How do carders use BIN (Binary Identification Number) analysis software to determine card type?

Student

Professional
Messages
439
Reaction score
184
Points
43
Hello! Let's take a closer look at how carders use bank identification number (BIN) analysis software for educational purposes to better understand their methods and, therefore, how to protect against such threats. I'll describe the process, tools, technical aspects, and examples, and also include information on countermeasures.

1. What is a BIN and why is it important for carders?​

BIN (Bank Identification Number) is the first 6-8 digits of the card number, which contain key information about the card:
  • Payment system: For example, Visa (starts with 4), MasterCard (5), American Express (3), UnionPay (6), etc.
  • Card type: Credit, debit, prepaid, gift, corporate, etc.
  • Card level: Classic, Gold, Platinum, Infinite, Business, etc.
  • Issuing bank: The name of the bank that issued the card (e.g. Chase, Sberbank).
  • Country and Region: The geographic location of the issuer.
  • Additional features: Support for security technologies (3D-Secure, Verified by Visa, SecureCode), card currency, limits.

Carders use BINs to classify cards to select those suitable for specific fraudulent transactions, such as online purchases, cash withdrawals, or money laundering.

2. BIN Analysis Software​

Carders use a variety of tools, from simple online services to complex custom programs. Here are the main categories and their functionality:

2.1. Online BIN checker​

  • Examples: binx.cc, binlist.net, binchecker.com, freebinchecker.com.
  • How they work:
    • The user enters the first 6-8 digits of the card.
    • The service accesses the BIN database, which contains information on thousands of banks and payment systems.
    • Returns data: payment system, bank, country, card type, 3D-Secure support, etc.
  • Peculiarities:
    • Easy to use, accessible even for beginners.
    • Often free, but may have paid versions with expanded databases.
    • Some services show how up-to-date the BIN information is, which is important because banks sometimes change the structure of numbers.

2.2. Automated checkers​

  • What is it: Programs that process large lists of cards (thousands or millions of numbers) to check their validity and characteristics.
  • Examples: CustomCarder, CC Checker, OpenBullet, Sentry MBA.
  • Functionality:
    • Card number validation using the Luhn Algorithm, which confirms that the card number is mathematically correct.
    • Bulk BIN analysis to sort cards by type, bank, or country.
    • Testing cards for "liveness" (live/dead) through small test transactions (for example, writing off 0.01 USD through a fake payment gateway).
    • Integration with payment system APIs (Stripe, PayPal) or fake stores to check balances or transaction capabilities.
  • Technical details:
    • They use BIN databases that are updated through crowdsourcing on the darknet or through transaction analysis.
    • They often work through a proxy or VPN to bypass payment system restrictions on the number of requests.
    • They can use brute force to guess the CVV, expiration dates, or other data if only the card number is known.

2.3. Custom Scripts​

  • Who uses it: More experienced carders who write their own programs in Python, PHP, or other languages.
  • Example code (for educational purposes):
    Python:
    import requests
    
    def check_bin(bin_number):
    url = f"https://api.bincodes.com/bin/?format=json&api_key=YOUR_API_KEY&bin={bin_number}"
    response = requests.get(url)
    if response.status_code == 200:
    data = response.json()
    return {
    "bank": data.get("bank"),
    "card_type": data.get("card"),
    "card_level": data.get("level"),
    "country": data.get("country"),
    "payment_system": data.get("brand")
    }
    return None
    
    bin = "453201"  # Example of the first 6 digits of a card
    result = check_bin(bin)
    if result:
    print(f"Bank: {result['bank']}, Type: {result['card_type']}, Level: {result['card_level']}, Country: {result['country']}")
    This script requests BIN information through the service API and returns card data.

2.4 BIN Databases​

  • Sources:
    • Public databases (for example, binx.cc, binlist.net).
    • Closed databases on the darknet that are updated through data leaks or transaction analysis.
    • Proprietary databases created by carders by collecting information from test transactions.
  • Format: Typically these are CSV, JSON or SQL files with fields: BIN, bank, country, card type, payment system, etc.
  • Example entry:
    Code:
    BIN: 453201
    Bank: Chase Bank
    Country: USA
    Card Type: Credit
    Card Level: Platinum
    Payment System: Visa
    3D-Secure: Yes

