What is carding?

Lord777

Professional
Messages
2,577
Reaction score
1,563
Points
113
Online money theft is common and very common. Victims are bank customers with active accounts and plastic cards attached to them. Find out what online carding is and take measures to protect yourself from hackers. Use two-factor authentication and keep your password and PIN secret. Fraud is characterized by the use of a person's debit or credit payment card without their consent. The carder gets access to bank information and uses other people's money. This article describes in detail the methods of carding, basic schemes and recommendations for protecting against such types of fraud.

Article content:
  • What is carding?
  • General carding scheme
  • The most common carding schemes
  • Types of carding
  • How carders avoid punishment
  • You are a victim of carding: what should I do?
  • Frequently Asked Questions
  • What is important to remember

What is carding?​


In fact, this is the theft of funds from an individual's bank account, which is linked to a debit or credit payment card. Usually, theft is carried out through Internet access by obtaining information about the owner of the plastic — first name, last name, passwords for logging in to accounts linked to stores on the Network, PIN codes, and other information. Question: carding what is it in simple words? This means getting access to the owner's personal data and using funds from a bank card without their knowledge.

Most often, scammers act in two ways:
  • transfer other people's money to their bank account;
  • make purchases in online stores, paying for them with someone else's card.
People involved in such manipulations are called carders. Most often, a person ignores basic security measures for the safety of their savings — enters the password at the ATM in the presence of strangers who can see the entered characters, informs fraudsters by phone codes from SMS and other data that gives access to the card account.

But the development of Internet technologies contributes to greater sophistication of scammers, sometimes their victims are attentive people who maximize the security of their savings and savings. For example, when an online store is hacked, all identified and registered users automatically become easy prey for carders, since a payment card is attached to the account.

General carding scheme​

As a rule, carding the work of scammers on the Internet operates according to certain well-established schemes, which are improved and changed as banking technologies develop. Despite the precautionary measures, making payments through secure bank gateways with the HTTPS protocol, fraud works quite successfully. There are different schemes for accessing money on a card account.

Basic scheme used by carders:
  • the carder purchases a database with access to the personal data of payment card holders, which contains the personal information of the alleged victims — phone numbers, first name, last name;
  • the carder's representative calls the person on the phone, introduces himself as an employee of the banking security service and reports any suspicious actions regarding the plastic card;
  • the victim is confused and does not confirm the actions claimed by the fraudster;
  • after that, the caller reassures the cardholder, declaring an attack of fraudsters, offers help in protecting the card account — you need to dictate a 4-digit code that was sent via SMS.
The combination of symbols is generated automatically by the online store aggregator. If you dictate this code, the carder will get access to the account, and the phone connection will be interrupted. Especially trusting are elderly people or young people who are new to banking, for whom a payment card has become the first virtual money storage in their life.

Fraudsters extraction of personal data does not depend on the actions of the victim. In most cases, such information is sold via the Darknet or is generated to order — For example, bank employees with access to customers personal information can sell databases with addresses, phone numbers, card numbers, and bank account status. On the Darknet, you can buy phone numbers, lists with the names of alleged victims, and a specific amount of plastic storage media with an indication of the amount.

The most common carding schemes​


The development of e-commerce has crossed a 30-year milestone, and simultaneously with the appearance of the first online stores, the first carders appeared. In the 1990s, the schemes were fairly simple due to the lack of secure banking for merchants. 30 years ago, carders worked according to the scheme: they created non-existent plastic cards and used them to pay for purchases in online stores. The lack of real money in the account of the owner of the trading service was not immediately detected, and reconciliation with the issuer was carried out approximately once a month.

More sophisticated fraudulent schemes for stealing money from bank accounts have now been developed. In addition to the basic method with a call to the cardholder, other methods are common: plastic cards, two-factor authentication, MCSC,VBV, and fulka.

Carding with plastic cards​

The cards used have different classifications: for example, they can be debit or credit cards. All plastic cards contain basic and detailed information about the owner:
  • last name and first name in Latin;
  • time interval to use;
  • a variety — for example, Mastercard;
  • name of the issuing bank;
  • The three-character security code is CVV.
Some payment systems that use online trading platforms only accept payments based on this information without additional confirmation of the transaction. Carders specifically find such stores, hack them, and get access to the cards of customers who have already made a transaction or just managed to register on the site of such a platform. This also includes requests from the seller to pay for goods through a strange or little-known payment service. As a rule, these are hackers who have already hacked the store, so it is better to refrain from buying.

MCSC, VBV, and two-factor authentication​

MCSC and VBV are two-factor authentication methods that are common mainly in Western countries, and SMS codes and phone numbers are not used. The cardholder creates a special security password on their ATM or bank account. MCSC and VBV methods have disadvantages due to repeated use and often cause fraud on the part of carders. Two-factor authentication via sms code is less vulnerable to hacking.

Two-factor authentication is popular, but also imperfect — access to a card account can be obtained through fake cookies or using virus software embedded in a computer or smartphone. You need to install modern antivirus programs that ensure the correct operation of electronics and mobile devices.

Specially designed malicious programs are embedded in user accounts with linked payment data and read the information. For example, a Google account that contains passwords for accessing online stores, social networks, and a linked payment card-all information gets into the Darknet, is sold, and leads to loss of money.

Fake cookies are no less dangerous because they perform the functions of the original — they read actions and information about the user. The information obtained contains enough benefits for hackers and is also used by carders to gain access to other people's money on a bank card.

