Carding is a type of cybercrime involving the use of stolen credit or debit card information to make fraudulent purchases, most often for the purpose of obtaining goods or money. A key element of these schemes is the use of drop addresses —temporary delivery addresses that help conceal the identities of the fraudsters and make them more difficult for law enforcement to track. In this answer, we'll explore in detail how carding networks use drop addresses, including real-world examples, how they work, the risks involved, and how to counter them. This description is intended for educational purposes only, highlighting the complexity of these schemes and the importance of cybersecurity.
Drop addresses can be:
This case illustrates how drop addresses allow for scaling operations while minimizing risk for the primary organizers.
If you would like to delve deeper into a specific aspect (such as the technical details of anti-fraud systems or the legal implications of drop addresses), let me know!
What are drop addresses and why are they needed?
A drop address (or simply "drop") is a delivery address that is not directly associated with the scammer conducting the transaction. The main purposes of using drop addresses are:- Anonymity: Hide the real location of the carder.
- Chain Breaking: Makes it more difficult for law enforcement to track by delivering the goods to an intermediate address.
- Scalability: Allow carding networks to process multiple orders simultaneously while minimizing the risk of compromise.
Drop addresses can be:
- Physical addresses:
- Apartments or houses rented or owned by hired participants ("drops" or "mules").
- Abandoned buildings, mailboxes or fake offices.
- Reshipping services: Companies or individuals who accept parcels at their address and forward them onward, often unaware of the fraud.
- Virtual addresses: Post office boxes (e.g. PO Box) or warehouse addresses used for temporary storage.
How Carding Networks Use Dropped Addresses: A Step-by-Step Process
Let's look at a typical carding scheme using drop addresses, using real-life examples from cybercrime investigations (e.g., reports from the FBI and cybersecurity companies like Group-IB, up to 2023, taking into account current trends).Step 1: Obtaining card data
- Data source: Carders purchase stolen credit card data on dark web forums (such as Genesis Market, which closed in 2023, or similar sites). The data includes:
- CVV (card number, expiration date, CVV code).
- Fullz (full details: name, address, SSN, sometimes PIN codes).
- Price: From $5 for a basic card to $50 for a "fullz" with a high credit limit.
- Theft methods: Data is obtained through phishing, ATM skimmers, leaks from retailer databases, or malware (such as infostealers like RedLine).
Step 2: Checking the cards
- Carders test cards to ensure they are active:
- They make small purchases (for example, $1–5) on sites with a low level of verification (donations, subscriptions).
- They use automated bots for mass verification (checkers), which emulate purchases through store APIs.
- Once validated, cards are selected for large purchases.
Step 3: Making Purchases
- Purchasing goals: Carders choose highly liquid goods that are easy to resell:
- Electronics (iPhone, MacBook, game consoles).
- Gift cards (Amazon, Walmart, iTunes).
- Jewelry, designer clothes or shoes.
- The order amount is usually between $500 and $5000 to avoid suspicion.
- Technical tricks:
- Use a VPN or proxy to mask your IP address.
- They register accounts on retailers (Amazon, eBay) with fake data that matches the card data.
- Sometimes security systems (AVS - Address Verification System) are bypassed by substituting the delivery address or using cards with the same billing address.
Step 4: Using a drop address
- Drop selection:
- Hired Drops: Carders recruit people (often through Telegram or the dark web) to provide their addresses. Drops receive 10-20% of the package's value. These droppers may be students, unemployed people, or people unaware of the scam (for example, believing they are participating in a "legitimate transfer").
- Abandoned addresses: Empty houses or apartments are used, where packages are left at the door (the "spoiler piracy" method).
- Reshipping services: Front companies or individuals who, for a fee, accept parcels and forward them. For example, in the US, services that ship goods to Russia, Ukraine, and Eastern Europe are popular.
- Logistics:
- The parcel is delivered to the drop address via standard services (USPS, FedEx, DHL).
- The drop confirms receipt (sometimes by scanning the parcel for the carder).
- The parcel is repackaged and sent to a new address (e.g., overseas) using prepaid labels, often stolen from postal service systems.
Step 5: Forwarding and Cashing
- Shipping: The item is shipped to its final destination (e.g., Russia, China, or the CIS countries) via postal services or couriers. Sometimes a chain of multiple drop addresses is used for additional anonymity.
