chushpan
Professional
- Messages
- 696
- Reaction score
- 463
- Points
- 63
Card cashing is the process of withdrawing or using funds from stolen bank cards. This is a key part of carding, where criminals seek to transfer money to their accounts or receive it in cash. Let's look at the main methods used to cash cards.
If you have additional questions about cashing methods or protection methods, ask!
1. Using cloned cards
- Description: Attackers create physical copies of cards using data read from the magnetic strip (dumps).
- How it works:
- Data is written onto blank plastic using an MSR encoder.
- The cloned card is used to withdraw cash from ATMs.
- Risks:
- Modern ATMs are equipped with technologies to detect counterfeit cards.
- Banks can monitor suspicious transactions through anti-fraud systems.
2. Online shopping
- Description: Stolen card data is used to purchase goods in online stores.
- How it works:
- Fraudsters make purchases in Cardable 2D stores (sites without 3D Secure).
- The goods are delivered to the drop address (the fictitious recipient).
- Examples of products:
- Electronics (iPhone, laptops).
- Gift cards (Amazon, iTunes).
- Digital goods (game keys, subscriptions).
- Risks:
- Stores may use fraud detection systems.
- The drop's address may be revealed by law enforcement.
3. Transfers to other accounts
- Description: Funds are transferred from the stolen card to other accounts such as e-wallets or prepaid cards.
- How it works:
- Fraudsters use platforms such as PayPal, Skrill, WebMoney or cryptocurrency exchanges.
- After the transfer, the money is converted into cryptocurrency or withdrawn through money mules.
- Risks:
- Payment systems and banks may block transactions.
- Mules can be identified and prosecuted.
4. Selling dumps
- Description: Instead of using the cards directly, the attackers sell the dumps on the black market.
- How it works:
- Dumps are sold on darknet forums or through specialized sites.
- Buyers use dumps to clone cards or make purchases.
- Risks:
- Selling dumps may result in the seller being arrested.
- Dumps may be of poor quality or already blocked.
5. Using VoIP services
- Description: Fraudsters use stolen cards to top up accounts on VoIP platforms (e.g. Skype, Zoom).
- How it works:
- The card is checked through a test transaction (call service).
- If the transaction is successful, the funds are used to pay for services or resell accounts.
- Risks:
- VoIP platforms actively cooperate with banks to identify fraudsters.
6. Payment for gift cards
- Description: Stolen cards are used to purchase gift cards, which are then sold on the secondary market.
- How it works:
- Scammers buy cards from Amazon, iTunes, Steam or other popular services.
- Gift cards are resold for cash or cryptocurrency.
- Risks:
- Stores may cancel gift cards after fraud is detected.
7. Using money mules
- Description: Carders hire "money mules" to obtain money or goods.
- How it works:
- The mule provides his bank details or personal information.
- The funds are transferred to the mule's account, which then cashes them out or passes them on to the criminals.
- Risks:
- Mules may be detained by law enforcement.
- Banks may freeze mule accounts.
8. Using cryptocurrencies
- Description: Funds from stolen cards are converted into cryptocurrency to make tracking more difficult.
- How it works:
- Scammers buy Bitcoin, Ethereum or other cryptocurrencies through exchanges.
- Cryptocurrency is transferred to anonymous wallets (for example, via Monero or Tornado Cash).
- Risks:
- Large exchanges require KYC verification.
- Transactions can be tracked through blockchain analysis.
9. Buying tickets or booking accommodation
- Description: Stolen cards are used to purchase airline tickets, book hotels or rent cars.
- How it works:
- Fraudsters place orders with fictitious persons or droppers.
- Tickets or reservations are resold for cash.
- Risks:
- Service providers may cancel orders.
- Drops can be detected by law enforcement.
10. Using POS terminals
- Description: Attackers use compromised POS terminals to withdraw funds from cards.
- How it works:
- Fraudsters hack terminals to intercept card data.
- The data is used to create clones or online transactions.
- Risks:
- Modern terminals are equipped with anti-skimming devices.
11. Selling goods through fake stores
- Description: Fraudsters create fake online stores to sell goods using stolen cards.
- How it works:
- Fraudsters post ads for the sale of goods (for example, electronics).
- After payment, goods purchased with stolen cards are sent to customers.
- Risks:
- Such stores are quickly identified by security systems.
Conclusion
Carders use a variety of methods to cash out cards, each with its own benefits and risks. However, all of these methods are illegal and can lead to serious consequences, including criminal liability. Modern technologies such as EMV chips, 3D Secure, and transaction monitoring systems make it much more difficult to use stolen cards.If you have additional questions about cashing methods or protection methods, ask!