Carders who steal bank card data use phishing campaigns as one of their primary tools to manipulate victims. Phishing is a social engineering technique that relies on psychological tricks to trick people into revealing sensitive information, such as card details, passwords, or personal data. In this answer, I'll detail how carders use psychology in phishing campaigns, the human behavior mechanisms they exploit, and provide examples of their tactics to help you better understand their methods and protect yourself from them.
This approach forces victims to act impulsively, entering data on a phishing site without verifying its authenticity.
Why it works: Fear of loss (of money, account, or reputation) activates the self-preservation instinct, causing people to ignore red flags such as a suspicious URL or spelling errors.
Example: An email from a "bank" asking to update data to "improve security" links to a website that looks like a legitimate banking portal but has a URL like bank-login-secure.com.
Why it works: People tend to trust familiar brands and don't double-check details, especially if the message looks professional.
Why it works: Personalization creates the illusion that the sender knows the victim, which reduces suspicion. People are less likely to verify the authenticity of a message if it seems personal.
Why it works: People tend to defer to authority figures, especially in stressful situations. Con artists enhance this effect by using an official tone and threatening consequences.
Why it works: Greed and curiosity motivate people to act quickly, especially if the offer seems time-limited. This exploits FOMO (fear of missing out).
Why it works: Emotional stories disable critical thinking, especially if the victim wants to help.
Why it works: When tired or distracted, people are less likely to check details and are more easily manipulated.
Basic psychological principles used by carders
Carders rely on well-studied psychological principles that influence human decision-making. These principles include:- Urgency: People tend to act impulsively when they feel there's no time to think. Carders create the illusion of urgency so the victim doesn't have time to analyze the situation. Example: an email from a "bank" with the message, "Your account will be blocked in 2 hours unless you confirm the details via the link."
- Authority Principle: People tend to trust and obey those they perceive as authorities (e.g., banks, police, large companies). Carders fake communications to appear to be official representatives.
- Trust Principle: If a message looks familiar or comes from a seemingly trustworthy source, people are more likely to trust it. Scammers use fake logos, email addresses that look official, or even hacked accounts of acquaintances.
- Scarcity Principle: People value things that seem rare or limited. Phishing campaigns may offer "exclusive" bonuses or limited-time offers to entice victims to take action.
- Emotional Manipulation: Carders play on emotions such as fear, greed, empathy, or curiosity to shut down the victim's rational thinking.
- Cognitive biases: Carders exploit people's tendency to simplify information (for example, ignoring small details in a URL) or to confirm their expectations (if an email looks like it's from a bank, a person assumes it's legitimate).
Specific psychological techniques used in phishing campaigns
1. Create urgency and fear
Carders often use tactics that force victims to act immediately, giving them no time to think. This relies on a psychological effect known as amygdala hijacking, where strong emotions like fear overwhelm rational thinking. Examples:- Message: "Your account has been hacked! Confirm your password now, otherwise you will lose access."
- SMS: "Money has been debited from your card. Follow the link to cancel the transaction."
This approach forces victims to act impulsively, entering data on a phishing site without verifying its authenticity.
Why it works: Fear of loss (of money, account, or reputation) activates the self-preservation instinct, causing people to ignore red flags such as a suspicious URL or spelling errors.
2. Imitation of trust and legitimacy
Carders carefully forge visual and textual elements to make their messages appear official. This includes:- Use of logos, fonts and color palettes of well-known brands (e.g. Visa, PayPal).
- Fake email addresses that look almost identical to real ones (for example, support@paypa1.com instead of support@paypal.com).
- Professional tone and terminology typical of banks or customer support services.
Example: An email from a "bank" asking to update data to "improve security" links to a website that looks like a legitimate banking portal but has a URL like bank-login-secure.com.
Why it works: People tend to trust familiar brands and don't double-check details, especially if the message looks professional.
3. Personalization through social engineering
Carders can use leaked data (such as names, phone numbers, addresses) or information from social media to make phishing messages more convincing. This is called spear phishing. For example:- Letter: "Dear John Smith, we've noticed suspicious activity on your bank account. Please confirm your details using the link."
