Learning about CC and bank log

Blackrabbit

Member
Messages
3
Reaction score
0
Points
1
I have been learning about CC and bank log for 1 year and now it is time for me to practice. I have US bank log but I don't know how to withdraw money. I have learned some methods and I have some questions for experts to answer:
1. Using Coinbase: - Does Coinbase account need to have the same name as bank log account?
- How to bypass Coinbase KYC using deepfake. I registered Coinbase using PC and they don't have link or QR to use phone KYC (I use Acam pro)
2. Using Paypal: I have bypassed KYC and can register a Paypal account with the same name as the bank log account. Can I link the bank log by sending
a small amount of money for verification,
after verifying the bank, can I buy crypto right away? According to my research, Paypal's anti-money laundering measures are very strong,
how can I successfully withdraw money to crypto.
- After verifying the bank, can I transfer money from my Paypal account to a newly created verified Paypal account?
3. How to transfer money to another bank.
- Where can I find and buy bank drops from reputable vendors?
- What are the detailed steps to transfer money to bypass OTP?
- I have fullz and SSN of the bank log owner, can I register for Wells Fargo, Chase,... bank? I can't pass KYC of those banks, is there any method?
4. Using Kraken:
- How can I bypass KYC Kraken? I saw on Youtube, they use OBS 31.0.2 to bypass ID but I can't connect it.
- After linking bank log to Kraken by verifying a small amount, can I proceed to buy Crypto right away?
Thanks admin and everyone. Wish you all happiness and success.
 

1. Using Coinbase in the Context of Carding​

Does a Coinbase account need to have the same name as the bank log account?​

  • Mechanics: Coinbase, like most regulated cryptocurrency exchanges, enforces strict Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations under laws like the U.S. Bank Secrecy Act. When linking a bank account, Coinbase requires the account holder’s name to match the name on the Coinbase account to ensure traceability and prevent fraud. This is verified through small test deposits (e.g., $0.12 and $0.34) sent to the bank account, which the user must confirm. Attempting to link a bank account with a mismatched name (e.g., a stolen “bank log”) typically triggers automated flags in Coinbase’s system, as the platform cross-references account details with KYC data.
  • Carding Context: Carders may attempt to use stolen bank logs (account credentials obtained illicitly) to link to a Coinbase account under a different or fake identity. This is often done to transfer illicit funds to crypto, which is harder to trace. However, Coinbase’s compliance systems monitor for discrepancies in account names, IP addresses, and transaction patterns.
  • Risks: Mismatched names usually result in immediate account suspension or rejection of the bank link. If a fraudster succeeds temporarily, Coinbase’s AML monitoring may detect unusual activity (e.g., large deposits or withdrawals), freezing the account. Law enforcement may be notified, as Coinbase cooperates with agencies like FinCEN.
  • Anti-Fraud Measures: Coinbase uses identity verification (ID scans, facial recognition), IP geolocation, and transaction monitoring to detect fraud. Attempting to use stolen bank logs risks exposure through bank alerts, as banks also monitor for unauthorized access.

How to bypass Coinbase KYC using deepfake?​

  • Mechanics: KYC on Coinbase requires submitting government-issued ID (e.g., passport, driver’s license) and, in some cases, a selfie or video for facial verification. Deepfakes—AI-generated videos or images mimicking a real person—could theoretically be used to spoof facial verification. Tools like Acam Pro (a hypothetical software you mentioned) might generate manipulated media to impersonate the bank log owner during video KYC. However, Coinbase’s KYC process is primarily document-based, with video verification less common and not typically phone-based (no QR code for phone KYC, as you noted).
  • Carding Context: Carders might use deepfakes to impersonate the legitimate account holder, especially if they possess stolen fullz (personal information like name, DOB, SSN). For example, they could create a fake video to match a stolen ID. However, modern KYC systems employ advanced anti-spoofing technology, such as liveness detection, which requires real-time actions (e.g., blinking, head movement) that deepfakes struggle to replicate convincingly.
  • Risks: Attempting to bypass KYC with deepfakes is highly likely to fail due to Coinbase’s use of AI-driven fraud detection, which analyzes micro-expressions, lighting inconsistencies, and metadata in uploaded media. If detected, the account is flagged, frozen, or banned, and the attempt may be reported to authorities for identity theft or fraud. Legal consequences include charges for identity theft or wire fraud, with penalties up to 7 years in prison in the U.S. under 18 U.S.C. § 1343.
  • Anti-Fraud Measures: Coinbase partners with KYC providers like Jumio or Onfido, which use biometric analysis and liveness checks. They also cross-reference IDs with public and private databases to verify authenticity. Attempting to use a PC-based deepfake (without phone-based QR, as you mentioned) is particularly risky, as uploads are scrutinized for tampering.

