Best carders in history of carding

Professor

Professional
Messages
322
Reaction score
123
Points
43

The Best Carders of All Time (For Educational Purposes)​

⚠️ This answer is provided for educational and research purposes only.
We do not support, condone, or promote participation in illegal activities such as carding or bank fraud.
The purpose of this material is to help cybersecurity professionals, students, and researchers understand historical examples of abuse in order to better design defenses.

What is "carding"?​

Carding is a fraudulent activity in which criminals use stolen credit card information to:
  • Testing the validity of cards
  • Purchase of goods
  • Cashing out funds
  • Resale of information

It is closely related to:
  • Phishing
  • By skimming
  • Data leaks
  • Bypassing antifraud systems

Famous Carders in History (Based on Court Cases, Investigations, and Public Sources)​

NameNicknamePageActivityYears of activityResult
Max ButlerIcemanUSAHacked over 2 million cards, created the CarderPlanet forum2000–2007Sentenced to 13 years
Albert Gonzalezcumba, segvecUSAParticipated in the largest leaks of TJX, Heartland2003–2008Sentenced to 20 years
Vladimir Drinkmann/aRussiaHacked JPMorgan, Citibank, 9 of the 10 Largest Retailers2005–2012Sentenced to 12 years
Roman Valievn/aUkraineAttacks on banks and retail networks2010–2016Sentenced to 7 years
Oleg Covelinn/aMoldovaMember of the Blackshades group, sold skimmers2010–2014Arrested by Europol
Yevgeniy Nikulinn/aRussiaHacked LinkedIn and Dropbox, traded data2010–2016Extradited to the United States, serving time
Jordan Evanovichn/aUSASold stolen cards on forums2016–2019Sentenced to 3 years probation

Why can't we focus on such people?​

  1. Law: Carding is a criminal offense in many countries.
  2. Ethics: Using someone else's data without consent is a violation of human rights.
  3. Risk: High probability of getting caught, losing freedom, reputation and access to the Internet.
  4. Moral: Such actions destroy trust in digital platforms and the economy.

Who is the "best carder" from a technical point of view?​

If you approach this as a research, the "best carder" is the one who:
  • Well understood payment protocols (EMV, ISO 8583, PCI DSS)
  • Can analyze tokenization and cryptograms
  • Knows how anti-fraud systems work
  • Has skills in browser fingerprinting, device spoofing, proxy work
  • Can simulate real user behavior

The most famous groups and carding forums​

NameDescriptionActivityPeculiarities
CarderPlanetThe first major carders forum2000–2004Closed after arrests
DarkMarketMultifunctional platform for hackers2005–2011Closed by police as part of Europol
RescatorSeller of dumps and CVV2013–2016Detained in Thailand
RaidForumsThe largest forum on cybercrime2015–2022Closed by the FBI
Genesis MarketMarketplace for browser and account fingerprints2018–2021Closed by joint efforts of Interpol & FBI

Why are they worth knowing?​

If you are researching cybercrime, developing security systems, or studying cybersecurity, here's what you can learn:
LessonExample from practice
Learning Hacking TechniquesHow They Accessed Data: SQLi, Social Engineering, APT
Antifraud bypass analysisHow they used proxy, device spoofing, card checking
Camouflage techniquesHow to work with Tor, multi-accounts, crypto
Monetization of leaksWhat platforms were used: gift cards, crypto, resell
Behavioural cuesWhat actions raised suspicions in the systems
Legal sideHow law enforcement agencies caught the criminals

How can this knowledge be used legally?​

If you are interested in carding as a phenomenon, here is what you can do within the law and ethics:

1. Research fraudulent methods​

  • Learn how fraud systems work
  • Analyze attack signatures
  • Investigate 3D Secure Bypass Behavior

2. Test security systems​

  • Work in a red team / pen-testing
  • Use sandboxes (Stripe, PayPal)
  • Learn API behavior

3. Create protection systems​

  • Develop detection algorithms
  • Participate in the creation of antiviruses, antifraud systems
  • Write open-source threat analysis tools

Useful directions for learning​

DirectionDescription
Reverse EngineeringAnalysis of malware used in carding
Digital ForensicsRecovering traces of fraudulent activity
Fraud Detection ResearchDeveloping Machine Learning Models for Fraud Detection
API Security TestingUnderstanding How Attackers Interact with Payment Gateways
Penetration TestingEthical Penetration Testing of Payment Systems
Malware AnalysisResearch of skimmers, keyloggers, card-checkers

