Carding 2024

Carder

Professional
Messages
2,619
Reaction score
1,903
Points
113
- To become a carder, you need a sledgehammer and a laptop. You break the ATM with a sledgehammer and take the money. - Why a laptop? - What kind of carder are you without a laptop?" - Bearded anecdote

"- What happened to the money in my card account? - They were stolen ..." - Dialogue with the bank's call center


Carding is scaming! highly intelligent gop-stop. The method of taking money away from users of colored plastic. Epic business on a global scale. In the vastness of " these Internet of yours ", hacking, scamming and phishing are widely walking hand in hand. Persecuted by the law.

Content
1. Reasons for popularity
2. Carder's dictionary
3. Educational program
4. Track + PIN = Money
4.1 How does it work
4.2 Safety engineering
4.3 What to do if fucked up
4.4 How about participating?
5. Track + plastic, similar to real = product
5.1 How does it work
5.2 Safety engineering
5.3 What to do if fucked up
5.4 How about participating?
6. Caring in Web
6.1 How does it work
6.2 Safety engineering
6.3 What to do if fucked up
7. Carder stole corals from carder
8. Close relatives
9. Other problems with cards
10. Notes

Reasons for popularity

There are three of them:
1. Technology as outdated as mammoth shit. It was possible to remove information from the card back in the 80s of the last century with the head from the Mayak-232 tape recorder , let alone the current age of gadgets. Since the 90s, the topic of switching to chip cards has been chewing, which are getting better and better, but such hundreds of oil are needed to replace equipment that no one cares about losses from carders. It is already actively retiring to a well-deserved pension, due to the fact that Sberbank has already distributed cheap chip payers, and cashiers and refuellers have been weaned to keep skimmers because of plugs from banks;
2. General idiotism of card holders, that is, 95% of the population, PayPaling cards anywhere without any hygiene and driving numbers in any e-shop;
3. Indifference of servants, primarily shop assistants. Pendos conducted an experiment: there was a photo of a white fapable deffka on the card, and the card was purchased by an elderly nigra of a peasant sex , 80-90% of purchases were successful. You don't even need to mention the verification of micro-printing, signature on the card and / or special characters. However, the camera is now even in the most musty wine room, and therefore the police can just look at this nigra and increase the number of disclosure if the deffka notices the loss in time (and she will notice: banks are spamming notifications to the phone, which unfortunate cardholders cannot turn off)

Carder's dictionary

ATM - Automatic teller machine. Slang - loot.
CC, cardboard - credit card
Carder (Cardboard driver) - person who makes purchases with stolen credit cards in electronic stores. And this is really not such a simple matter. In order not to be burned, you need to sit under the American version of Venda, make purchases at a certain time, climb through the Pindos proxy (the closer to the cardholder, the better), etc. important little things.
Track - magnetic stripe data. In addition to the card number, it contains service information, without which the electronic use of the card (in terminals) leads to a failure.
DP (dump + pin) - track + PIN.
Drop (mule) - a dummy to whom the goods ordered in an electronic store on a stolen credit card come. Most often they are nigras or roving immigrants. Less often - naive housewives.
Fraud - illegal operation. Another name for carding.
Card-holder (CH) - real card holder. The cardholder is always a bank.
Chargeback (money back) - a procedure for withdrawing money back in the event that the cardholder noticed something was wrong.
Ripper - carder thug who does not hesitate to fool his own colleagues in the criminal business.

Educational program

So you became a happy holder (yes, the card is the property of the bank, and you were given a hold on it) of a bank card. They handed out a nice or not so nice piece of plastic and a cunning envelope - it is believed that its contents cannot be seen in the light - with a piece of paper on which there are four numbers. These four digits are called the "PIN" and are always needed to receive money from an ATM, and also - for some types of cards - for cooking in stores. There is a number on the card and a magnetic stripe with the same number and something else. On the reverse side there is a place for signature and CVV / CVC-code [1] , which is used when paying, for example, in online stores. More and more often, there is a chip on the cards.