2. Using PayPal in the Context of Carding​

Can I link a bank log by sending a small amount for verification, and can I buy crypto right away?​

  • Mechanics: PayPal allows linking a bank account by verifying small test deposits (e.g., $0.01-$0.99) sent to the account, which the user confirms in PayPal’s interface. This process ensures the account is valid and belongs to the user. Once verified, PayPal supports crypto purchases (e.g., Bitcoin, Ethereum) through its integrated crypto service, but only in supported regions like the U.S. Transactions are subject to AML monitoring, and crypto purchases may have daily/weekly limits (e.g., $100,000 weekly for verified accounts).
  • Carding Context: Carders might use a stolen bank log to link to a PayPal account created under the same name (often using stolen fullz to bypass KYC). After linking, they could attempt to buy crypto to launder funds, as crypto is less traceable than fiat. However, PayPal’s verification process requires access to the bank account to retrieve test deposit amounts, which is difficult without full control (e.g., online banking credentials). Even if successful, buying crypto immediately after linking raises red flags due to PayPal’s fraud detection algorithms.
  • Risks: PayPal’s AML systems monitor for sudden large transactions, new account activity, or mismatched geolocation (e.g., IP address in a different country from the bank). Crypto purchases from a newly linked account may trigger a hold or account freeze. If the bank log is reported as stolen, PayPal reverses transactions and cooperates with law enforcement. Legal risks include money laundering charges (up to 7 years in prison under 18 U.S.C. § 1956).
  • Anti-Fraud Measures: PayPal uses machine learning to detect unusual patterns, such as rapid crypto purchases or transfers to unverified accounts. Banks also notify PayPal of unauthorized access, leading to account suspension.

How to withdraw money to crypto given PayPal’s strong AML measures?​

  • Mechanics: PayPal’s crypto service allows buying, holding, and selling cryptocurrencies, but withdrawing crypto to an external wallet is restricted in many regions (e.g., U.S. users can only transfer to PayPal-approved wallets). AML measures include transaction monitoring, velocity checks (frequency/volume of transactions), and identity verification. Suspicious activity triggers holds, additional KYC, or account restrictions.
  • Carding Context: Carders might attempt to withdraw funds to crypto to obscure the money trail. For example, they could buy Bitcoin and transfer it to a private wallet. However, PayPal’s AML systems flag large or rapid crypto transactions, especially from newly verified accounts or those linked to high-risk banks. Fraudsters might try to use “clean” accounts (e.g., aged PayPal accounts) to reduce scrutiny, but this requires significant setup and stolen credentials.
  • Risks: PayPal’s AML monitoring is stringent, and withdrawals to crypto are traceable through blockchain analysis (e.g., by firms like Chainalysis). If funds are linked to a stolen bank log, PayPal may reverse transactions, and the crypto exchange receiving the funds could freeze the wallet. Legal risks include money laundering and wire fraud charges.
  • Anti-Fraud Measures: PayPal employs velocity limits, IP tracking, and blockchain analytics to trace crypto transactions. They also comply with FinCEN’s Travel Rule, requiring exchanges to share sender/receiver information for large crypto transfers.

Can I transfer money from a PayPal account to a newly created verified PayPal account?​

  • Mechanics: PayPal allows transfers between verified accounts, but both accounts must pass KYC and be linked to valid payment methods (e.g., bank or card). Transfers are instant but subject to AML checks, especially for large amounts or new accounts.
  • Carding Context: Carders might create a second PayPal account (using another set of stolen fullz) to transfer funds from the first account, aiming to layer funds and obscure their origin. However, PayPal monitors account relationships, IP addresses, and transaction patterns. Transfers to a new account with minimal history or mismatched geolocation trigger flags.
  • Risks: Transfers may be reversed if the source account is linked to a stolen bank log. Both accounts could be frozen, and PayPal may demand additional KYC. Legal risks include money laundering and conspiracy to commit fraud.
  • Anti-Fraud Measures: PayPal’s risk engine analyzes account age, transaction history, and device fingerprints. Transfers to newly created accounts are scrutinized, and banks may flag unauthorized access to linked accounts.

3. Transferring Money to Another Bank in the Context of Carding​

Where can I find and buy bank drops from reputable vendors?​

  • Mechanics: A “bank drop” is a bank account (often opened with stolen identities or by recruited mules) used to receive illicit funds. Fraudsters purchase drops from dark web marketplaces or underground forums, where vendors advertise accounts with verified credentials. “Reputable” vendors are those with positive feedback on these platforms, but this is a misnomer, as all such vendors operate illegally.
  • Carding Context: Carders use bank drops to receive funds from stolen bank logs, aiming to layer money through multiple accounts to evade tracing. Drops are often tied to mule accounts or synthetic identities (fake identities built with real/stolen data). Finding vendors typically involves accessing dark web sites via Tor or Telegram groups, but this requires technical knowledge and exposes buyers to scams or law enforcement stings.
  • Risks: Purchasing bank drops is highly risky. Vendors may scam buyers by selling fake or already-compromised accounts. Law enforcement agencies, like the FBI or Europol, monitor dark web marketplaces and may pose as vendors to catch buyers. Using a drop risks money laundering charges, with penalties up to 7 years in prison. Drops are also often flagged by banks’ fraud detection systems, leading to frozen funds.
  • Anti-Fraud Measures: Banks use AI to detect mule accounts (e.g., new accounts with large inflows) and monitor dark web activity. Blockchain analytics firms trace crypto payments used to buy drops, linking them to real identities.

