What is carding?

Carding

Professional
Messages
2,871
Reaction score
2,371
Points
113
Currently, the prosecutor's office noted that the owners of various cards this year should be especially careful and in no case fall for the tricks of the schemes and the scammers themselves. Let's figure out together what kind of carding options you can face, and how to correctly protect your own money.

What is carding?

Carding is a variety of fraudulent schemes involving payment cards that are not approved by the cardholders. It should be noted that this type of fraud includes a variety of fraud options.

At the moment, there are several main directions of fraudsters' actions:

1. Illegal receipt of a bank card or simply theft is either the usual pressure on the cardholder himself, or the search for weak points in a banking product. This makes it much easier for fraudsters to use the card for their own purposes.

2. Recognition of card data in order to then make a forgery. To begin with, we will talk about stealing a pin code or copying data. In this case, we are talking about the time when the mass transfer of cards to chips was widespread. At the moment, such schemes are not so common, the fact is that in our country a few years ago they simply imposed bans on the issuance of other non-chip cards.

3. Also, data can compromise, for this they use payment for purchases or services on the Internet.

What is the ultimate goal of the criminal in these cases?

He needs to get access to funds. To achieve this goal, scammers decide to invent rather cunning schemes. They often enjoy the trust of citizens, as well as their carelessness and forgetfulness. Phishing is also a popular way to fool the card client.

The presence of viruses

In this case, fraudsters decide to implement a special program into their electronic device (it can be either a phone or a computer), with which you can read your card data. Such variants of viruses may well transmit information in a special way that the cardholder entered into the browser.

These can be passwords from bank cards, social networks, e-wallets, as well as passwords from special sites and more. It is also worth noting that a virus can get on a computer by accident. The owner can simply download some unlicensed program. This will be enough to launch the virus.

If you do not want to succumb to panic and deception, it will be important to update your antivirus programs in time and use only licensed versions of the programs.

How to properly protect yourself from carding?

Among the fraud schemes, you can often find:

1. These include the use of card details to then simply access the rest of the products. It can be RBS or online lending. There, information about the card, as well as recent transactions and various confirmation codes, as well as passport data - all this is sufficient information in order to change passwords in the bank or perform other manipulations with accounts.

2. Attackers can steal funds from contactless cards. This scheme has now made a lot of noise about nothing a few years ago, but no significant losses have been recorded. It is unlikely that there will be any problems in the future.

It is worth noting that after a certain time you may notice that the schemes for deception can only be improved. Of course, banks are fighting against intruders. But this is not enough, the cardholders themselves must learn to take precautions.

1. Keep the PIN-code, as well as all the data for entering the bank in a safe place, preferably using your own memory for this purpose.

2. In no case tell other people your card details, as well as one-time SMS passwords to confirm transactions.

3. Be sure to be careful when shopping online. Use only trusted sites. Please note that low-priced products should alert you rather than grab your attention.

Fake ATMs

In some cases, most fraudsters create so-called fake ATMs and leave them where there is no security. Such ATMs completely copy the usual ones. Usually the victim inserts the card, then the person tries to do some action, but the ATM gives an error. The person is trying to take the card, but all the information from it has already been read.

Not only those who use a conventional ATM, but also those who like to make payments with a card, fall for the bait of attackers. It can be a store or a restaurant. Choose ATM machines in rooms with video surveillance. Scammers will not pass! If the funds could not be protected in any way, contact the police or the bank, but only urgently.
 
What is carding? This is a huge world in which billions of dollars, whores and drugs revolve. Let's deal with this definition so that even a beginner can understand it.
Carding is a type of fraud in which an operation is performed using a payment card or its details, not initiated or confirmed by its holder.

That is, carding is when you take the data of the card holder and thanks to this data you get money from this card.

You can screw money honestly earned by a cardholder in different ways. We will talk about ways how to do this with the help of huge online stores, such as eBay, in which the owner's card is linked to the account.
But there are a great many ways. These are well-known trading platforms, both selling virtual products (software, for example) and real physical goods (all these are your iPhones, MacBook's, and so on). While I am writing this article, just believe me, many carders take thousands of units of money from various sites. And you can do that. The main rule, which we will remind you more than once again: NEVER WORK INSIDE YOUR COUNTRY. What is the reason for this? See articles on security. With the right approach, your pockets will gradually fill with money (only the lazy make one hundred thousand bucks here, and the probability of catching you will be zero).

With such money in your pocket, you can afford anything: elite prostitutes, cool cars, coke - whatever you want!
I think what carding is (aka Russian call "karzh") figured out. Moving on!
 
