sale on Russian marketplaces.
December 2022. $127 thousand in income. In a month, I earned as much as I earned in the group for a whole year. 2023 was the peak. I fully automated the process and expanded the geography. Added Canadian and Australian cards. There, banks react even slower to suspicious transactions. I started working with the luxury segment, Rolex watches, Hermes bags, diamond jewelry.
Jewelry provided the highest margin. A Tiffany ring for $15 thousand easily sold in Moscow for 1.5 million rubles. A Patek Philippe watch for 80 thousand dollars, and they went for 9 to 10 million. In March 2023, he exceeded the 300 thousand mark in a month for the first time. In June - 380 thousand. In September, he set a personal record of 447 thousand dollars.
But technology did not stand still either. By the middle of 2000-23, banks began to massively implement AI systems to detect fraud. It was necessary to constantly improve the bypass methods. Developed a system of warm purchases. At first, small legal purchases were made from the stolen card for two or three weeks. Coffee at Starbucks, groceries at the supermarket, Netflix subscriptions.
Bank algorithms got used to the activity, the card became "trusted". Only after that a large order was made. The system worked flawlessly. In 2024, he began to use deepfake technologies to bypass video verification. Some banks required confirmation of large purchases via video call. My algorithms generated a video with the cardholder's face, synthesized from a photo from social networks.
The peak was the transaction on August 14, 2024. A collection of Patek Philippe watches from a private gallery in New York. 12 pieces worth a total of 1.2 million dollars. Everything was paid for with a corporate card of the art fund. Sold in Russia for 140 million rubles. My profit is 980 thousand for one transaction, almost a million dollars.
By the end of 2024, the total amount that passed through my schemes was 4.2 million. Net profit is 3.7 million bucks. I bought an apartment, a house, invested in cryptocurrency and real estate in Dubai. Officially, I was an individual entrepreneur engaged in consulting in the IT field. In November 2024, I decided to quit. I saved up enough to live the rest of my days without working. Banks were getting smarter, the risks were growing.
But the main thing is that I was tired of what was happening around me. In May 2000, on the 24th, one message on Telegram turned everything upside down. In recent months, I have been increasingly coming across YouTube videos and movies about hackers. Top 10 richest carders. How to make millions. Millions of views, thousands of comments from guys who dream of becoming cool hackers in black hoodies. The same picture everywhere.
The romance of the hacker movement, the fight against the system, the redistribution of wealth. They show cool guys in hoodies who allegedly earn 10 million a year and live in the Maldives. And this began to drive me wild. Because I know how everything really happens. In 4 years in this field, I have seen enough to know. There is no romance there. Only dirt, greed and betrayal.
Do you want the truth? Here it is. Remember my curator? The same one that took 60% from operations. In August 2022, I found out that he had cheated a group technician out of 180 thousand bucks. He simply did not pay his share of a large operation and blocked him in all messengers. The technician had worked with him for three years, developing a system to bypass protection and risking his freedom.
But when the time came to divide the big money, no one needed him. Six months later, another group cheated the same technician. This time for 240 thousand. In 2023, he worked with a group that specialized in pensioner cards. They bought databases with card data from people over 70 years old and robbed them of their pensions. The average theft amounted to 800 to 2000 dollars. Pennies for us, the last money for them.
When I asked the curator if he felt sorry for the elderly, he replied. They will die soon anyway. And we need the money now. During my work, more than two hundred drops in different countries have passed through my schemes. Do you know how many of them avoided problems with the law? Zero. Sooner or later, everyone was caught. Students received suspended sentences and deportation. Immigrants were jailed for two or three years. Drug addicts who were used as couriers received full sentences because they could not hire normal lawyers.
And we found new ones. There were always desperate people back then, ready to do anything for quick money. 90% of carders do not know how to program. They buy ready-made scripts on forums, use other people's tools, work according to the schemes that were sold to them. Real technicians are few and far between. The rest are ordinary scammers who learned to use ready-made tools.
No fight against the system. Just stealing. In four years, I made $ 3.7 million. Bought real estate, cars, invested in cryptocurrency. But I lived in fear every day. Every doorbell could be the police. Every message could be a threat from competitors or dumped partners. I had no friends. In this sphere, there are no friends, only exploitation. I hid my family from everyone. My mother still thinks that I made money on IT consulting.