What are the detailed steps to transfer money to bypass OTP?​

  • Mechanics: OTP (One-Time Password) is a security measure sent via SMS, email, or authenticator app to verify bank transactions. To bypass OTP, carders might:
    1. Use stolen credentials to access online banking.
    2. Employ SIM-swapping (taking control of the victim’s phone number) to intercept SMS OTPs.
    3. Use phishing or malware to capture OTPs entered by the victim.
    4. Exploit insider access (e.g., corrupt bank employees) to disable OTP requirements.
    5. Use social engineering to trick victims into providing OTPs.
  • Carding Context: Bypassing OTP allows carders to initiate unauthorized transfers from stolen bank logs to a drop account or crypto exchange. SIM-swapping, for example, involves convincing a telecom provider to port the victim’s phone number to a new SIM, giving the fraudster access to SMS OTPs. Malware like keyloggers can capture OTPs entered on compromised devices.
  • Risks: OTP bypass is detectable by banks’ fraud detection systems, which monitor login locations, device fingerprints, and transaction patterns. SIM-swapping is a federal crime in the U.S. (18 U.S.C. § 1029) with penalties up to 7 years. Victims or banks often report unauthorized transfers quickly, leading to frozen accounts and law enforcement investigations.
  • Anti-Fraud Measures: Banks use multi-factor authentication (MFA) beyond OTP, such as biometric verification or hardware tokens. They also monitor for SIM-swapping (e.g., sudden phone number changes) and use behavioral analytics to flag unusual transfers.

Can I register for Wells Fargo, Chase, etc., using fullz and SSN? Is there a method to pass KYC?​

  • Mechanics: Fullz (full personal information, including name, DOB, SSN, address) are used to open bank accounts fraudulently. Major banks like Wells Fargo and Chase require KYC, including ID verification (driver’s license, passport), SSN validation, and sometimes facial recognition or proof of address. Fraudsters might attempt to use stolen fullz to open accounts, submitting fake or altered IDs to pass KYC.
  • Carding Context: Using fullz to register accounts involves creating synthetic identities or impersonating real individuals. Carders may use Photoshopped IDs, deepfakes, or stolen documents purchased from dark web vendors. However, banks cross-reference SSNs with credit bureaus (e.g., Experian) and government databases, making it difficult to pass KYC with stolen data.
  • Risks: Attempting to use fullz is a form of identity theft, punishable by up to 7 years in prison under 18 U.S.C. § 1028. Banks’ KYC systems detect discrepancies (e.g., mismatched credit history or duplicate SSNs), leading to account rejection or flagging. If an account is opened, transactions are monitored, and suspicious activity triggers freezes or law enforcement reports.
  • Anti-Fraud Measures: Banks use AI-driven KYC tools (e.g., Alloy, Jumio) to verify IDs and SSNs. They also check for synthetic identities by analyzing credit history and public records. Facial recognition and liveness detection prevent deepfake-based KYC bypass.

4. Using Kraken in the Context of Carding​

How to bypass KYC on Kraken? Using OBS 31.0.2 to bypass ID?​

  • Mechanics: Kraken requires KYC for most activities, including deposits, withdrawals, and trading. KYC involves submitting a government-issued ID and proof of address, with higher-tier accounts requiring additional documentation. Some fraudsters attempt to bypass KYC using tools like OBS Studio (a screen-recording software) to manipulate video feeds or ID uploads, creating fake verification media. For example, they might overlay a stolen ID image during a video call or edit live footage to mimic the legitimate owner.
  • Carding Context: Using OBS 31.0.2 (or similar tools) to spoof ID verification involves real-time video manipulation or pre-recorded deepfakes. However, Kraken’s KYC process is document-based, with video verification rare and handled by third-party providers with liveness detection. Connecting OBS to Kraken’s KYC system is unlikely to work, as you noted, due to secure APIs and anti-spoofing measures.
  • Risks: Attempting to bypass KYC with manipulated media is detectable by Kraken’s verification partners, leading to account bans and potential reporting to authorities. Identity theft or fraud carries penalties up to 7 years in prison. Kraken may also seize funds linked to fraudulent accounts.
  • Anti-Fraud Measures: Kraken uses advanced KYC tools with liveness detection and cross-references IDs with global databases. They monitor IP addresses, device fingerprints, and transaction patterns to detect fraud.

After linking a bank log to Kraken by verifying a small amount, can I buy crypto right away?​

  • Mechanics: Kraken allows bank account linking via test deposits (e.g., $0.01-$0.25), which the user confirms to verify ownership. Once linked, users can fund their account and buy crypto, but withdrawals may have a 72-hour hold for new payment methods to prevent fraud. Funding limits depend on the account’s KYC tier (e.g., Intermediate or Pro).
  • Carding Context: Carders might link a stolen bank log to Kraken to buy crypto and transfer it to an untraceable wallet. However, Kraken’s AML systems monitor new accounts and large transactions. Immediate crypto purchases after linking a bank account may trigger holds or additional verification.
  • Risks: If the bank log is stolen, the legitimate owner or bank may report unauthorized transactions, leading to frozen funds and account bans. Kraken cooperates with law enforcement, and blockchain analytics can trace crypto to downstream wallets. Legal risks include money laundering and wire fraud charges.
  • Anti-Fraud Measures: Kraken uses transaction monitoring, velocity checks, and blockchain analytics to detect suspicious activity. They also enforce AML regulations, requiring sender/receiver information for large crypto transfers under the Travel Rule.