Fullz​

The most expensive type of information on the Darknet and special hacker forums is fulks or fullz. This is hacker terminology, meaning the most complete information about a person. This includes data:
  • passport and other identity cards;
  • last name, first name and patronymic of the bank's client;
  • address of residence, registration and date of birth;
  • email details and phone numbers;
  • all details of existing payment cards;
  • list of transactions on the card account.
In this case, carding is performed using microtransactions. In other words, the owner uses an application infected with malware. You receive a notification that asks you to verify the authenticity of your banking details by transferring a small amount that will be returned after verification — For example, you need to transfer 1 ruble. In this way, payment information is read and the card is hacked. The scheme does not arouse suspicion, since the notification comes from a long-installed application or software that previously did not cause complaints.

Other schemes​

Some methods of fraud are not considered well-known and widespread, but they also apply to carding. For example, BlackBox is a sophisticated method used by experienced hackers. A small computer is connected via a special wire to an ATM and cash is transferred to their own accounts. Payment terminals are also hacked in the same way. Unfortunately, it is impossible to protect yourself from such carding schemes.

Types of carding​


There are two key types of carding - with physical access to payment card data and remote theft of money. Both methods are used, and sometimes part of the blame lies on the carelessness of the owner of the money account.

Physical access. It sounds strange, but even now they steal bags and purses that contain plastic cards, to which a piece of paper with a written PIN code is glued. Other physical access options include forgetting your card at an ATM in front of strangers, losing an envelope with your password, or remembering the password you entered when paying for goods at the checkout counter in a store. Or you withdraw money using an ATM at night in a secluded, relatively crime-prone place. If you are forced to withdraw money from your account by physical threats — this is carding cash, which refers to the type of physical access. Remote carding is the theft of money from the account of the owner of a plastic card.

Duffel carding​

The clothing method is called carding drive-in-this is the purchase of various items on trading platforms on the Internet without the consent of the cardholder. Vbeevers work according to a long-established scheme — the purchase is paid for using someone else's card, and delivery is made out to fake addresses through legal services. Intermediaries receive the product and resell it — the chain can be quite large or consist of one person. As a rule, carders prefer to work with foreigners who have two-factor authentication of payment cards that are not linked to a phone number.

Electronic payment systems​

In this case, it means the theft of monetary assets from electronic wallets. Hackers use two methods with payment systems:
  • hacking a real user's account;
  • they are registered under someone else's data, which is taken from fulki.
The first method is more complex than the second. Using a clone account allows you to use all types of payments thanks to access to SIM cards, bank accounts, and e-wallets. In other words, the clone buys products online, transfers money to other accounts, and so on.

Adding funds to your SIM cards​

Carders use several SIM cards, which they top up using an international service. The money comes from a hacked account. You can use the money in your phone account to pay for online purchases, cash out, and conduct other transactions — The variation depends on the mobile operator and the fraudster's capabilities.

Phishing​

Creating fake websites or pages of banks, online stores, and other services where you need to enter your payment card details. As a rule, the URL differs by a single letter or characters and may be misleading due to inattention of the user. One of the phishing methods is to send emails to the cardholder on behalf of the bank with a request to confirm the details using a PIN code.

Vishing​

An analog of phishing is called scam carding — this is a method in which scammers use the most common scheme — phone calls. In this way, they lure out your card details, ask you to enter the code you received on your phone, and steal money from your bank card account.

Skimming​

Carders can install special equipment on ATMs that is invisible to visitors. When the card is inserted into the slot, the data is read and stored on the skimmer. They also use special keyboard attachments and miniature cameras to get PIN codes. Particularly advanced hackers use fake ATMs. When performing actions with the card, a person sees an error and thinks that the ATM is not working.

Shimming​

An improved version of skimming. The method is completely identical, but the so-called "pwm" inside the device may not be noticed even by employees of the bank's technical service. "Pwm" is a thin miniature device that reads data from a payment card using an ATM.

How carders avoid punishment​


Quite often, appeals to the police do not bring the proper effect. Internet scammers think through every step and protect themselves from liability as much as possible. For example, the Criminal Code provides for an article and responsibility for such actions, but it is often impossible to physically find the culprit.

Carders use multi-factor protection, log in to the Internet via different IP addresses using VPN services, and use schemes with intermediaries. For example, a carding drive - in can lead the police to a drop — a person who receives goods from a store, but is not a cracker.

You are a victim of carding: what should I do?​

The first step is to notify the bank and block the card, and the second is to contact the police. Unfortunately, victims of carding become aware of the fraud after it is committed. Accordingly, it is unlikely that you will be able to return the money. But you need to protect yourself from future attacks of this kind. After contacting the bank and the police, you must take the following actions:
  • change passwords for all accounts;
  • cancel all online payment card bindings;
  • use two-factor authentication using a phone number for all merchant profiles and accounts.
Open a separate bank account for online shopping. In other words, it should be an empty plastic card. Top it up through the terminal in a physical way (deposit cash) immediately before making a purchase. It is not recommended to link a credit card or debit card with savings stored on it to accounts or trading platforms.

Frequently Asked Questions​

What is drive-in carding?​

This is duffel carding, in which stolen money is used for shopping in online stores.

What is phishing and skimming?​

Phishing — fake websites of trading platforms or banks that lure out payment card details. Skimming — reading of plastic card data at ATMs using special equipment.

Who are carders on the Internet?​

These are scammers who steal money from bank customers payment cards.

What is important to remember​

Carding is a common method of fraud, which partially flourishes due to inattention and negligent attitude to your personal data. Protect your personal and payment information as much as possible — try to stay ahead of carders and avoid getting caught in their networks. Be careful with phone calls from the bank, do not enter any software codes on the Internet, and check information about online stores.

(c) https://profunds.ru/carding
 
Top