Theft of money via the Internet is common and very common. The victims are bank clients with active accounts and plastic cards attached to them. Understand what online carding is and take measures to protect yourself from hackers. Use two-factor authentication and keep your password and PIN secret. Fraud is characterized by using a person's debit or credit payment card without their consent. The carder gains access to banking information and uses other people's funds. This article describes in detail carding methods, basic schemes and recommendations for protection against such types of fraud.
The content of the article:
Most often, scammers act in two ways:
But the development of Internet technologies contributes to greater sophistication of scammers, sometimes their victims become attentive people who ensure the maximum security of their savings and accumulations. For example, when an online store is hacked, all identified and registered users automatically become easy prey for carders, since a payment card is attached to the account.
The basic scheme used by carders:
The extraction of personal data by scammers does not depend on the actions of the victim. In most cases, such information is sold via the Darknet or generated to order - for example, bank employees with access to clients’ personal information can sell databases with addresses, phone numbers, card numbers and bank account status. On the Darknet you can buy phone numbers, lists with the names of alleged victims and a specific number of plastic storage media indicating the amount.
More complex fraudulent schemes for stealing money from bank accounts have now been developed. In addition to the basic method of calling the cardholder, other methods are common: plastic cards, two-factor authentication, MCSC, VBV and fulka.
Two-factor authentication is popular, but also imperfect - access to a card account can be obtained through fake cookies or using virus software embedded in a computer or smartphone. It is necessary to install modern anti-virus programs that ensure the correct operation of electronics and mobile devices.
Specially designed malware is injected into user accounts with linked payment information and reads the information. For example, a Google account containing passwords for access to online stores, social networks and a linked payment card - all information ends up on the Darknet, is sold and leads to the loss of money.
Fake cookies are no less dangerous because they perform the functions of the original ones - they read actions and information about the user. The information obtained is quite useful for hackers and is also used by carders to gain access to other people's money on a bank card.
In this case, carding is carried out using microtransactions. That is, the owner is using an application infected with malware. You receive a notification asking you to check the authenticity of your details by transferring a small amount, which will be returned after verification - for example, you need to transfer 1 ruble. In this way, payment information is read and the card is hacked. The scheme is not suspicious, since the notification comes from a long-installed application or software that has not previously caused any complaints.
Physical access. It sounds strange, but even now bags and wallets are stolen that contain plastic cards with a piece of paper with a written PIN code glued to them. Other options for physical access - you forgot your card at an ATM in front of strangers, lost the envelope with the password, when paying for goods at the checkout in a store, the seller, cashier or people in line remembered the entered password. Or you withdraw money from an ATM at night in a secluded, crime-free place. If you are forced by physical threats to withdraw money from your account, this is cash carding, which is a type of physical access. Remote carding is the theft of money from the account of the owner of a plastic card.
Carders use multi-factor protection, access the Internet through different IPs using VPN services and use schemes with intermediaries. For example, carding can lead the police to a drop - a person who receives goods from a store, but is not a burglar.
(c) https://profunds.ru/carding
The content of the article:
- What is carding
- General carding scheme
- The most common carding schemes
- Types of carding
- How carders avoid punishment
- You have become a victim of carding: what to do?
- FAQ
- What is important to remember
What is carding
In fact, this is the theft of funds from an individual's bank account, which is linked to a debit or credit payment card. Typically, theft is carried out through Internet access by obtaining information about the owner of the plastic card - first name, last name, passwords for logging into accounts linked to online stores, PIN codes and other information. Question: carding, what is it in simple words? This is gaining access to the owner’s personal data and using funds from a bank card without his knowledge.Most often, scammers act in two ways:
- transfer other people's funds to their bank account;
- make purchases in online stores, paying for them with someone else’s card.
But the development of Internet technologies contributes to greater sophistication of scammers, sometimes their victims become attentive people who ensure the maximum security of their savings and accumulations. For example, when an online store is hacked, all identified and registered users automatically become easy prey for carders, since a payment card is attached to the account.