The card can be used like this:
1. Take money from ATM. This sophisticated mechanism will read the magnetic stripe, ask for a PIN code, and give out crispy pieces of paper. Hence the conclusion is as simple as twice two formulas: track + PIN = loot;
2. Go to the store and buy some junk. In 99% of cases, a PIN is not required, but the card will be rolled in a piece of hardware and the track data will be checked. Formula two: track + plastic, similar to real = product;
3. Go to the pron-site, enter the card number, perhaps they will ask you something else, and fap while the money flows out of the account. Formula three: card number + information about the owner = some profit in the network, but you still need to get rid of it and transfer it from the virtual world to the real one.

Below we will look at these magic enrichment formulas in more detail.

Track + PIN = money
Skimmer disguises itself as an anti skimmer

How does it work

There are several methods that allow you to get track and PIN cards in one bottle. The most famous:

1. Fake ATM. A written-off piece of iron is bought in the trash heap, a simple software is washed and poured, which can display three phrases on the screen: "Insert a card", "Enter a PIN code", "Sorry, the ATM is temporarily out of order." Loch shrugs and goes to look for a working ATM.
2. Lebanese loop. A funny-shaped loop, cut from film, is inserted into the throat of an honest ATM. Loch inserts the card, and ... And nothing, the card is neither here nor there, the ATM writes some kind of crap. Then, SUDDENLY, a friendly aborigine appears, who explains in broken language that yes, the ATM works somehow strangely, he has come across this and is ready to help. In the process of helping (in freeing the account from money), the aborigine asks for a PIN code. Then he shrugs, saying it didn't work out. Loch crumbles with bricks and leaves to call his bank. The native pulls the "string", receives a card, he already knows the PIN. Naebalovo of this type is common in all resort churkestans, from which it got its name. Without an accomplice in the bank, who must turn a blind eye to alerts on reader failure, it is poorly implemented.
3. Skimming at ATMs. A simple gadget is hung on the reader's throat that reads cards when they are inserted. The PINs are removed either by a keyboard overlay or by a nearby camera. Now the most common method, so widespread that banks on the screensavers of ATMs draw the correct view of the reader and keyboard, with a warning - if the ATM does not look like this, then do not insert the card and call the specified number. Examples are here.
The resulting tracks are recorded on discs. Since they will be inserted into a piece of iron that doesn't give a fuck about beautiful drawings, white blanks are often used. Hence the term white plastic . White plastic is a carder's blue dream, the quintessence of carding, a philosopher's stone, bljad turning into gold with a snap of your fingers.

Safety engineering

  • Never tell anyone the PIN-code of the card, repeat the mantra 50 times before bedtime. Bank employees do not need it, since it is not stored anywhere, even in a closed form.
  • Pay attention to the reader and keyboard, as written on the ATM screensavers.
  • Enter the PIN-code so as to exclude peeping, including by surveillance cameras.
  • Do not use unknown ATM machines in the driveways.
  • Do not store the recorded PIN together with the card. Especially gifted people write it on the map, if only the door to the apartment was opened and the announcement was hung: the door is open, the money is in the nightstand.
  • A recipe for married people: your pin codes are on a piece of paper in your wife's wallet, hers is in yours. Forgot - call and ask. Lost your wallet - it doesn't matter. Relevant for holders of several different cards. Probably awkward from the other half, but that's a completely different story.
  • If the type of card does not provide for entering a PIN in trade, send cashiers in the store to somewhere, since a considerable part of the PIN + track sets comes from "upgraded" POS terminals. It should be especially noted here that in these your Europeans it is easy to run into terminals that do not care that the card does not provide for entering a PIN: it will ask you anyway. In some cases, even the absence of a chip on the card will be a reason for sending on an erotic journey on foot. So it is necessary to look at the situation and do not fall into unnecessary insanity about entering a PIN code in trading terminals.

What to do if fucked up

If there is little change in your pockets for a bottle of cheap vodka, buy, drink and go to the moon. But before that, call your home bank and shout that the transaction is not yours , run to the police, then with a statement - to the bank office. Bank employees will tell you what to do and how to do it, although reluctantly.

It is believed that pin transactions are not fought off either by the rules of payment systems or by the Civil Code, since a PIN is an analogue of a handwritten signature, but this is a lie. It is believed that they fight back on the basis of other evidence, for example, not your face on a security camera (and that happens in almost any ATM). But this is also a lie.