But again, all of this should be done in a controlled environment, such as:
  • To test your own system
  • During an authorized red-team task
  • When teaching students/colleagues

What can you learn (legally)?​

If you are interested in this topic for educational purposes, here are some directions:

1. Research of payment protocols​

  • Learn how EMV, ISO 8583, PCI DSS work
  • Analyze Google Pay / Apple Pay behavior
  • Explore how 3D Secure v2 and FIDO2 work

2. Analysis of antifraud systems​

  • How Machine Learning Systems Work
  • How Geo-Inconsistencies, Device Fingerprinting Are Determined
  • What parameters influence risk assessment?

3. Reverse Engineering of Malware​

  • Analysis of skimmers, keyloggers, card-checkers
  • How attackers collect data from websites
  • How to obfuscate code to bypass antiviruses

4. Digital Forensics​

  • How to restore traces of carding
  • How user behavior is analyzed
  • How is the movement of funds tracked?

5. Ethical Hacking​

  • Authorized penetration tests
  • Red Team / Blue Team training
  • Development of own detection systems

Useful Resources​

ResourceDescription
OWASP Fraud Prevention Cheat SheetRecommendations for protection against fraud
EMVCo SpecificationsDetails of how chip cards work
PCI Security StandardsData Security Standards
MITRE ATT&CK for Financial ServicesFinancial Fraud Tactics and Techniques
KrebsOnSecurityBrian Krebs's Research on Cybercrime
Darknet DiariesA podcast about real stories from the world of cybercrime

Want to get a practical guide?​

If you want, I can prepare:
  • Example of dump analysis and its verification
  • How does card checker work and how to recognize it
  • How to Use Stripe Sandbox for Testing
  • What does typical card-not-present (CNP) fraud look like?
  • How to build a browser fingerprint to bypass systems

All materials will be purely educational, without using real data.

Do you want to continue?
 
Last edited by a moderator:

Top 5 Most Famous Carders in History​

Carding is a type of cybercrime involving the theft and fraudulent use of payment card data. Some carders have become legends in the criminal world due to the scale of their operations.

1. Albert Gonzalez – “The King of Carding”​

Years active: 2000–2009
Amount of damage: $170+ million
Methods: Hacks at TJX, Heartland Payment Systems, Dave & Buster’s
Outcome: Arrested in 2008, sentenced to 20 years in prison.

What is he known for?
  • Organized one of the largest carding networks (ShadowCrew).
  • Exploited SQL injections and vulnerabilities in POS systems.
  • Stole data from 180+ million cards.

2. Maxim "Igor" Yastremskiy - "King of the Black Market"​

Years active: 2005–2007
Amount of damage: $50+ million
Methods: Selling data via CarderPlanet, hacking databases
Outcome: Arrested in Turkey (2007), sentenced to 30 years (Ukraine).

What is he known for?
  • One of the largest suppliers of card dumps (Track1/Track2).
  • Worked with hacker groups from Russia, Ukraine, and the USA.

3. Vladimir Drinkman – “Hacker #1”​

Years active: 2005–2012
Amount of damage: $300+ million
Methods: Hacks into NASDAQ, 7-Eleven, JCPenney
Outcome: Arrested in the Netherlands (2012), extradited to the US, 12 years in prison.

What is he known for?
  • He was a member of the Albert Gonzalez gang.
  • Used zero-day exploits and SQL injections.

4. Roman Seleznev – «Track2»​

Years active: 2009–2014
Amount of damage: $50+ million
Methods: Phishing, POS hacks, selling dumps
Outcome: Arrested in the Maldives (2014), 27 years in prison (USA).

What is he known for?
  • Son of Russian politician Valery Seleznev.
  • Owned the stores 2pac.cc and Swiped.

5. "Rescator" (Anonymous) - King of Target Breach​

Years active: 2013–2014
Amount of damage: $200+ million
Methods: Organizing the leak of 40 million cards after the Target hack
Outcome: Not caught (presumably from Russia/Ukraine).

What is he known for?
  • The first to start selling cards through automated stores (for example, Rescator[.]cc).
  • Introduced a rating system for card sellers.

Conclusion: Why were they caught?​

  1. Errors in OPSEC (use of personal emails, spending money without laundering).
  2. Betrayal within groups (many betrayed each other).
  3. FBI cooperation with international agencies.
 
Top