General carding scheme
As a rule, carding scammers on the Internet operate according to certain proven schemes, which are improved and changed as banking technologies develop. Despite the precautions of making payments through secure bank gateways with the HTTPS protocol, the scam works quite successfully. There are different schemes for gaining access to money in a card account.The basic scheme used by carders:
- the carder acquires a database with access to personal data of payment card owners, which contains personal information of the alleged victims - telephone numbers, first name, last name;
- the carder's representative calls the person on the phone, introduces himself as a bank security employee and reports any suspicious activities regarding the plastic card;
- the victim is confused and does not confirm the actions announced by the scammer;
- After this, the caller reassures the card holder, declaring a fraud attack and offers assistance in protecting the card account - you need to dictate a 4-digit code that is sent via SMS.
The extraction of personal data by scammers does not depend on the actions of the victim. In most cases, such information is sold via the Darknet or generated to order - for example, bank employees with access to clients’ personal information can sell databases with addresses, phone numbers, card numbers and bank account status. On the Darknet you can buy phone numbers, lists with the names of alleged victims and a specific number of plastic storage media indicating the amount.
The most common carding schemes
The development of e-commerce has crossed the 30-year mark, and simultaneously with the advent of the first online stores, the first carders appeared. In the 1990s, the schemes were quite simple due to the lack of secure banking for merchants. 30 years ago, carders worked according to the following scheme: they created non-existent plastic cards and used them to pay for purchases in online stores. The lack of real money in the account of the owner of the trading service was not immediately detected; reconciliation with the issuer was carried out approximately once a month.More complex fraudulent schemes for stealing money from bank accounts have now been developed. In addition to the basic method of calling the cardholder, other methods are common: plastic cards, two-factor authentication, MCSC, VBV and fulka.
Carding with plastic cards
The cards used have different classifications - for example, they are debit, credit. All plastic cards contain basic and detailed information about the owner:- last name and first name in Latin;
- time interval to use;
- variety - for example, Mastercard;
- name of the issuing bank;
- three-character security code - CVV.
MCSC, VBV and two-factor authentication
MCSC and VBV are methods of protecting payment cards using two-factor authentication, widespread mainly in Western countries, without using SMS codes and phone numbers. The cardholder independently creates a special security password at an ATM or in a bank account. MCSC and VBV methods have disadvantages due to repeated use and often cause fraud by carders. Two-factor authentication via SMS code is less vulnerable to hacking.Two-factor authentication is popular, but also imperfect - access to a card account can be obtained through fake cookies or using virus software embedded in a computer or smartphone. It is necessary to install modern anti-virus programs that ensure the correct operation of electronics and mobile devices.
Specially designed malware is injected into user accounts with linked payment information and reads the information. For example, a Google account containing passwords for access to online stores, social networks and a linked payment card - all information ends up on the Darknet, is sold and leads to the loss of money.
Fake cookies are no less dangerous because they perform the functions of the original ones - they read actions and information about the user. The information obtained is quite useful for hackers and is also used by carders to gain access to other people's money on a bank card.
Fullz (full info)
The most expensive type of information on the Darknet and special hacker forums is fulka or fullz. This is hacker terminology, meaning the most complete information about a person. This includes data:- passport and other identification documents;
- last name, first name, patronymic of the bank client;
- registration address, registration and date of birth;
- email details and telephone numbers;
- all details of available payment cards;
- list of card account transactions.
In this case, carding is carried out using microtransactions. That is, the owner is using an application infected with malware. You receive a notification asking you to check the authenticity of your details by transferring a small amount, which will be returned after verification - for example, you need to transfer 1 ruble. In this way, payment information is read and the card is hacked. The scheme is not suspicious, since the notification comes from a long-installed application or software that has not previously caused any complaints.