From January 1, 2014, nothing needs to be proven, the bank is obliged to return the money if it is notified in writing no later than the day following the day of theft that you were fucked. And the bank itself is obliged to sue you and prove that you are a fraud. If he succeeds, of course.

How about participating?

Remember, my young friend with criminal inclinations, collecting tracks and PINs is 99% of the deal. To convert them into grandmas is a petty insignificant garbage. Guys who can pull off such a combination do not need helpers, unless they hire a homeless person who will light up his unshaven face in the surveillance cameras for a fofirik when withdrawing money.

Track + plastic, similar to real = product

How does it work

1. Tracks scamper skimmers. The term refers to both the gadget and the people involved in this black business. As a rule, these are servants at gas stations and in feeders.
2. Fake. With the modern level of printing, it is possible to forge a card, but you will have to invest several tons of greenery in the equipment. Somewhere to buy holograms and special symbols for the embosser.
3. Shopping is done by youngsters who decide to cut the dough in an easy way. It turns out for a while, until the first attentive cashier. Then a completely different life begins, in which the words "lawyer", "court", "maybe conditional?" Consumable material.
4. Sale of goods. Everything is simple here, there is something unnecessary that is being sold. Anonymous non-moralphages are happy with the opportunity to purchase a device for 50% or 30% of the cost.

The scheme is multi-stage, so there is a clear specialization. Of course, someday the gloomy guys will figure out that the cards are compromised at such and such a point, so skimmers prefer seasonal work or places with high turnover. Individual people print the cards. Carders sometimes come across. Much less often they cover up the printing house, then FBI is promoting itself and proves that it is not in vain that it eats the bread of taxpayers.

In the last decade, this scheme has somewhat tarnished, as compared to network carding it requires more fuss. However, it is still flourishing .

Safety engineering

Find a piece of paper with the rules for using the card, in it find the words "it is forbidden to transfer the card to third parties, it is forbidden to lose sight of the card during payments." Now remember how many times a week you violate this at gas stations and in vomiting? Paranoid advice: if the card is not settled in front of your eyes - pay in cash, give a tip to Chaldea, it will be cheaper.

What to do if fucked up
In this case, you can do without vodka.

Rule 1: the sooner you find out that the money has been flooded and report it to the bank, the more likely it will be returned. Regular checking of statements and SMS-informing will help here. Don't be lazy, after calling the bank, tear your ass off the chair and go and write a paper statement. The bank has the opportunity to return the money if the deadline is not over. Having returned them to himself, he will gladly return them to you. If the deadlines are gone, or the bank is doing plastic stuff, the bank will have to be returned from their own, and they don't like that.

Rule 2: your relationship with the bank is governed by the Agreement and the laws of this country. Don't give a damn about the rules by which the bank itself plays these card games. Memorize articles 847 and 854 of the Civil Code and prove - first in the bank, then in court - that the write-off was made without your order. Prove - the money will return.

How about participating?

Take part. If you have no brains, buy a fake and try to stock up. Don't forget to set aside your lawyer's stash.

Carding in Web

How does it work

The fun times, when only pron was sold on the Web, and you could download it by simply counting the Luna code, are long gone. Now on the Web you can sell anything, even the Motherland, even the sky, even Allah, and buy accordingly. But, driving letters and numbers from the map into the mold on the screen, few people think about the question - what prevents to drive the same letters and numbers to another person. That's right - just ignorance of this data, and nothing more.

Step 1. Where to get card data

  • Phishing or, in other words, fake sites, fake bait that stupid but fatty fish bite. Most often they make a fake porn site. A wanker visits him, sees an inviting advertisement "porn for a whole month for only $ 0.99", and as a result, much more disappears from the account. Yes, and with prong it is usually also a fly-by - and its resources in our time are full of free ones .
  • Hacking an online store. A hacker or bribery of an employee of this store in order to obtain the necessary information. There is also some intermediate option - for example, a burnt-out tyrnet store is specially bought inexpensively along with all the bases of real purchases, a ftopka store , and the base is used.
  • Use of official position. Pizzing data by a processing employee.
  • Social engineering methods:
  • By mail. A letter is written (with all sorts of headers, pictures, links to websites, etc.) like: “Hello, our bank is switching to a new database from the first day of next month, so please fill out the attached form and send it to suppart@narod.ru Thank you for your cooperation. Form 7B-2 Full name: ____ Address: ____ Card number: ____ ".
  • On the phone: “Hello! Hello, this is Ivanov, a bank employee. I'm calling to clarify your order. Did you really order a herd of elephants? How did you not order? What's your credit card number? Exactly. What is your name? Wow, it also converges. Okay, don't worry, I'll cancel your order. " Loch himself will blurt out all the information and say thank you.
  • Specially sharpened Trojans and Virus.

