Anifraud 2021

MrBuuklau

Carder
Messages
44
Reaction score
12
Points
8
Hello dear experienced professionals!

What are the most relevant nuances in work and bypass with Antifraud system (in staff-card) in 2021?



Regards
 
Online retailers try to eliminate fraud using a range of different anti-fraud tools.
Carders are doing their best to bypass existing anti-fraud technologies. Sophisticated bots and connection tunneling make combating fraud quite challenging.
The anti-fraud suite adapts to emerging threats and the latest trends in carding. The most advanced anti-fraud algorithms built on the basis of extensive experience in the e-commerce, payments and affiliate industry and always analyzes the data of its customers. The security team continues to adapt fraud prevention technologies to stay ahead of carders.

Here's what they do:
1. Evaluate fraud in real time and assign risk points
2. Block duplicate users and misuse of a fake account
3. Track users switching devices
4. Detect bad proxies, free VPN, TOR and bots
5. Detect temporary and disposable email.

Email verification and detection of disposable email address.
Providing a valid email address along with detecting disposable email can greatly improve the quality of carding and make it much more difficult for an anti-fraud system to detect abuse. The system checks for an email address with an email service provider (e.g. gmail.com, yahoo.com, hotmail.com) and determines if the email belongs to a temporary or disposable email service that is often used for malicious purposes. Another feature is the Trap Spam Removal Service, which identifies the honeypots and spam traps used to blacklist marketers. Make sure that you do not use a temporary e-mail box when registering with an online store or a mail box that has been added to the spam list.

In addition, the system also tracks over 50 million fraudulent email addresses that have recently been used for fraudulent purchases and other forms of abuse. This data is critical to identifying users who intend to engage in fraudulent activities. Analyzing the data point of an email address for a successful order is a great way to enhance user verification capabilities.
Do not reuse the email address from which you have already made an order for goods, after which it was canceled and the card was blocked. When registering a mailbox, always register it with the same name and surname of the cardholder, beautiful addresses will most likely already be taken, so add in the end, for example, the year of his birth.

Removing fingerprints from the device
Device Fingerprinting is the world's most advanced anti-fraud tool, providing real-time fraud scores and tagging the user with a device tracking ID. This service is capable of detecting bots, users deliberately tampering with their online fingerprints, and users who intend to behave at high risk. For example, a user in Vietnam hiding their identity with a fake profile that resembles a user in the United States (based on browser, language, IP address, device characteristics, etc.) will be able to bypass anti-fraud filters for many of the most popular websites on the Internet. Fake signatures are often used for fraud and abuse. The system makes it easy to accurately identify high-risk users.
This service is a solution for evaluating users and transactions, as well as blocking illegal traffic in real time. Users can be tracked when they switch between devices or create duplicate accounts. The dashboard reports make it easy to analyze your traffic and identify potential chargebacks, malicious users, duplicate or high risk accounts, ad fraud and click fraud, and any other type of abuse.
Therefore, make sure that you never leave the same prints on your devices. After successful orders, change the data of your device using a program for changing the mac addresses, for example, Technitium MAC Address Changer.
Clean up all the data of your computer or mobile phone using the free CCleaner program.
Do not forget to set the operating system version, keyboard layout, exact time and time zone for the cardholder's address before paying!

VPN proxy detection and IP filtering
Regulate your traffic, do not use public free proxies, TOR, VPN and other low quality connections that make it possible to detect fraudulent activity. Real-time fraud metrics and over 20 data points are returned for every API request, giving you a complete view of the user's risk profile in real time. High-risk behaviors such as fraudulent purchases, fake accounts, and users deliberately spoofing their location are automatically detected. Always get the most accurate results with the lowest false positive rate in the industry. Blacklists are always updated in real time and include the latest jailbroken devices and proxies from botnets, home proxies, data centers and similar sources.
If you use VPN providers, use only one that does not log in and shuffle all your traffic. Do not install jailbroken programs on the device from which you work. If you use a proxy (soks5), do not try to select it for the address of the cardholder and always check for it in the black or spam list.

Here are a few common types of scam filters:
Compliance with AVS / CVV
. These filters check the correctness of the billing address and CVV number of the card before processing the transaction. They can also flag orders where the billing address and shipping address do not match.
Carders register a bank account (enroll), after which they change the address to the one they need, for example, to the buyer's drop address or a drop service to which they order goods from online stores. Thus, this filter is bypassed.
The validity of CVV is checked by donating a small amount on any website, in an automatic checker installed in a card store, or by adding a card to any payment system.

Check speed. Many carders verify the credentials of stolen payment cards by performing small transactions to check if the card is working. Rate filters look for small, frequent transaction attempts and flag the associated accounts or IP addresses.
Therefore, it is necessary to withstand the time period before checking the card for validity and making a purchase in the online store.

Threshold values of the purchase amount. Some filters may simply flag all orders for a specific amount for manual review.

Location of the client. Merchants who know that certain IP addresses or geolocations are frequent sources of fraud can set up filters to automatically block or flag transactions from those sources.
You should not use popular free VPN services or proxy providers.

Risk assessment. The most sophisticated fraud filters analyze multiple data points and assign a score that reflects the likelihood that a transaction is fraudulent. Then, transactions with a high score can be filtered out for further consideration. Many of these filters use machine learning and artificial intelligence to improve the accuracy of their estimation algorithms.
It is necessary to pretend to be a respectable buyer, surf the store, read product reviews, "fill" cookies, add items to the cart, ask banal questions about delivery to the store's support, that is, behave like regular users.

These are far from all the methods of work of anti-fraud, in more detail how to work correctly and bypass the protection system will be described in the following posts.
 
Interesting materials on this topic:

Please use the search and you can find many more interesting and useful information, as well as possible ways to bypass the anti-fraud system.
 
Anti-fraud bypass

We keep our Android settings for dirty and not so things for the present / future.

At the very beginning, make sure you have root permissions on your bucket. The KingRoot app covers almost all devices.

1) Download Firefox, enter about: config in the address bar. A page with a search form will open, write there: media.peerconnection.enabled

And accordingly, we transfer it to the false mode. Thus, we rid ourselves of the annoying WebRTC, which merges the real IP to the anti-fraud systems.

2) Go to PlayMarket, download software:

SSH Tunnel - tunneling software, a replacement for the familiar Bitvise

Phone id changer - software allows you to change UUID, HWID, IMEI and other parameters. We use the paid version, we pay for the purchase with the help of CC training. (Easy bypass of the iron ban)

Fake GPS - allows you to set the coordinates under the ZIP at startup will ask you to allow the use of fake GPS coordinates in the settings.

ProxyDroid is a replacement for the Proxifier you are used to for Windows.

I advise you to take VPN "Seed4.me"
 
Top