Antifraud systems against carding and carders

Tomcat

Professional
Messages
2,689
Reaction score
929
Points
113
Year after year, sites update their security systems, and year after year we try to select the right “keys” for them. In this article we will look at the basic components of anti-fraud systems (an article about the optimal system for work will be published on the channel soon). Anti-fraud systems work everywhere and the instructions in this article are suitable for everyone.

How the antifraud (fraud protection) system works:​


1) When entering the site, the system checks:

- your IP address

- your system identifiers

- your browser identifiers

- connection identifiers

- cookies

2) Next, during registration, the system checks:

- email (how long ago it was created)

- fullz data (if people have already registered for it more than 2 times, this is not good)

- phone number (real or virtual)

3) After registration:

- fraudulent actions

And now, in order:​


- Do we need to know all the identifiers that the anti-fraud system checks?

- In short, no


Most of the work has already been done for us - they have created antidetects.

There are different types of antidetects - browser-based and system-based.

Browser antidetects replace browser identifiers (and they look like a browser)

System antidetects replace identifiers at the system level (and look like virtual machines)

The best option to work with are system antidetects (since identifiers are replaced at the system level)

- What about the IP address?

Basically, when working, several types of connections are used to change IP:

1) Proxy

2) VPN (pptp/openvpn)

3) SSH

Each of these connection types has pros and cons:

VPN is expensive (from 5 to 15$) | average work time from 2 weeks to a month | low risk of leaking real identifiers

SSH - cheaper than VPN (from 2 to 5 $) | average working time is about 3-5 days | average risk of leaking real identifiers

Proxy is the cheapest option (from 0.5$ to 2$) | average operating time 1 day | high risk of leakage of real identifiers

Which type of connection is right for you:

- for long-term work, for example with ebay/paypal (vpn/ssh)

- for short-term work, for example, driving into a shop (proxy)

Also keep an eye on the fraud score indicators when purchasing a proxy/VPN/SSSH (you can check it at ipqualityscore.com, 0-28 clean IP)

- What about the phone number?

There are 2 types of numbers: virtual and real

Many shops/systems know what number you have

And if you have a virtual number, no matter how you look at it, they will give you fraud points

Therefore, it is advisable to use real phone numbers so as not to receive additional fraud points

- What about the e-mail?

I don’t know many, but e-mail, like IP, has its own speed

It is expressed in a slightly different way: mail is checked for registration in large services (Facebook, Google, various stores, etc.)

The more registrations the better.

E-mail is also checked for the creation date. It’s the same here - the earlier it was created, the better

It is advisable to buy mail, you will find the stores you need on the forums

- What about fullz/documents/?

When buying a kit from someone unknown, you have to ask yourself: Is the kit sold to the same person? The answer to this question is very difficult to get and it’s all about trust.

If a dozen accounts have already been registered with fullz data in the same Paypal, then you should definitely wait for additional checks and you will definitely get fraud points (from which you will never get out, no matter what ideal system you have and no matter what ideal IP you choose )

- What about cookies?

Cookies are some data that a website records in your browser. It is with the help of cookies that you can get, for example, into your VKontakte account without entering a password

Cookies - greatly increase trust when visiting a site (if these are cookies of this particular site and this particular user)

Cookies from other sites also increase your trust, as they provide information to the site - the user is registered not only with us, but for example on Facebook, Amazon, eBay, PayPal, etc. (or at least he visits them)

But even using cookies, you should not forget about a good IP address and a well-configured system, so as not to catch more fraud points than there are trust points

Fraud - what is it and how to minimize it?​


Fraud points - points for the risk of fraud on your account. If you accumulate a lot of points, checks/blocking begin

Fraud points are accumulated from the moment you visit the page. All systems - for different amounts of fraud points - have different checks, etc.

For example, you decide to register somewhere:

The system checks your IDs and finds out that you have a regular virtual machine without replacing IDs - this plus 50 fraud points

Next, the system checks your IP address and finds out that it is dirty and fraudulent activities were committed from it - this plus 30 fraud points

And now you register in the system, also using the used fake - this adds another 20 fraud points

So in the end, what do you get? Ideal ready-made account? No, you are getting blocked from this account. Although you haven’t actually done anything yet (as you think). And it was built into the system that when you collect: 70 fraud points - they ask you for documents, 100 fraud points - your account is blocked.

Another situation: (ideal)

You register in the system from an ideal virtual machine, but the fraud system still found something to dig into and gave you 20 fraud points (because the system states that the minimum fraud points are 5 and they are only on the latest iPhones when registering from the application)

Use a VPN with good speed and good connection (no leaks) - another 10 fraud points (just for action)

Use a real phone number, mail with good speed - another 5 fraud points (just for action)

If you use a good fullz that no one has registered for yet - another 5 fraud points (just for the action)

In total, upon registration (like any person) you receive a small number of fraud points (in this case - 40)

Next, you buy a product/service for $10 and the system adds 10 fraud points to you, but these are slightly different fraud points. Fraud points upon purchase - if everything went well, they are removed after some time, and trust points come in their place (from this purchase, for example, a week later you received 5 trust points). And at this stage you have an account with the same 40 fraud points and 5 trust points. After making a dozen more such purchases and warming up your account in a couple of months, you will get an account in which you will have more trust points than fraud. And do you think the system will treat you more trustingly? And will it allow you to do more fraudulent actions? (For example, a purchase/deposit of $1000-2000). Of course yes!

Fraud points and trust points in the examples are just the author’s invention because large companies do not disclose the systems they use to analyze users. Some companies are more loyal to a dirty IP address, some to freshly corrupted mail, and some don’t care about all these identifiers at all.

When working, analyze how the system looks at you (and it is vigilantly watching you). Try to make perfect connections from system + IP + e-mail + real number, etc.

All the best and good work to everyone.
 
Last edited:
Top