Step 2. Laundering and withdrawal of profit

Through "laundries": any systems that allow you to both get money from the card and withdraw:
  • Auctions. Selling from one account to another some HEX.
  • Electronic pseudo-money systems (electronic wallets).
  • Electronic casinos, poker rooms, bookmakers.
  • Through real goods. They buy a highly liquid product that is easy to sell (as a rule, equipment). The addresses for which the order is made are called drops. Finding the right drop is the most difficult task in this scheme.
  • Through virtual goods. Hosting services are bought, a server is rented, domains, shells and so on are bought. All this stuff is sold to naive users through electronic payments.

Each participant has his own narrow specialization. A person who has the intellect and hands suitable for collecting card data will never waste his time driving, the driver will never indicate his real address in the order. Drops do not know how to do anything, so they have to communicate with the bloody gebney.

Safety engineering

1. All information necessary for making a payment is printed on the card. Therefore, shine the map less. Sending a scan of both sides of the card is like sending all the money.
2. Pay by card only on well-known sites with serious business. For other places, use e-wallets.
3. Enter data only in the window with an SSL connection (in the http s address line), make sure that the server certificate is verified by the browser.
4. For online payments, it makes sense to have a separate card with a separate account. For example like this:
- We set up a second account in the same bank, issue another card linked to this account. Many banks allow issuing a “virtual” card, which can only be used to pay on the Internet. This is exactly what we need.
- When opening this second account, repeat 150 or more times the phrase "OVERDRAFT ON THE ACCOUNT MUST BE ZERO! 111".
- Now, if we want to pay on the Internet, we go to the Internet bank of our own bank, transfer the required amount + 10 re to the second account, pay with the second “virtual” card.
- Thus, if these cards are leaked to the side, we risk only the balance on the second account. Bingo!
5. Wash your hands before eating and update your antivirus.
6. Some banks allow you to flexibly configure card limits: maximum for online purchases per day, maximum withdrawal from an ATM and maximum purchases in a store. In combination with SMS-monitoring of transactions, this is a good way to reduce risks to these amounts. Since large purchases are usually rare, before each one you can call the bank in advance and authorize a specific large transaction. A little more hemorrhagic, but on the other hand, you won't lose more limits, plus, with small limits, the bank will easily return the stolen funds (sometimes the security service of the bank will not even bother with the investigation, but will simply refund from its account, but you should not abuse it - often canceling payments on the card will fall under vigilant surveillance).
7. Some banks in the "Mobile Bank" and others like it offer activation of payments on the Internet via SMS only for one time. Before buying, you activate payments on the network, make a purchase, after which purchases will not go through without your next permission.
8. For payments via PayPal - many online banking services have the function of blocking online transactions. Therefore, by default, we keep the card blocked, even if a certain kulkhacker wants to, he sucks dicks online. To pay: we go to Internet banking, unblock, pay for the purchase (payment on a PayPal usually goes through immediately) and immediately after that we block Internet transactions.
9. Having lost the card - BLOCK IMMEDIATELY. Why - it is not worth explaining if you have read the article to this point.

Carder stole corals from carder

As an alternative to network carding, it is a scam of the carders themselves, more often of under-carders-suckers. Profit, of course, is not much, but for a shkolota it is just that. The main thing is that it's safe, thrown fuckers-carders will not declare anywhere. Well, the moral phage can be happy.

Threw picks on forums, he is willing to buy something Nuba - it is easy to identify by the number of posts on the forum, as well as the style of ads - contact with him, it is the "seller", which is just what you need. Next comes the process of divorcing the grandmother, since the grandmother is always paid in advance in the transaction. A noob, as a rule, does not know about basic security measures, such as checking his reputation, guarantors, guarantors, etc. If he does, then it is better to look for a new one right away.