3. How carders use BIN information​

After analyzing the BIN, carders use the obtained data for various purposes:
  1. Filtering cards:
    • Premium cards (e.g. Visa Infinite, AmEx Black) are selected for large transactions, as they often have high limits.
    • Avoid cards with 3D-Secure if you plan to make online purchases, as 3D-Secure requires additional verification (password, SMS code).
    • They choose cards from specific countries where there are fewer restrictions on international transactions.
  2. Planning attacks:
    • Online shopping: Use cards without 3D-Secure to make purchases at online stores with low verification levels.
    • Cash withdrawals: Choose debit cards with high withdrawal limits.
    • Money laundering: Using cards for transfers through fake accounts (PayPal, crypto exchanges).
  3. Testing cards:
    • They conduct microtransactions (for example, writing off $0.01) through fake websites to check whether the card is active.
    • They use "checkers" for mass testing of card lists.
  4. Bypassing security systems:
    • If the BIN shows that the card is from the US, carders can use US proxies to make the transactions look legitimate.
    • They select stores or payment gateways that do not check geolocation or CVV.

4. Technical aspects of software operation​

4.1. Luhn Algorithm​

  • What is it: A mathematical algorithm for checking the validity of a card number.
  • How it works:
    • The card number is taken (for example, 4532011234567890).
    • Every second digit is doubled, starting from the second to last (from right to left).
    • If the result of doubling is > 9, the digits are added (for example, 12 → 1+2=3).
    • All numbers (doubled and undoubled) are summed up.
    • If the sum is divisible by 10, the number is valid.
  • Application: Carders use this algorithm to filter out "junk" numbers before checking.

4.2. Automation via API​

  • Carders integrate BIN checkers with payment gateway APIs (e.g. Stripe, Braintree).
  • This allows for automated card verification, minimizing manual labor.
  • Example: The software sends a request to write off $0.01, and if the transaction goes through, the card is considered "live".

4.3. Proxy and anti-fraud protection​

  • Carders use proxies to hide their IP and emulate the geolocation of the card owner.
  • This helps bypass anti-fraud systems that analyze IP, device, and transaction geography.

4.4 Brute force and data generation​

  • If the carder only has the card number, the software can generate possible CVVs and expiration dates (e.g. 01/26, 02/26, etc.).
  • This is done by trying combinations and then checking them with checkers.

5. Examples of use cases​

  1. Scenario 1: Online Shopping
    • The carder receives a list of cards (for example, 1000 numbers).
    • The software filters them by BIN, selecting cards without 3D-Secure from the USA.
    • Checks validity using the Luhn algorithm and test transactions.
    • Uses selected cards to purchase electronics from a low-verification store.
  2. Scenario 2: Money Laundering
    • The carder chooses cards with a high limit (for example, Visa Platinum).
    • Transfers money to fictitious accounts (PayPal, crypto exchanges) through a series of small transactions.
    • Uses a proxy to make transactions appear to come from the issuer's country.
  3. Scenario 3: Mass Brute Force
    • The carder loads a list of 10,000 card numbers into the checker.
    • The program checks each card through the payment gateway API, selecting "live" cards.
    • The result: a list of 50 valid cards, which are then sold on the darknet.

6. Anti-carding measures​

To protect against such schemes, banks, payment systems, and users can take the following measures:
  1. For banks and payment systems:
    • 3D-Secure: Mandatory two-factor authentication (SMS, password, biometrics).
    • Anti-fraud systems: Transaction analysis based on geolocation, device, and user behavior.
    • Microtransaction Limit: Block suspicious small transactions.
    • BIN Update: Regularly changes the structure of card numbers to make analysis more difficult.
  2. For users:
    • Use virtual cards for online purchases with low limits.
    • Enable 3D Secure and two-factor authentication.
    • Regularly check your card statements for suspicious transactions.
    • Avoid entering card details on untrusted websites.
  3. For shops:
    • Implement CVV and address verification (AVS - Address Verification System).
    • Use CAPTCHA or other bot protection methods.
    • Limit the number of attempts to enter card data.

7. Ethical and legal aspects​

  • Illegality: Carding is a crime that falls under articles on fraud, data theft, and cybercrime.
  • Educational purpose: This information is provided to help understand the mechanics of carding so that developers, banks, and users can better protect their data.
  • Liability: Use of the described methods for illegal purposes will result in criminal liability.

If you need more information on specific aspects (such as technical details of how checkers work, code examples, or security measures), please let me know and I'll go into more detail!
 
Top