By 2024, I realized that enough was enough. I had saved up enough to live in peace. But I can’t just disappear. I know too much about too many people. I saw how those who tried to leave received offers they couldn’t refuse. One guy who decided to quit in 2023 was found beaten in the entryway of his apartment a month after he left. They broke both his arms and said, “If you want to talk to the police, we’ll find you anywhere.”
So I left quietly, gradually winding down operations, transferring money to safe assets, preparing to disappear completely. My last operation was November 12, 2024. I bought a batch of iPhone 16 Pro. Sold 47 thousand in Russia for 4.2 million rubles. Never touched the stolen cards again.
But why am I telling you all this? Not out of a desire to save or re-educate anyone. I’m just sick of movies and videos about cool hackers in black hoodies. Carding is not romantic. It is a dirty business where people cheat each other for pennies, use the desperate as expendable material and steal the last money from pensioners. In general, I believe that carding is close to the drug business in its essence. Want to get rich? Study programming, create startups, trade on the stock exchange.
Any legal way to earn money is better than living in constant fear and surrounded by such people. And if you still decided to get into carding after my story? Don't say later that you were not warned. I found this story on one of the closed forums on the Darknet 5 months ago. The post was published by user Pai23 in March 2025 and gained more than 500 comments.
Most of the commentators confirmed the details described in the story. The technical aspects of using AI in carding and schemes for working with the Russian market were especially actively discussed. Which confirms the fact that all the described technologies exist and are actively used. The amount and scale of the operations correspond to open source data on modern carding. What was especially striking was the complete lack of romance in the story. No fighters against the system or digital Robin Hoods.
Only cold calculation, greed and betrayal. The story of Pai-23 shows the real underside of what is presented in films and videos as cool hacker romance. Behind the beautiful picture lies ordinary crime, where people throw each other for money, and the weakest pay for everything. Working with pensioners and using desperate people as drops looks especially cynical.
All these partners and colleagues sooner or later end up behind bars, while the organizers remain in the shadows. I don’t know where Pai-23 is now and whether he watches my channel. But his story is the best warning for those who think about easy money on the Darknet. Reality always turns out to be dirtier than beautiful stories from the Internet. I would also like to remind you that all actions described in the story are crimes under the criminal laws of most countries in the world.
Carding, bank card fraud, money laundering and the use of front men entail serious criminal liability. From large fines to imprisonment for up to 10 years. As the author of the channel, I categorically do not recommend anyone to engage in such activities and insist that this is unacceptable. Sooner or later, any criminal scheme leads to disastrous consequences - arrest, imprisonment and the destruction of life. This story is published solely for educational purposes, to show the real risks and consequences of criminal activity on the Internet.
Remember, no amount of money is worth lost freedom and a ruined future. If this story made you think, then put stories from the dark corners of the Internet that will show you a world without beauty. In the meantime, take care of yourself and remember, quick money always costs too much.
$4.2 million in 3 years of carding. Sounds impressive? In fact, it's pennies compared to what my former colleagues were doing. In 4 years, I stole more money than most people earn in a lifetime, and no one has caught me yet. In our business, only results and reputation matter. And yes, I've already quit. I've saved up enough to live peacefully for the rest of my days. But I'm sick of movies about cool hackers in black hoodies who become millionaires overnight.
I'll show you how it really works. I'll start from the very beginning. December 2019. I'm 19 years old, a second-year student at a local technical school, specializing in programming. I live with my mother in a Khrushchev-era building on the outskirts of the city. My father is gone, he left when I was seven. My mother works as a cleaner in a shopping center for 30 thousand a month. The problems began when my mother was diagnosed with a cyst in her kidney.
The operation is paid - 380 thousand rubles. Plus rehabilitation, medications ... In general, money that we never had and could not have. I knew how to program. Self-taught since 14. Python, JavaScript, a little C++. Freelanced on small things. Landings for local businesses. Simple Telegram bots. The maximum I could throw in was 40 thousand a month. I needed to save up for 2 years for the operation.
December 21, 2019. Sunday. I remember the date exactly, because on that day I received a message in Telegram from an unknown Easy Money user. I saw your work with bots. I have an interesting offer. You can earn more in an hour than in a month of freelancing. At first I thought it was a scam. But the user sent a link to his channel, 2000 subscribers, regular posts about testing payment systems and checking the security of online stores.