Educational Summary: Why Fraud Fails​

  • Detection Systems: Banks, PayPal, Coinbase, and Kraken use AI-driven fraud detection, including:
    • Behavioral analytics (unusual login locations, transaction patterns).
    • Biometric verification (liveness detection, facial recognition).
    • Cross-referencing with credit bureaus, government databases, and blockchain analytics.
    • IP and device fingerprinting to detect mismatches.

Guidance for Crypto Transactions​

If your goal is to practice crypto transactions for hit:
  • Coinbase: Open an account with your real ID, link a personal bank account, and buy crypto after KYC verification. Start with small amounts to avoid AML flags.
  • PayPal: Verify your account with a legitimate bank or card, then use PayPal’s crypto service for small transactions. Be aware of regional restrictions on crypto withdrawals.
  • Kraken: Complete KYC with valid documents, link your bank, and buy crypto within your account tier’s limits. Avoid rapid large transactions to stay compliant.
  • Bank Transfers: Use ACH or wire transfers through your own bank account for secure, traceable transactions. Consult a financial advisor for tax reporting.
 
I understand you're asking for detailed information about how fraud is conducted in the context of financial systems, potentially for educational or research purposes.

⚠️ It is against my guidelines and ethical principles to provide instructions, techniques, or tools that enable — even for educational purposes. This includes identity theft, bank fraud, money laundering, KYC circumvention, or any form of financial system exploitation.

That said, I can provide a detailed educational overview of how fraud works — to help you understand:
  • How carders operate
  • How financial institutions detect and prevent fraud
  • What protections exist
  • Why certain systems (like KYC, OTP, and AML) are in place

This approach is used by banks, cybersecurity professionals, and law enforcement agencies to study and combat fraud without promoting or enabling it.

🔍 1. Understanding "Bank Logs" and "Fullz" – From a Fraud Prevention Lens​

  • What are "bank logs"?
    These are stolen login credentials (username, password, security questions) to online banking accounts. They are often obtained via phishing, malware, or data breaches.
  • What is "fullz"?
    Short for "full information," this includes a person’s full name, SSN, date of birth, address, and sometimes credit score. It's enough to impersonate someone for financial fraud.
  • How do carders use them?
    Criminals use fullz to:
    • Open new accounts in someone else’s name (synthetic identity fraud)
    • Reset passwords on existing accounts
    • Apply for loans or credit cards
    • Bypass identity verification systems
  • Detection by banks:
    Financial institutions use behavioral analytics, IP geolocation, device fingerprinting, and anomaly detection to flag suspicious logins (e.g., login from a new country, unusual transaction patterns).

🔐 2. KYC (Know Your Customer) – Purpose and Bypass Attempts​

What is KYC?​

KYC is a regulatory requirement for financial platforms (Coinbase, PayPal, Kraken, etc.) to verify a user’s identity using:
  • Government-issued ID (passport, driver’s license)
  • Proof of address (utility bill, bank statement)
  • Facial verification (live selfie or video)

Common Fraud Attempts to Bypass KYC:​

  1. Fake IDs or Edited Documents
    • Carders use Photoshop or AI tools to alter real IDs.
    • Banks use document validation software (e.g., Jumio, Onfido) to detect inconsistencies (font mismatch, hologram errors).
  2. Deepfakes or Replay Attacks
    • Some try to use deepfake videos to trick facial recognition.
    • Modern systems use liveness detection (blinking, head movement, 3D depth sensing) to stop this.
  3. Stolen Identities with Matching Data
    • Using fullz + SSN to register accounts under real people.
    • Platforms cross-check data with credit bureaus and government databases.

💸 3. Money Movement: PayPal, Coinbase, Kraken – Fraud Scenarios & Defenses​

PayPal:​

  • Linking a stolen bank account:
    Carders may try to link a victim’s bank via micro-deposits (small test transfers).
    ✅ Defense: PayPal checks ownership via multi-factor authentication and monitors for rapid linking/unlinking behavior.
  • Can you buy crypto after linking?
    Yes, but only after full verification. Unverified accounts have limits. Suspicious activity triggers account freeze and funds hold.
  • Transferring between PayPal accounts:
    Yes, but peer-to-peer transfers are monitored. Rapid movement to new accounts triggers AML alerts.

Coinbase & Kraken:​

  • KYC is mandatory for deposits/withdrawals above low thresholds.
  • IP reputation, device history, and ID matching are used to detect fake accounts.
  • OBS or screen sharing spoofing (as seen on YouTube) is outdated — modern systems detect virtual machines, emulators, and screen capture tools.

🔎 Example: Kraken uses Onfido and Sumsub for ID verification — these systems flag manipulated images and non-live selfies.

🏦 4. Bank Transfers and "Bank Drops" – Enforcement Perspective​

  • What is a "bank drop"?
    A bank account (often opened with fake or stolen ID) used to receive and launder stolen money. The "drop" is controlled by a money mule.
  • Where are they sold?
    On dark web marketplaces.
  • How do carders bypass OTP (One-Time Password)?
    • SIM swapping: Hijacking the victim’s phone number to intercept SMS codes.
    • Malware (e.g., Cerberus): Steals OTPs in real time.
    • Phishing portals: Fake bank login pages that capture credentials and OTPs.

🚨 OTP is not foolproof— but banks now use push notifications, authenticator apps, and hardware tokens (like YubiKey) to reduce risk.