What is carding?
Carding is a credit card fraud, at least that's how Google defines it, but does it reflect the essence of the industry? No!

Carding is a huge culture that is very firmly entrenched in the entire shadow movement and is developing every day. It has its own rules, significant events, "heroes" and "villains".

For example, one of the main unwritten rules of all post-Soviet carders is not to work in RU and the CIS. Firstly, it is dangerous, and, secondly, it is immoral: “don’t shit where you eat”, that is, don’t steal from your own people!

But despite all the features of this craft, you need to understand one thing: carding is an ordinary business, albeit illegal. All the same market laws and economic relations between people operate here.

Nevertheless, everyone perceives karzh in their own way. For some it is a full-fledged job, for others it is a lifestyle, and for some it is just a hobby. And believe me, this is far from a "loot button", because to achieve real success you will have to work very hard and hard, study, spend money and time, constantly develop and learn something new!

Also, uninitiated people believe that carding is a fraud only with bank cards (for some, it is still associated with cash-in, ATM and white plastic, thanks to pop culture), but this has not been the case for a long time. In the current realities, carders work not only with cards, but also with payment systems like PayPal, bank accounts, cryptocurrency, etc. In general, with everything that is enough imagination and where you can get money from!

The main directions of carding
There are quite a few directions in our field, so I will tell you about the main ones.

Clothes carding
Essence: the purchase of goods (equipment, clothing, shoes, jewelry, teapots, a wing from Boeing) for other people's money and the subsequent resale of this product.

You can card your gear purely for yourself, thereby saving decent amounts or using intermediary services / drops to deliver goods to your country and resell. Or take the easier path, working with the buyers who buy your goods for 30-50% of its value and make payments in the shortest possible time.

The oldest and most widely known direction to the inhabitants. In this method, the carder puts on a coat and goes to the ATM to receive cash. How? By means of special equipment, which will not be difficult to find on the darknet, or software that allows a carder to get access to an ATM.

It will also be poured through purchases in stores. I bought a couple of new apples with the help of someone else's plastic, resold them in the secondary market, here's your profit. Most of the real people work in Europe / USA. And yes, real is the most dangerous and difficult direction, for beginners it is definitely not worth climbing here.

Hotels / Flights
How do the craziest carders have a rest? Right! They drive in air tickets and hotels, or buy from other carders for a symbolic percentage of the cost. The rest is risky and there were times when, having decided to save money, people ordered vouchers from inexperienced carders who made a curve by driving in, as a result of which would-be travelers could not come back or even got problems with the law in a foreign country.

Therefore, in order to avoid such force majeure, you always need to have money with you, which will cover the cost of the hotel / air ticket, if a chargeback comes (refund to the card / payment system cardholder) or the payment flies.

For the sake of truth, I will say that the percentage of successful flights and rented hotels is higher. The main thing is to work with proven guys and not forget about safety net.

Transfers
We throw money into the account and try to launder it. What accounts? Most often they work with bookmakers and poker offices. They fill in grandmothers from CC or PP, and carefully play them on withdrawal accounts. You can also upload to fake hotels in Booking / Expedia, fake shops / donations and get a % of the amount you drive in.

Virtual Goods
This is by driving all kinds of gift cards (gift cards), subscriptions (games, movies, music, porn, VPN, etc.), keys from games (steam, origin, uplay, playstation, xbox) and game items / currencies. In general, everything that has no physical equivalent.

How carding changed my life
Many people think that there is easy money in this craft, that by entering the world of carding, you can earn money with sacks. Far from it, friends.

My path in this area began with a job as a drop. Every day I took fat packs and I had a desire to learn how to get them on my own. Then the staffers with whom I worked disappeared and I developed a furious interest in this direction.

I found a man who taught me how to beat brutus ebey. At that time, I did not know about the existence of telegram, thematic channels and chats, where you can find help and support and read useful articles. I didn't even know good sellers with adequate prices, so I bought a brute for a lot of money and nothing worked for me.

I remember the first time I hammered in a $ 30 T-shirt and was very happy about it. Then I realized that carding really works and if you learn to do everything correctly, you can live in chocolate.

I spent money on training, materials and tests without earning anything! The people who were next to me thought that I was addicted to drugs, because I invested almost all the money in the carding.

And you know ... Once everything worked out for me and it started. Purchase of material, fat fillings, profitable topics, new acquaintances and horizons. My loved ones already did not care where this money came from. I enjoy the fact that I can help them and enjoy life.

I don’t pay taxes and put a dick on the state. I am free!