An experienced thug, seeing that she had stumbled upon a newcomer, launches a worked-out scheme - chatting amiably, as if by chance begins to remember herself at the beginning of the Great Way, how he got the first income from carding, what he bought, where he went to rest, etc. Noob , naturally, associates himself with the interlocutor and wants to buy everything he needs even more. The purchase amounts are very different - from $ 20 to $ 1000- $ 3000. It happens that the sucker even collects money in debt, just to pay the scammer.

Experienced scammers have a lot of tools in their arsenal: amateur photos of white plastic, encoders for recording on magnetic strips, photo of credit cards, screenshots of stolen cardboard bases, with blurred numbers, essno. All this is slipped to a noob if he wants to see evidence of the goods. If the goof wants a cardboard base, then you can simply create a text file, calling it "USA_creditcards_visa_valid_new.doc", drop it there to create the volume "Crime and Punishment" by Dostoevsky, then into the RAR-archive under the password and to the sucker's mail. To get a password, you have to pay a grandmother to a scamper for a base, about $ 200-300. In situations when a goof wants to buy a skimmer, white plastic or an encoder, a photo of the desired item is slipped into the goof, then they agree on the shipment - DHL, FedEx, UPS, Pony Express. Then I threw a photoshop screenshot "from the postal company site", in which the site itself and a photoshoped plate or the text "shipment accepted for dispatch" are visible. It is preferable to initially declare to the sucker that the scammer lives over the hill, so that the sucker is not aware of the parcel tracking interface on the company's website, and the company must be chosen not very common in the Russian Federation, definitely not EMS. Further, they demand a dough from the sucker, threatening to "cancel the further delivery of the parcel." Tracking number is not given "for security reasons". Loch seesthat the parcel has already been sent and happily pays.

Actually, that's the whole simple kidalov process. There is also a scam not for grandmothers, but for stuff like cardboard bases. You need to have working scammer cards on hand, because when selling large databases with credit card numbers, the sucker often asks you to "give 1-2 for a trial." This is where these numbers come in handy. When a goof himself tests the product and sees that it WORKS, then nothing will stop him from giving money to you.

Pros of rippers:
  • Security - scamming can be done without fear of a bloody gebney, "computing by IP", claims of banks. No thrown carders will ever get you, especially if you are from Sukhodrishchensk, in the Mukhosran province.
  • The process itself is extremely fun if you are creative. The thrown fuckers start to shit with bricks, write tons of angry messages, you can start trolling them, calling yourself a sort of Robin Hood defending the rights of credit card holders.
  • Some kind of profit, you can have your $ 20-40 per day if you sit tightly at the computer, the main thing is that my mother does not know and does not forget to pay for the Internet.

Cons of rippers:
  • Rippers doesn't make a living. But for pistachios with beer, kebabs in nature are enough.
  • More and more suckers are demanding a guarantor, a person with an impeccable reputation, a moderator who will act as an intermediary.
  • Electronic payment systems are becoming more and more secure, fewer new carders - fewer suckers to throw.

Other problems with cards

Double write-off
Wry-handed cashiers have a habit of writing off the amount twice.

How to fight:
Check the amount.
Sign only if the amount is correct. Otherwise, demand the cancellation of the operation and a new one for the correct amount.
They will give two checks to sign, but one must be kept for yourself. It is advisable to make sure that these are receipts from the same transaction: the transaction number and authorization code are the same.

Blocking money
In Europe, car rentals and hotels like to block a certain amount of money on the client's account to insure their risks, to block it, not withdraw it. Everything would be fine, but they sometimes forget to remove the lock, reasoning that it will dry up - it will fall off by itself. It, of course, will fall off, in 30-45 days, but this is little consolation if you cannot use your money, which you counted on here and now.

How to fight:
Keep in mind such quirks and a certain supply of money in case the lock is not removed.
When returning the car or leaving the car, I wanted to remind the service staff so that they would not forget to unblock the money.