- Sale:
- The goods are sold on the black market, through Telegram channels, local marketplaces, or dark web platforms.
- Price: 30–50% of market value (for example, a $1000 iPhone sells for $400–600).
- Cashing out:
- Money is transferred via cryptocurrency (Bitcoin, Monero) or fictitious bank accounts.
- Sometimes "cashiers" are used—people who cash out money through a chain of transfers to confuse the trail.
Real-World Example: Infraud Network and Dropped Addresses
Case Study: The Infraud Network (2010–2018) The international carding network "Infraud" (slogan: "In Fraud We Trust") used drop addresses for large-scale fraudulent operations. According to the FBI, the network caused over $568 million in losses, and its members were active in the US, Russia, Europe, and Asia. Here's how they used the drop addresses:- Organization: The network had a hierarchy: leaders, carders, droppers, and cashers. Droppers were recruited through forums like Carder.su.
- Scheme with drops:
- Carders used stolen cards to purchase electronics (such as Dell laptops) through American online stores.
- The goods were shipped to the addresses of dropshippers in the US, often hired mules recruited through "work from home" ads.
- Dropshippers sent parcels to Russia or Ukraine through shell reshipping companies, disguising them as legitimate trade.
- Volume: The network was estimated to process thousands of packages monthly, using hundreds of drop addresses.
- Exposure: In 2018, the FBI arrested 36 network members, including the organizers. The droppers often found themselves manipulated, unaware they were participating in a crime.
This case illustrates how drop addresses allow for scaling operations while minimizing risk for the primary organizers.
Current trends (2025)
With the development of technology, carding networks have adapted:- Automation: Telegram and darkweb bots automate card purchases, verification, and orders. For example, bots like "UniCC" (before its shutdown) and similar bots simplify access to data.
- Cryptocurrency: Used for anonymous payments with droppers and cashers.
- Social engineering: Drops are recruited through fake job postings on social networks ("shipping goods for a percentage").
- AI and ML: Fraudsters use AI to target vulnerable stores or bypass anti-fraud systems (e.g., faking AVS data).
- Globalization: Drop addresses are now more often located in countries with less strict controls (such as Southeast Asia or Latin America).
Risks and consequences
- For victims (cardholders):
- Financial losses (although banks often return money via chargeback).
- Leakage of personal data, which may lead to further fraud.
- For drops:
- Hired mules often do not realize they are participating in a crime and risk criminal prosecution.
- In the US, for example, using an address to commit fraud can result in charges of mail fraud (up to 7 years in prison).
- For retailers:
- Chargeback losses and reputational risks.
- Costs of strengthening anti-fraud systems.
- For society:
- Rising prices for goods due to losses of retailers.
- International logistics are becoming more complex due to checks.
How to prevent carding and the use of drop addresses
For users:
- Transaction Monitoring: Get bank alerts for every transaction.
- Strong passwords and 2FA: Protect your online shopping accounts.
- Data storage limitation: Do not save card data on websites.
- Antivirus: Protect yourself from infostealers and phishing.
For retailers:
- AVS and CVV: Check that your shipping and billing addresses match.
- Geolocation: Analyze buyers' IP addresses.
- ML Anti-Fraud: Use machine learning systems to identify suspicious transactions (e.g. Sift or Riskified).
- Order Limits: Set limits on the number or amount of orders from one IP/account.
For law enforcement agencies:
- Tracking reshipping chains through postal data analysis.
- Cooperation with international platforms (Interpol, Europol).
- Monitoring the dark web and Telegram channels to identify the recruitment of money mules.
Conclusion
The use of drop addresses in carding networks is a complex and well-organized process that allows fraudsters to scale operations while maintaining anonymity. Real-world cases, such as the "Infraud" network, demonstrate how drop addresses become a key link in the chain linking data theft, purchases, and cashouts. In 2025, technologies such as AI and cryptocurrency make these schemes even more sophisticated, but stronger anti-fraud systems and user awareness may reduce their effectiveness. This analysis highlights the importance of cybersecurity and caution when shopping online to minimize risks for all participants in the chain.If you would like to delve deeper into a specific aspect (such as the technical details of anti-fraud systems or the legal implications of drop addresses), let me know!