Nothing criminal at first glance. In the comments, people bragged about their earnings. Yesterday, 40 thousand. This month, already 200+. Wrote him a personal message. He responded quickly. We test foreign websites for payment vulnerabilities. We buy goods and use test cards to check if the payment went through. You only need to write a script to automate purchases. It sounded almost legal. The key word is almost. But 380 thousand for the operation outweighed my doubts.
The first task came on December 23. A text file with five to ten card numbers, CVI codes, and expiration dates. Check on the website of any European online store. I give 20 bucks for each working card. I created a simple Python script using Selenium. It automatically went to the website of a German electronics store, added a cheap item worth 5 or 10 euros to the cart, went to the payment page, and entered the card details. If the payment went through, the card was alive; if it was rejected, it was dead.
Of the 50 cards, 23 worked. $460 to my crypto wallet. In 2 hours of work, I earned more than in a month as a freelancer. And then I realized that I was not testing test cards. But I could not stop. A week later, a new task came. Then another one. By February 2020, I was already earning from 2 to 3 thousand dollars a month, just checking cards and sometimes finalizing scripts for other channel members.
In March, a person with a nickname that I will not name wrote to me. Let's just call him the Curator. He offered to move to a more serious level. You work well. There is an offer to join our group, the income will be different. I had already saved up for my mother's operation, but the excitement and money were addictive. I agreed. And then the real story began.
The first task from the new group seemed like child's play. It seemed like child's play only for the first five minutes. On April 7, 2020, the Curator sent me an encrypted archive with a password. Inside was not a text file with cards, but an entire folder with materials. Dumps of databases of three German banks, scripts for bypassing 3D Secure, instructions for setting up VPN chains and a list of two thousand cards with balances from five to fifty thousand euros.
"Welcome to real carding," the curator wrote. - Your task is to automate purchases in the top 10 European online stores. Drop addresses in Berlin, Frankfurt and Munich were ordered. Fifteen percent of the turnover is yours. I realized that I was in a completely different league. This was not a makeshift card check, but industrial carding.
The group consisted of four people, the curator coordinated operations and supplied card databases. The technician was engaged in hacking sites and bypassing protection. The logistician managed a network of drops throughout Europe. And I became the fourth programmer who automates the entire process. The first week I studied the materials. I realized that my previous scripts were kindergarten. Here it was necessary to imitate the behavior of a real user, random pauses between actions, different browser user agents, IP address rotation via VPN, even imitation of mouse movements.
On April 14, I launched the first test. A Swiss online electronics store. I ordered an iPhone 11 Pro. For 1,200 euros. The card went through, the order was confirmed. Three days later, a technician from Zurich received the parcel and resold the phone. My share was 180 euros. By May 2020, I was processing up to 50 orders a day. My script worked around the clock, buying goods in German, French, Swiss stores.
Equipment, clothes, cosmetics. Anything, as long as it was easy to resell. Then I got acquainted with the real geography of operations. Cards were bought mainly by American and Canadian ones. There, banks react more slowly to suspicious transactions. Drops worked all over Europe. Students in Berlin, immigrants in Paris, the unemployed in Madrid.
Everyone got a percentage, but most didn't even realize they were laundering stolen money. In the summer of 2020, my monthly income reached $8,000 to $10,000. I rented a decent apartment in the center, bought myself a MacBook Pro, and paid for my mother's surgery and rehabilitation in a private clinic. But the most important thing is that I understood how the modern carding machine works.
This is not the romance of lone hackers, but a real business with a clear division of labor. The curator bought databases from other groups or ordered hacks of specific banks. The technician provided the technical side - bypassing protection, phishing sites, fake documents for registering drops. The logistician coordinated couriers around the world, and programmers like me automated the process to an industrial scale. By the fall of 2020, our group already had 12 programmers.
Each processed their own sector - someone specialized in Germany, someone in France, someone in the Scandinavian countries. The technician created an entire infrastructure - proxy servers in 20 countries, virtual machine farms, automatic IP change systems. In December 2020, the Curator showed me a report for the year. The total turnover of the group was 8.3 million euros. Net profit after all expenses on drops, technical infrastructure and purchase of databases was 6.7 million.