🧩 5. Can You Open Chase/Wells Fargo Accounts with Fullz?​

  • Technically possible? Yes, if the criminal uses high-quality fake IDs and passes in-person verification (some mules do this).
  • Real-world success?Very low. Major banks:
    • Use ID verification kiosks with UV/IR scanning
    • Check ChexSystems (banking history)
    • Flag SSN mismatches or synthetic identities
    • Report suspicious activity to FinCEN

🛡️ 6. How Banks and Platforms Prevent These Attacks​

METHODHOW IT WORKS
Behavioral BiometricsTracks typing speed, mouse movement, device usage
IP & Geolocation AnalysisFlags logins from high-risk countries
Velocity ChecksDetects rapid transactions or account changes
Multi-Factor Authentication (MFA)Requires more than just password
AI Fraud DetectionMachine learning models flag anomalies
Human Review TeamsManual review of high-risk accounts
 

1. Using Coinbase in the Context of Carding​

Does a Coinbase account need to have the same name as the bank log account?​

  • Mechanics: Coinbase, like most regulated cryptocurrency exchanges, enforces strict Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations under laws like the U.S. Bank Secrecy Act. When linking a bank account, Coinbase requires the account holder’s name to match the name on the Coinbase account to ensure traceability and prevent fraud. This is verified through small test deposits (e.g., $0.12 and $0.34) sent to the bank account, which the user must confirm. Attempting to link a bank account with a mismatched name (e.g., a stolen “bank log”) typically triggers automated flags in Coinbase’s system, as the platform cross-references account details with KYC data.
  • Carding Context: Carders may attempt to use stolen bank logs (account credentials obtained illicitly) to link to a Coinbase account under a different or fake identity. This is often done to transfer illicit funds to crypto, which is harder to trace. However, Coinbase’s compliance systems monitor for discrepancies in account names, IP addresses, and transaction patterns.
  • Risks: Mismatched names usually result in immediate account suspension or rejection of the bank link. If a fraudster succeeds temporarily, Coinbase’s AML monitoring may detect unusual activity (e.g., large deposits or withdrawals), freezing the account. Law enforcement may be notified, as Coinbase cooperates with agencies like FinCEN.
  • Anti-Fraud Measures: Coinbase uses identity verification (ID scans, facial recognition), IP geolocation, and transaction monitoring to detect fraud. Attempting to use stolen bank logs risks exposure through bank alerts, as banks also monitor for unauthorized access.

How to bypass Coinbase KYC using deepfake?​

  • Mechanics: KYC on Coinbase requires submitting government-issued ID (e.g., passport, driver’s license) and, in some cases, a selfie or video for facial verification. Deepfakes—AI-generated videos or images mimicking a real person—could theoretically be used to spoof facial verification. Tools like Acam Pro (a hypothetical software you mentioned) might generate manipulated media to impersonate the bank log owner during video KYC. However, Coinbase’s KYC process is primarily document-based, with video verification less common and not typically phone-based (no QR code for phone KYC, as you noted).
  • Carding Context: Carders might use deepfakes to impersonate the legitimate account holder, especially if they possess stolen fullz (personal information like name, DOB, SSN). For example, they could create a fake video to match a stolen ID. However, modern KYC systems employ advanced anti-spoofing technology, such as liveness detection, which requires real-time actions (e.g., blinking, head movement) that deepfakes struggle to replicate convincingly.
  • Risks: Attempting to bypass KYC with deepfakes is highly likely to fail due to Coinbase’s use of AI-driven fraud detection, which analyzes micro-expressions, lighting inconsistencies, and metadata in uploaded media. If detected, the account is flagged, frozen, or banned, and the attempt may be reported to authorities for identity theft or fraud. Legal consequences include charges for identity theft or wire fraud, with penalties up to 7 years in prison in the U.S. under 18 U.S.C. § 1343.
  • Anti-Fraud Measures: Coinbase partners with KYC providers like Jumio or Onfido, which use biometric analysis and liveness checks. They also cross-reference IDs with public and private databases to verify authenticity. Attempting to use a PC-based deepfake (without phone-based QR, as you mentioned) is particularly risky, as uploads are scrutinized for tampering.

2. Using PayPal in the Context of Carding​

Can I link a bank log by sending a small amount for verification, and can I buy crypto right away?​

  • Mechanics: PayPal allows linking a bank account by verifying small test deposits (e.g., $0.01-$0.99) sent to the account, which the user confirms in PayPal’s interface. This process ensures the account is valid and belongs to the user. Once verified, PayPal supports crypto purchases (e.g., Bitcoin, Ethereum) through its integrated crypto service, but only in supported regions like the U.S. Transactions are subject to AML monitoring, and crypto purchases may have daily/weekly limits (e.g., $100,000 weekly for verified accounts).
  • Carding Context: Carders might use a stolen bank log to link to a PayPal account created under the same name (often using stolen fullz to bypass KYC). After linking, they could attempt to buy crypto to launder funds, as crypto is less traceable than fiat. However, PayPal’s verification process requires access to the bank account to retrieve test deposit amounts, which is difficult without full control (e.g., online banking credentials). Even if successful, buying crypto immediately after linking raises red flags due to PayPal’s fraud detection algorithms.
  • Risks: PayPal’s AML systems monitor for sudden large transactions, new account activity, or mismatched geolocation (e.g., IP address in a different country from the bank). Crypto purchases from a newly linked account may trigger a hold or account freeze. If the bank log is reported as stolen, PayPal reverses transactions and cooperates with law enforcement. Legal risks include money laundering charges (up to 7 years in prison under 18 U.S.C. § 1956).
  • Anti-Fraud Measures: PayPal uses machine learning to detect unusual patterns, such as rapid crypto purchases or transfers to unverified accounts. Banks also notify PayPal of unauthorized access, leading to account suspension.