Counterfeiting checks

In this country, it has not received proper distribution for a number of reasons. First, it is the very unpopularity of the use of checks. Secondly, the long waiting period for money and the inability to withdraw money anonymously. To cash a check, you usually need to go to the bank, fill out a bunch of papers with the obligatory indication of your real name and TIN. In addition, the bank will not pay you anything right away, but first it will send a check for collection (verification of the authenticity and availability of this amount with the issuing party), which usually takes from a couple of days to a month, or even more. At the same time, banks themselves like to tear interest and separate amounts for each of their finger movements. You will probably be ripped off for cash and for collection, and for postage, and a percentage of the check itself just because of the impudence of the bank and for other reasons. As a result, you will receive money from a gulkin's nose, and up to 50% (sometimes more) will be grabbed by the bank itself. It turns out especially funny when a shkolota is trying to cash out 30 bucks, which were honestly earned on clicks and registrations, sent by check. In this case, it often comes to the ridiculous - you have to give more money for cashing a check than you receive. What is the fucking thing about young clickers: it is economically unprofitable to cash checks for small amounts in this country, which means that the money remains with the organizers of the wiring.

There is an elegant way of wiring on checks, and it is absolutely legal. A respectable burgher buys some harmless video content in an Internet shop, "Christmas of Little Animals". "Trailer" to his order goes hard pron. The shocked burgher makes an angry appeal to the shop, there - oh, the mistake came out, we, of course, will return the money. And they return. By check. On the check it says “return of the order“ Three horses and an elephant fuck a young whore. The percentage of such checks being cashed is much less than one hundred. This method is described in the feature film "Lock, Stock, Two Barrels".

Refund

There are two concepts: "chargeback" - a full refund of the amount paid and "refund" - the buyer's refusal to purchase and a refund minus a small penalty to the merchant for the buzz. Usually ten percent. Or a fixed amount - the same 10 greens.

To declare a charge is another hemorrhoid: you need to write a statement to the police and the bank. Then the showdown in the payment system arbitration. Long. And the most important thing is the necessary seasoning for the charge - card re-issue (for many banks, even to this day, this is a paid procedure of 10-50 hryvnias) and, accordingly, from two weeks to a month - without a card at all and without a dough lying on it. To announce a charge when the purchase amount is less than 50-100 greens is generally just nonsense. You will spend more on accompanying processes.

Therefore, when a merchant invites the cardholder to make a refund, he gladly agrees. For the alternative is charge and a sea of ​​hemorrhoids.

Well, then it's clear. We are opening an Internet store with 100,500 items and warehouses packed to capacity. And after payment, we kindly write to the buyer soap with the deepest apologies, or rather, a soulless specially sharpened robot writes about the impossibility of fulfilling an order and offer a refund. We have absolutely legal 10%, even a little less, because the bank also wants to eat and taxes must be paid without doing absolutely nothing.

Otake to i-bank

The topic is relatively new, but rich in every respect. The scheme is simple to describe, but not to be implemented: the Trojan scans the keys to the account in the no-bank, the money is debited. You can lose everything acquired by back-breaking labor, and even more. The biggest risk is small offices that manage their account through and-no-banks. If Zeus-type malware infiltrates, drain the water.

It may be that the account page, into which the password is hammered, is programmatically generated on your own computer. And the web bank is quite stable, but not on your machine. Attacks on accounts in network pseudo-money systems are arranged in a similar way.

Imaginary carding

Option one from card holder
Preferably two people are involved. One, the owner of the account, sits at home, in every possible way fixing his presence in this country. Another, with a card or its duplicate, drinks, eats, purchases clothes and in every way spends money abroad. When tired, the account holder protests the transaction. The bank fucks. It is used by goons , who calculated two moves, and did not have enough brains for the third. It will not be possible to return the money immediately, but after a very long fuss, if at all it will work out - this time. Rides only once, you can't build a stream of babosiks - that's two. The doors to this bank for cards and loans will be closed, and in others, most likely, too - these are three. For these reasons, it is rare.

Option two from merchant
A private business is being created that accepts cards from the population (selling prone, software, music , whatever, up to a travel agency). Pre-purchased and tested cardboard is mixed into the stream of real sales. Some of the operations will be recouped, and the merchant's money will be squeezed out, but some will remain in the form of profit. Does not live long, since fraud monitoring will point its finger at an increased background. But no one bothers to register a new clone of the same .
 
Last edited:
Top