Other schemes
Some methods of fraud are not considered known and common, but also apply to carding. For example, BlackBox is a sophisticated method used by experienced hackers. A small computer is connected via a special wire to an ATM and cash is transferred to your own accounts. Payment terminals are also hacked in the same way; unfortunately, it is impossible to protect against such carding schemes.Types of carding
There are two key types of carding - with physical access to payment card data and remote theft of money. Both methods are used and sometimes part of the blame lies with the carelessness of the owner of the money account.Physical access. It sounds strange, but even now bags and wallets are stolen that contain plastic cards with a piece of paper with a written PIN code glued to them. Other options for physical access - you forgot your card at an ATM in front of strangers, lost the envelope with the password, when paying for goods at the checkout in a store, the seller, cashier or people in line remembered the entered password. Or you withdraw money from an ATM at night in a secluded, crime-free place. If you are forced by physical threats to withdraw money from your account, this is cash carding, which is a type of physical access. Remote carding is the theft of money from the account of the owner of a plastic card.
Clothes carding (stuff carding)
The item method is called carding by driving in - this is the purchase of various items on trading platforms on the Internet without the consent of the card holder. Drivers work according to a long-established scheme - the purchase is paid for using someone else’s card, delivery is made to fake addresses through legal services. Intermediaries receive the goods and resell them - the chain can be quite large or consist of one person. As a rule, carders prefer to work via ID with foreigners whose two-factor authentication of payment cards is not tied to a phone number.Electronic payment systems
In this case, it means the theft of monetary assets from electronic wallets. Hackers use two methods with payment systems:- hack a real user's account;
- are registered under someone else's data, which is taken from the Fulka.
Replenishment of SIM cards
Carders use several SIM cards, which are topped up using an international service. The money comes from a hacked account. Using money on your phone account, you can pay for purchases on the Internet, cash out and carry out other transactions - the variability depends on the mobile operator and the capabilities of the fraudster.Phishing
Creation of fake websites or pages of banks, online stores and other services where you need to enter payment card data. Typically, the URL differs by one letter or symbol and can be misleading due to user inattention. One of the phishing methods is to send emails to the cardholder on behalf of the bank asking them to confirm details using a PIN code.Vishing
An analogue of phishing is called scam carding - this is a method in which scammers use the most common scheme - telephone calls. In this way, they steal your card details, ask you to enter a code received on your phone, and steal money from your bank card account.Skimming
Carders can install special equipment on ATMs that is invisible to visitors. When the card is inserted into the slot, the data is read and stored on the skimmer. They also use special keyboard attachments and miniature cameras to obtain PIN codes. Particularly advanced hackers use fake ATMs. When performing actions with a card, a person sees an error and thinks that the ATM is not working.Shimming
An improved type of skimming. The method is completely identical, but the so-called “shim” inside the device may not be noticed even by bank technical service employees. “Shim” is a thin miniature device that reads data from a payment card using an ATM.How carders avoid punishment
Quite often, calls to the police do not bring the desired effect. Internet scammers think through every step and protect themselves from liability as much as possible. For example, the Criminal Code provides for an article and liability for such actions, but it is often impossible to physically find the culprit.Carders use multi-factor protection, access the Internet through different IPs using VPN services and use schemes with intermediaries. For example, carding can lead the police to a drop - a person who receives goods from a store, but is not a burglar.
You have become a victim of carding: what to do?
The first action is to inform the bank and block the card, the second is to contact the police. Unfortunately, carding victims realize the scam after the fact. Accordingly, it is unlikely that you will be able to return the money. But you need to protect yourself from future attacks of this kind. After contacting the bank and the police, you must take the following actions:- change passwords in all accounts;
- cancel all payment card bindings on the Internet;
- use two-factor authentication using a phone number for all accounts.
FAQ
What is carding?
This is clothing carding, in which stolen money is used for shopping in online stores.What is phishing and skimming?
Phishing - fake websites of trading platforms or banks that lure payment card data. Skimming is reading plastic card data at ATMs using special equipment.Who are carders on the Internet?
These are scammers who steal money from payment cards of bank clients.What is important to remember
Carding is a common method of fraud, which thrives in part due to inattention and negligent attitude towards one’s personal data. Protect your personal and payment information as much as possible - try to get ahead of carders and not fall into their networks. Be careful with phone calls from the bank, do not enter any codes on the Internet, check information about online stores.(c) https://profunds.ru/carding