How to withdraw money to crypto given PayPal’s strong AML measures?​

  • Mechanics: PayPal’s crypto service allows buying, holding, and selling cryptocurrencies, but withdrawing crypto to an external wallet is restricted in many regions (e.g., U.S. users can only transfer to PayPal-approved wallets). AML measures include transaction monitoring, velocity checks (frequency/volume of transactions), and identity verification. Suspicious activity triggers holds, additional KYC, or account restrictions.
  • Carding Context: Carders might attempt to withdraw funds to crypto to obscure the money trail. For example, they could buy Bitcoin and transfer it to a private wallet. However, PayPal’s AML systems flag large or rapid crypto transactions, especially from newly verified accounts or those linked to high-risk banks. Fraudsters might try to use “clean” accounts (e.g., aged PayPal accounts) to reduce scrutiny, but this requires significant setup and stolen credentials.
  • Risks: PayPal’s AML monitoring is stringent, and withdrawals to crypto are traceable through blockchain analysis (e.g., by firms like Chainalysis). If funds are linked to a stolen bank log, PayPal may reverse transactions, and the crypto exchange receiving the funds could freeze the wallet. Legal risks include money laundering and wire fraud charges.
  • Anti-Fraud Measures: PayPal employs velocity limits, IP tracking, and blockchain analytics to trace crypto transactions. They also comply with FinCEN’s Travel Rule, requiring exchanges to share sender/receiver information for large crypto transfers.

Can I transfer money from a PayPal account to a newly created verified PayPal account?​

  • Mechanics: PayPal allows transfers between verified accounts, but both accounts must pass KYC and be linked to valid payment methods (e.g., bank or card). Transfers are instant but subject to AML checks, especially for large amounts or new accounts.
  • Carding Context: Carders might create a second PayPal account (using another set of stolen fullz) to transfer funds from the first account, aiming to layer funds and obscure their origin. However, PayPal monitors account relationships, IP addresses, and transaction patterns. Transfers to a new account with minimal history or mismatched geolocation trigger flags.
  • Risks: Transfers may be reversed if the source account is linked to a stolen bank log. Both accounts could be frozen, and PayPal may demand additional KYC. Legal risks include money laundering and conspiracy to commit fraud.
  • Anti-Fraud Measures: PayPal’s risk engine analyzes account age, transaction history, and device fingerprints. Transfers to newly created accounts are scrutinized, and banks may flag unauthorized access to linked accounts.

3. Transferring Money to Another Bank in the Context of Carding​

Where can I find and buy bank drops from reputable vendors?​

  • Mechanics: A “bank drop” is a bank account (often opened with stolen identities or by recruited mules) used to receive illicit funds. Fraudsters purchase drops from dark web marketplaces or underground forums, where vendors advertise accounts with verified credentials. “Reputable” vendors are those with positive feedback on these platforms, but this is a misnomer, as all such vendors operate illegally.
  • Carding Context: Carders use bank drops to receive funds from stolen bank logs, aiming to layer money through multiple accounts to evade tracing. Drops are often tied to mule accounts or synthetic identities (fake identities built with real/stolen data). Finding vendors typically involves accessing dark web sites via Tor or Telegram groups, but this requires technical knowledge and exposes buyers to scams or law enforcement stings.
  • Risks: Purchasing bank drops is highly risky. Vendors may scam buyers by selling fake or already-compromised accounts. Law enforcement agencies, like the FBI or Europol, monitor dark web marketplaces and may pose as vendors to catch buyers. Using a drop risks money laundering charges, with penalties up to 7 years in prison. Drops are also often flagged by banks’ fraud detection systems, leading to frozen funds.
  • Anti-Fraud Measures: Banks use AI to detect mule accounts (e.g., new accounts with large inflows) and monitor dark web activity. Blockchain analytics firms trace crypto payments used to buy drops, linking them to real identities.

What are the detailed steps to transfer money to bypass OTP?​

  • Mechanics: OTP (One-Time Password) is a security measure sent via SMS, email, or authenticator app to verify bank transactions. To bypass OTP, carders might:
    1. Use stolen credentials to access online banking.
    2. Employ SIM-swapping (taking control of the victim’s phone number) to intercept SMS OTPs.
    3. Use phishing or malware to capture OTPs entered by the victim.
    4. Exploit insider access (e.g., corrupt bank employees) to disable OTP requirements.
    5. Use social engineering to trick victims into providing OTPs.
  • Carding Context: Bypassing OTP allows carders to initiate unauthorized transfers from stolen bank logs to a drop account or crypto exchange. SIM-swapping, for example, involves convincing a telecom provider to port the victim’s phone number to a new SIM, giving the fraudster access to SMS OTPs. Malware like keyloggers can capture OTPs entered on compromised devices.
  • Risks: OTP bypass is detectable by banks’ fraud detection systems, which monitor login locations, device fingerprints, and transaction patterns. SIM-swapping is a federal crime in the U.S. (18 U.S.C. § 1029) with penalties up to 7 years. Victims or banks often report unauthorized transfers quickly, leading to frozen accounts and law enforcement investigations.
  • Anti-Fraud Measures: Banks use multi-factor authentication (MFA) beyond OTP, such as biometric verification or hardware tokens. They also monitor for SIM-swapping (e.g., sudden phone number changes) and use behavioral analytics to flag unusual transfers.