My share was 127 thousand dollars for 8 months of work. But then I realized that this was just the beginning. The Curator talked about plans for 2021. Transition to corporate cards, automation of phishing through AI, creation of our own botnet network for data collection. Next year, we plan to fully enter the American market.
He told me on New Year's Eve. There are completely different money there. When I saw the real figures for the American market, I realized that we are in a completely different league. 47 million dollars. This is the turnover shown by our group's American operations in 2021. For comparison, the entire European segment yielded 8.3 million for the same period. The American market turned out to be 5 times more profitable. The difference was not only in scale, but also in approach.
In Europe, we worked with regular consumer cards. The limits ranged from 2 to 5 thousand euros for mass-market goods. In the US, Curator focused on the corporate segment. On January 15, 2021, he showed me a new database. 800 corporate cards of American companies with limits. From 50 to 500 thousand dollars. "One purchase can give more than a month of work in Europe," he explained.
But the technical complexity increased exponentially. Corporate cards had multi-stage protection. SMS confirmation to the phones of financial directors, email, notifications to corporate email. Additional checks for purchases over 10 thousand dollars. The group's technician developed a bypass system through phishing attacks. "We created fake letters from banks asking to confirm card information to update the security system." People entered their data on our duplicate sites themselves.
But the real breakthrough happened in May 2021, when the technician began using neural networks to generate phishing letters. AI analyzed the correspondence style of specific banks and created letters that were almost impossible to distinguish from real ones. My task became more complicated. Now it was necessary not only to automate purchases, but to create full-fledged systems for working with corporate payments. - imitation of the behavior of company employees, purchases of B2B goods, work with suppliers of equipment and software.
The first major transaction was June 23, 2021. We bought IBM server equipment for 180 thousand using a corporate card of a tech company from Seattle. The servers were sent to the address of a fictitious company in Miami, from where Drop resold them to South America. My share was $9,000, 2% of the transaction amount.
By the end of 2021, I was processing corporate purchases for amounts up to 300 thousand bucks at a time. Apple equipment for startups, servers for IT companies, medical equipment for clinics. The geography of drops expanded - Los Angeles, New York, Chicago, Houston, Miami. But the higher the amounts became, the more I began to get irritated by the distribution of the share. The curator took 60% of each transaction, the technician received 20%, the logistician 15%.
I got 5%, although it was my scripts that ensured 80% of successful purchases. “You get a percentage of the turnover, and you don’t take the risks,” the curator explained when I raised the issue of revising the share. But I was the one taking the risks. My servers, my scripts, my IP in the store logs. If the operation had failed, I would have been the first to be identified. In December 2021, my income was 67 thousand bucks.
Sounds good, but it was only 2.8% of the group’s total profit of 2.4 million for the month. The last straw was the operation on February 8, 2022. Corporate card of a pharmaceutical company from Boston. Limit - $750,000. We ordered medical equipment for a hospital in Texas for $420,000. The operation went perfectly.
The total profit of the group is $357,000 after deducting the resale value. The curator's share is $200,000 - $14,200. My share is $17,850. I created the entire technical scheme of the operation, my script bypassed the three-level protection of the corporate card, I coordinated with the drop in Texas, and received less than 5%. On March 14, 2022, I wrote to the curator.
"I want to reconsider the terms of cooperation, I demand 20% with the operation." The answer came an hour later. "The terms remain the same. If you don't like it, you can leave." On the morning of March 15, 2022, I sent the last message to the curator and started a completely new game. 1. Solo order 1. iPhone 13 Pro Max 2.
For 1200 bucks from an American card 3. Delivery to Russia by regular mail 4. The package arrived on March 18, 2022 5. Sold the phone 2 days later for 85 thousand rubles 6. Net profit 7. $ 1050 8. I earned as much for one order as I received in the group from 10 operations 9. I worked carefully for the first months. I tested the scheme for delivering goods directly to Russia.
It turned out that most American online stores calmly send orders to the Russian Federation. The main thing is to use cards of the same region as the IP address when ordering. By the summer of 2022, I had worked out a clear scheme. I bought American and European cards with balances from 5 to 50 thousand dollars. I ordered Apple and Samsung equipment, game consoles, expensive watches, jewelry. Everything was delivered to Russia to the addresses of fictitious persons.