- A message in a messenger from a “friend”: “Ivan, I’m in trouble, send $500 using this link.”
Why it works: Personalization creates the illusion that the sender knows the victim, which reduces suspicion. People are less likely to verify the authenticity of a message if it seems personal.
4. Exploitation of the principle of authority
Carders often pose as representatives of trusted organizations, such as banks, tax authorities, and law enforcement agencies. Example:- A call from the "bank's security service" warning of a "fraudulent transaction" and asking for the code from the SMS.
- A letter from the "tax service" demanding payment of a fine via the link.
Why it works: People tend to defer to authority figures, especially in stressful situations. Con artists enhance this effect by using an official tone and threatening consequences.
5. Manipulation by greed or curiosity
Carders may lure victims with promises of rewards, discounts, or exclusive offers. Examples:- "You've won an iPhone! Follow the link to claim your prize."
- "Today only! 90% off Amazon. Verify your login details."
Why it works: Greed and curiosity motivate people to act quickly, especially if the offer seems time-limited. This exploits FOMO (fear of missing out).
6. Playing on Empathy
Some phishing campaigns appeal to kindness and empathy. For example:- A letter about raising funds for the treatment of a sick child with a request to transfer money using the link.
- A message from an "acquaintance" who is allegedly in trouble and asking for financial assistance.
Why it works: Emotional stories disable critical thinking, especially if the victim wants to help.
7. Use habits and routines
Carders study people's behavior and send messages at times when they are most vulnerable. For example:- Letters from the "bank" arrive during working hours, when the person is busy and cannot thoroughly check the information.
- Phishing SMS messages can arrive at night when the victim is sleepy and less alert.
Why it works: When tired or distracted, people are less likely to check details and are more easily manipulated.
Technical aspects of phishing that enhance the psychological impact
- Fake websites: Phishing websites often look identical to official ones, but have minor differences in the URL (for example, bbank.com instead of bank.com). The victim, after entering their credentials, transmits them to the scammers.
- Malware: Links or attachments in phishing messages can install keyloggers, Trojans, or ransomware that steal data or lock your device.
- Multi-layered attacks: Carders may combine calls, emails, and text messages to increase pressure. For example, after an email about an "account being hacked," a "bank manager" calls the victim, urging them to confirm their details.
- Cross-platform: Phishing is spread via email, SMS, instant messaging apps (WhatsApp, Telegram), social media, and even advertising. This increases the likelihood that the victim will encounter the attack in a familiar environment.
Examples of real-life phishing attacks
- Phishing scams posing as banks: In 2023, emails purporting to be from major banks were distributed in Russia, asking victims to update their data due to "new security requirements." The links led to fake websites where card details were stolen.
- Spearphishing via social media: Fraudsters hacked Telegram or Facebook accounts and sent messages to friends asking to "borrow money" via a phishing link.
- Lottery phishing: Emails claiming a lottery win (e.g., "You've won $1 million!") asked for a "fee" to claim the prize, leading to data theft.
How to protect yourself: educational recommendations
- Check the sender:
- Pay close attention to the email address or phone number. Legitimate organizations don't use random domains or numbers.
- If the letter is from a bank, contact them directly through the official website or phone number.
- Do not follow the links:
- Hover over the link to see the real URL. Suspicious addresses often contain typos or extra characters.
- Enter the website address manually in your browser.
- Use two-factor authentication (2FA):
- Even if scammers get your password, 2FA will protect your account.
- Be skeptical:
- If the offer is too good or the message causes panic, this is a reason to be wary.
- Never provide SMS codes or card details upon request.
- Update your software and use antivirus software:
- Antivirus can block phishing sites and malicious attachments.
- Update your browsers and applications to patch vulnerabilities.
- Teach others:
- Educate friends and family, especially older adults, about the signs of phishing, as they are often targeted.
Why Understanding Psychology Is Important
Carders use phishing because it's effective: it exploits universal human weaknesses like trust, fear, and greed. Knowing these techniques can help you recognize manipulation and avoid becoming a victim. For example:- If a message evokes strong emotions (fear, joy, panic), pause and check its authenticity.
- If you receive an unexpected request for data entry, ask yourself: “Why does the bank or company need this?”