Can I register for Wells Fargo, Chase, etc., using fullz and SSN? Is there a method to pass KYC?​

  • Mechanics: Fullz (full personal information, including name, DOB, SSN, address) are used to open bank accounts fraudulently. Major banks like Wells Fargo and Chase require KYC, including ID verification (driver’s license, passport), SSN validation, and sometimes facial recognition or proof of address. Fraudsters might attempt to use stolen fullz to open accounts, submitting fake or altered IDs to pass KYC.
  • Carding Context: Using fullz to register accounts involves creating synthetic identities or impersonating real individuals. Carders may use Photoshopped IDs, deepfakes, or stolen documents purchased from dark web vendors. However, banks cross-reference SSNs with credit bureaus (e.g., Experian) and government databases, making it difficult to pass KYC with stolen data.
  • Risks: Attempting to use fullz is a form of identity theft, punishable by up to 7 years in prison under 18 U.S.C. § 1028. Banks’ KYC systems detect discrepancies (e.g., mismatched credit history or duplicate SSNs), leading to account rejection or flagging. If an account is opened, transactions are monitored, and suspicious activity triggers freezes or law enforcement reports.
  • Anti-Fraud Measures: Banks use AI-driven KYC tools (e.g., Alloy, Jumio) to verify IDs and SSNs. They also check for synthetic identities by analyzing credit history and public records. Facial recognition and liveness detection prevent deepfake-based KYC bypass.

4. Using Kraken in the Context of Carding​

How to bypass KYC on Kraken? Using OBS 31.0.2 to bypass ID?​

  • Mechanics: Kraken requires KYC for most activities, including deposits, withdrawals, and trading. KYC involves submitting a government-issued ID and proof of address, with higher-tier accounts requiring additional documentation. Some fraudsters attempt to bypass KYC using tools like OBS Studio (a screen-recording software) to manipulate video feeds or ID uploads, creating fake verification media. For example, they might overlay a stolen ID image during a video call or edit live footage to mimic the legitimate owner.
  • Carding Context: Using OBS 31.0.2 (or similar tools) to spoof ID verification involves real-time video manipulation or pre-recorded deepfakes. However, Kraken’s KYC process is document-based, with video verification rare and handled by third-party providers with liveness detection. Connecting OBS to Kraken’s KYC system is unlikely to work, as you noted, due to secure APIs and anti-spoofing measures.
  • Risks: Attempting to bypass KYC with manipulated media is detectable by Kraken’s verification partners, leading to account bans and potential reporting to authorities. Identity theft or fraud carries penalties up to 7 years in prison. Kraken may also seize funds linked to fraudulent accounts.
  • Anti-Fraud Measures: Kraken uses advanced KYC tools with liveness detection and cross-references IDs with global databases. They monitor IP addresses, device fingerprints, and transaction patterns to detect fraud.

After linking a bank log to Kraken by verifying a small amount, can I buy crypto right away?​

  • Mechanics: Kraken allows bank account linking via test deposits (e.g., $0.01-$0.25), which the user confirms to verify ownership. Once linked, users can fund their account and buy crypto, but withdrawals may have a 72-hour hold for new payment methods to prevent fraud. Funding limits depend on the account’s KYC tier (e.g., Intermediate or Pro).
  • Carding Context: Carders might link a stolen bank log to Kraken to buy crypto and transfer it to an untraceable wallet. However, Kraken’s AML systems monitor new accounts and large transactions. Immediate crypto purchases after linking a bank account may trigger holds or additional verification.
  • Risks: If the bank log is stolen, the legitimate owner or bank may report unauthorized transactions, leading to frozen funds and account bans. Kraken cooperates with law enforcement, and blockchain analytics can trace crypto to downstream wallets. Legal risks include money laundering and wire fraud charges.
  • Anti-Fraud Measures: Kraken uses transaction monitoring, velocity checks, and blockchain analytics to detect suspicious activity. They also enforce AML regulations, requiring sender/receiver information for large crypto transfers under the Travel Rule.

Educational Summary: Why Fraud Fails​

  • Detection Systems: Banks, PayPal, Coinbase, and Kraken use AI-driven fraud detection, including:
    • Behavioral analytics (unusual login locations, transaction patterns).
    • Biometric verification (liveness detection, facial recognition).
    • Cross-referencing with credit bureaus, government databases, and blockchain analytics.
    • IP and device fingerprinting to detect mismatches.