But the main discovery happened in June. I realized that the Russian market is much more profitable than the European or American ones. Some goods in Russia cost one and a half to two times more than in the USA. An iPhone for 1000 dollars easily sells for 80 or 90 thousand rubles. A MacBook Pro for 2500 bucks goes for 220 or 250 thousand. Plus no intermediate drops that take their percentage.
In July 2022, I earned 43 thousand bucks. In August - 61 thousand. In September - 78 thousand. But some goods were not popular in Russia. Specific medical equipment, professional equipment for a recording studio. Rare collectibles. For such orders, I had to organize a small network of drops.
I found one person in Berlin. A student from Ukraine agreed to receive parcels for 200 euros each. In the USA, I connected a guy from Los Angeles. An immigrant from Mexico worked for 300 bucks per parcel. The scheme became universal, he ordered mass-produced equipment to Russia. Specific goods. Through a European or American drop with subsequent resale on international platforms. In October 2022, there was a qualitative leap.
I began to use neural networks not only for phishing, but also for market analysis. I trained AI to analyze product prices in different countries and automatically find the most profitable positions for resale. The algorithm scanned American stores, compared prices with Russian marketplaces and issued a list of products with the maximum margin. The result exceeded expectations. AI found products with a price difference of up to 300%. A projector that cost $3,000 in the US was sold in Russia for 350 thousand rubles.
A professional mixing console for $8,000, in Russia it costs 900 thousand rubles. By the end of 2022, I was processing up to 30 orders a day fully automatically. My scripts themselves found profitable products, ordered them from stolen cards, tracked delivery, and even posted ads for sale on Russian marketplaces.
December 2022. $127 thousand in income. In a month, I earned as much as I earned in the group for a whole year. 2023 was the peak. I fully automated the process and expanded the geography. Added Canadian and Australian cards. There, banks react even slower to suspicious transactions. I started working with the luxury segment, Rolex watches, Hermes bags, diamond jewelry.
Jewelry provided the highest margin. A Tiffany ring for $15 thousand easily sold in Moscow for 1.5 million rubles. A Patek Philippe watch for 80 thousand dollars, and they went for 9 to 10 million. In March 2023, he exceeded the 300 thousand mark in a month for the first time. In June - 380 thousand. In September, he set a personal record of 447 thousand dollars.
But technology did not stand still either. By the middle of 2000-23, banks began to massively implement AI systems to detect fraud. It was necessary to constantly improve the bypass methods. Developed a system of warm purchases. At first, small legal purchases were made from the stolen card for two or three weeks. Coffee at Starbucks, groceries at the supermarket, Netflix subscriptions.
Bank algorithms got used to the activity, the card became "trusted". Only after that a large order was made. The system worked flawlessly. In 2024, he began to use deepfake technologies to bypass video verification. Some banks required confirmation of large purchases via video call. My algorithms generated a video with the cardholder's face, synthesized from a photo from social networks.
The peak was the transaction on August 14, 2024. A collection of Patek Philippe watches from a private gallery in New York. 12 pieces worth a total of 1.2 million dollars. Everything was paid for with a corporate card of the art fund. Sold in Russia for 140 million rubles. My profit is 980 thousand for one transaction, almost a million dollars.
By the end of 2024, the total amount that passed through my schemes was 4.2 million. Net profit is 3.7 million bucks. I bought an apartment, a house, invested in cryptocurrency and real estate in Dubai. Officially, I was an individual entrepreneur engaged in consulting in the IT field. In November 2024, I decided to quit. I saved up enough to live the rest of my days without working. Banks were getting smarter, the risks were growing.
But the main thing is that I was tired of what was happening around me. In May 2000, on the 24th, one message on Telegram turned everything upside down. In recent months, I have been increasingly coming across YouTube videos and movies about hackers. Top 10 richest carders. How to make millions. Millions of views, thousands of comments from guys who dream of becoming cool hackers in black hoodies. The same picture everywhere.
The romance of the hacker movement, the fight against the system, the redistribution of wealth. They show cool guys in hoodies who allegedly earn 10 million a year and live in the Maldives. And this began to drive me wild. Because I know how everything really happens. In 4 years in this field, I have seen enough to know. There is no romance there. Only dirt, greed and betrayal.
Do you want the truth? Here it is. Remember my curator? The same one that took 60% from operations. In August 2022, I found out that he had cheated a group technician out of 180 thousand bucks. He simply did not pay his share of a large operation and blocked him in all messengers. The technician had worked with him for three years, developing a system to bypass protection and risking his freedom.