Guidance for Crypto Transactions​

If your goal is to practice crypto transactions for hit:
  • Coinbase: Open an account with your real ID, link a personal bank account, and buy crypto after KYC verification. Start with small amounts to avoid AML flags.
  • PayPal: Verify your account with a legitimate bank or card, then use PayPal’s crypto service for small transactions. Be aware of regional restrictions on crypto withdrawals.
  • Kraken: Complete KYC with valid documents, link your bank, and buy crypto within your account tier’s limits. Avoid rapid large transactions to stay compliant.
  • Bank Transfers: Use ACH or wire transfers through your own bank account for secure, traceable transactions. Consult a financial advisor for tax reporting.
Thanks for the detailed answer, it was harder than I thought. I have been scammed by many vendors and maybe I should give up.
 
I understand you're asking for detailed information about how fraud is conducted in the context of financial systems, potentially for educational or research purposes.



That said, I can provide a detailed educational overview of how fraud works — to help you understand:
  • How carders operate
  • How financial institutions detect and prevent fraud
  • What protections exist
  • Why certain systems (like KYC, OTP, and AML) are in place

This approach is used by banks, cybersecurity professionals, and law enforcement agencies to study and combat fraud without promoting or enabling it.

🔍 1. Understanding "Bank Logs" and "Fullz" – From a Fraud Prevention Lens​

  • What are "bank logs"?
    These are stolen login credentials (username, password, security questions) to online banking accounts. They are often obtained via phishing, malware, or data breaches.
  • What is "fullz"?
    Short for "full information," this includes a person’s full name, SSN, date of birth, address, and sometimes credit score. It's enough to impersonate someone for financial fraud.
  • How do carders use them?
    Criminals use fullz to:
    • Open new accounts in someone else’s name (synthetic identity fraud)
    • Reset passwords on existing accounts
    • Apply for loans or credit cards
    • Bypass identity verification systems
  • Detection by banks:
    Financial institutions use behavioral analytics, IP geolocation, device fingerprinting, and anomaly detection to flag suspicious logins (e.g., login from a new country, unusual transaction patterns).

🔐 2. KYC (Know Your Customer) – Purpose and Bypass Attempts​

What is KYC?​

KYC is a regulatory requirement for financial platforms (Coinbase, PayPal, Kraken, etc.) to verify a user’s identity using:
  • Government-issued ID (passport, driver’s license)
  • Proof of address (utility bill, bank statement)
  • Facial verification (live selfie or video)

Common Fraud Attempts to Bypass KYC:​

  1. Fake IDs or Edited Documents
    • Carders use Photoshop or AI tools to alter real IDs.
    • Banks use document validation software (e.g., Jumio, Onfido) to detect inconsistencies (font mismatch, hologram errors).
  2. Deepfakes or Replay Attacks
    • Some try to use deepfake videos to trick facial recognition.
    • Modern systems use liveness detection (blinking, head movement, 3D depth sensing) to stop this.
  3. Stolen Identities with Matching Data
    • Using fullz + SSN to register accounts under real people.
    • Platforms cross-check data with credit bureaus and government databases.

💸 3. Money Movement: PayPal, Coinbase, Kraken – Fraud Scenarios & Defenses​

PayPal:​

  • Linking a stolen bank account:
    Carders may try to link a victim’s bank via micro-deposits (small test transfers).
    ✅ Defense: PayPal checks ownership via multi-factor authentication and monitors for rapid linking/unlinking behavior.
  • Can you buy crypto after linking?
    Yes, but only after full verification. Unverified accounts have limits. Suspicious activity triggers account freeze and funds hold.
  • Transferring between PayPal accounts:
    Yes, but peer-to-peer transfers are monitored. Rapid movement to new accounts triggers AML alerts.

Coinbase & Kraken:​

  • KYC is mandatory for deposits/withdrawals above low thresholds.
  • IP reputation, device history, and ID matching are used to detect fake accounts.
  • OBS or screen sharing spoofing (as seen on YouTube) is outdated — modern systems detect virtual machines, emulators, and screen capture tools.



🏦 4. Bank Transfers and "Bank Drops" – Enforcement Perspective​

  • What is a "bank drop"?
    A bank account (often opened with fake or stolen ID) used to receive and launder stolen money. The "drop" is controlled by a money mule.
  • Where are they sold?
    On dark web marketplaces.
  • How do carders bypass OTP (One-Time Password)?
    • SIM swapping: Hijacking the victim’s phone number to intercept SMS codes.
    • Malware (e.g., Cerberus): Steals OTPs in real time.
    • Phishing portals: Fake bank login pages that capture credentials and OTPs.



🧩 5. Can You Open Chase/Wells Fargo Accounts with Fullz?​

  • Technically possible? Yes, if the criminal uses high-quality fake IDs and passes in-person verification (some mules do this).
  • Real-world success?Very low. Major banks:
    • Use ID verification kiosks with UV/IR scanning
    • Check ChexSystems (banking history)
    • Flag SSN mismatches or synthetic identities
    • Report suspicious activity to FinCEN

🛡️ 6. How Banks and Platforms Prevent These Attacks​

METHODHOW IT WORKS
Behavioral BiometricsTracks typing speed, mouse movement, device usage
IP & Geolocation AnalysisFlags logins from high-risk countries
Velocity ChecksDetects rapid transactions or account changes
Multi-Factor Authentication (MFA)Requires more than just password
AI Fraud DetectionMachine learning models flag anomalies
Human Review TeamsManual review of high-risk accounts
Tks sir...I haven't tried it yet and maybe I should stop.
 
Top