But when the time came to divide the big money, no one needed him. Six months later, another group cheated the same technician. This time for 240 thousand. In 2023, he worked with a group that specialized in pensioner cards. They bought databases with card data from people over 70 years old and robbed them of their pensions. The average theft amounted to 800 to 2000 dollars. Pennies for us, the last money for them.
When I asked the curator if he felt sorry for the elderly, he replied. They will die soon anyway. And we need the money now. During my work, more than two hundred drops in different countries have passed through my schemes. Do you know how many of them avoided problems with the law? Zero. Sooner or later, everyone was caught. Students received suspended sentences and deportation. Immigrants were jailed for two or three years. Drug addicts who were used as couriers received full sentences because they could not hire normal lawyers.
And we found new ones. There were always desperate people back then, ready to do anything for quick money. 90% of carders do not know how to program. They buy ready-made scripts on forums, use other people's tools, work according to the schemes that were sold to them. Real technicians are few and far between. The rest are ordinary scammers who learned to use ready-made tools.
No fight against the system. Just stealing. In four years, I made $ 3.7 million. Bought real estate, cars, invested in cryptocurrency. But I lived in fear every day. Every doorbell could be the police. Every message could be a threat from competitors or dumped partners. I had no friends. In this sphere, there are no friends, only exploitation. I hid my family from everyone. My mother still thinks that I made money on IT consulting.
By 2024, I realized that enough was enough. I had saved up enough to live in peace. But I can’t just disappear. I know too much about too many people. I saw how those who tried to leave received offers they couldn’t refuse. One guy who decided to quit in 2023 was found beaten in the entryway of his apartment a month after he left. They broke both his arms and said, “If you want to talk to the police, we’ll find you anywhere.”
So I left quietly, gradually winding down operations, transferring money to safe assets, preparing to disappear completely. My last operation was November 12, 2024. I bought a batch of iPhone 16 Pro. Sold 47 thousand in Russia for 4.2 million rubles. Never touched the stolen cards again.
But why am I telling you all this? Not out of a desire to save or re-educate anyone. I’m just sick of movies and videos about cool hackers in black hoodies. Carding is not romantic. It is a dirty business where people cheat each other for pennies, use the desperate as expendable material and steal the last money from pensioners. In general, I believe that carding is close to the drug business in its essence. Want to get rich? Study programming, create startups, trade on the stock exchange.
Any legal way to earn money is better than living in constant fear and surrounded by such people. And if you still decided to get into carding after my story? Don't say later that you were not warned. I found this story on one of the closed forums on the Darknet 5 months ago. The post was published by user Pai23 in March 2025 and gained more than 500 comments.
Most of the commentators confirmed the details described in the story. The technical aspects of using AI in carding and schemes for working with the Russian market were especially actively discussed. Which confirms the fact that all the described technologies exist and are actively used. The amount and scale of the operations correspond to open source data on modern carding. What was especially striking was the complete lack of romance in the story. No fighters against the system or digital Robin Hoods.
Only cold calculation, greed and betrayal. The story of Pai-23 shows the real underside of what is presented in films and videos as cool hacker romance. Behind the beautiful picture lies ordinary crime, where people throw each other for money, and the weakest pay for everything. Working with pensioners and using desperate people as drops looks especially cynical.
All these partners and colleagues sooner or later end up behind bars, while the organizers remain in the shadows. I don’t know where Pai-23 is now and whether he watches my channel. But his story is the best warning for those who think about easy money on the Darknet. Reality always turns out to be dirtier than beautiful stories from the Internet. I would also like to remind you that all actions described in the story are crimes under the criminal laws of most countries in the world.
Carding, bank card fraud, money laundering and the use of front men entail serious criminal liability. From large fines to imprisonment for up to 10 years. As the author of the channel, I categorically do not recommend anyone to engage in such activities and insist that this is unacceptable. Sooner or later, any criminal scheme leads to disastrous consequences - arrest, imprisonment and the destruction of life. This story is published solely for educational purposes, to show the real risks and consequences of criminal activity on the Internet.
Remember, no amount of money is worth lost freedom and a ruined future. If this story made you think, then put stories from the dark corners of the Internet that will show you a world without beauty. In the meantime, take care of yourself and remember, quick money always costs too much.