Outcome
No matter how many failures you endured, no matter which path you took, if you do not give up, freedom and financial independence await you in the final. Remember: in our time, money is everything. Therefore, I want to wish you never give up and always go forward.
 
Carding is a type of fraud in which an operation is performed using a payment card or its details, not initiated or confirmed by its holder. Payment card details are usually taken from hacked servers of online stores, payment and settlement systems, as well as from personal computers (either directly or through remote access programs, "Trojans", "bots" with a form grabber function). In addition, the most common method of stealing payment card numbers today is phishing - the creation of a site by fraudsters that will enjoy the user's trust, for example, a site similar to the user's bank site, through which payment card details are stolen.

A bit of terminology:

CC - credit card information.

Fullz (Fulka, Full Info) - great credit card information.

The cardholder is the legal owner of the card.

Shop is an online store.

Ship is the process of buying a product from an online store using stolen credit card information.

Drop - the person on whom you are making a thorn (If you are afraid of yourself, or to divert your eyes, so that the admins of the shop are confused, since there are few sent to ru now)

Seller is the seller of the material needed by the carder.

Driving in - entering information about the card when paying for the goods.

Stuff is a commodity.

6db5b0809a888f983bd1d.png


Card theft

A stolen or lost card can be used by criminals only until the owner informs his bank about the loss, or in offline transactions. Most banks provide a 24/7 telephone line for such messages.

The main protective measure is the presence of a signature on the card and the requirement to sign checks. In some shops, when paying by card, identity documents are required. However, it is illegal to require a document in some jurisdictions.

Stolen cards can be used in some self-service terminals (for example, at a gas station) that do not require a PIN code.

In Europe, most EMV cards are equipped with a chip that usually asks for a 4-digit numeric PIN when shopping. If the code is not intercepted, then the fraudster will be able to use it only in operations where the code is not required, for example, in online (electronic) transactions, or in POS terminals equipped only with a magnetic stripe reader.

There are software systems and a set of organizational measures aimed at preventing or complicating possible fraudulent transactions. For example, a large transaction made far from the owner's residence - as an option - in another country, may be declared invalid or even lead to a temporary blocking of the card.

20d57f82a926999eb4173.jpg


Operations without a card

Only some of the data written on the card is required to complete the transaction. Usually, the card contains (in the form of an inscription and on a magnetic stripe): the owner's name, card number (PAN), month and year of expiration, verification code (CVV2).

There are operations in which the physical presence of the card is not required, and the transaction is carried out only according to the data from it. The minimum required set of information is the card number, often an expiration date is also required, a little less often - a verification code.

An attacker can copy this data if he colludes with persons who have access to cards, for example, a waiter or a cashier. Data can be photographed or recovered from video recording. It is also possible to obtain such data using a virus installed on the user's computer, using social engineering methods (imitation of a call from a bank), or by hacking online stores or systems serving cards. The criminals then use the data in transactions without the presence of the card.

d3828a45e87025ce991a1.jpg


Skimming

A special case of carding is skimming, in which a skimmer is used - an intruder's tool for reading, for example, the magnetic track of a payment card. When carrying out this fraudulent operation, a complex of skimming devices is used:
  • a tool for reading the magnetic stripe of a payment card is a device installed in a card reader and a card reader at the front door to the customer service area in the bank's premises. It is a device with a magnetic readout head, amplifier - converter, memory and an adapter for connecting to a computer. Skimmers can be portable, miniature. The main idea and task of skimming is to read the necessary data (contents of a track / track) of a magnetic strip of a card for its subsequent reproduction on a fake one. Thus, when making a transaction with a fake card, an authorization request and debiting of funds for a fraudulent transaction will be made from the account of the original “skimmed” card.
  • a miniature video camera installed on an ATM and directed to the input keyboard in the form of an ATM visor or extraneous overlays, for example, advertising materials - used in conjunction with a skimmer to obtain a holder's PIN, which allows you to receive cash at ATMs using a fake card (having the track data and the original PIN) ...
  • Use of malicious code embedded in the ATM. Dumps of bank cards are recorded without the use of special equipment and it is not possible for an average person to recognize this method, but it is extremely rare and in most cases prevails among small banks. Further, using dumps, copies of maps are created.
These devices are powered by autonomous energy sources - miniature power batteries, and, to complicate detection, as a rule, are made and masked to match the color and shape of the ATM.

Skimmers can accumulate stolen information about plastic cards, or remotely transmit it over a radio channel to attackers who are nearby. After copying the information from the card, the fraudsters make a duplicate of the card and, knowing the PIN, withdraw all the money within the issuance limit, both in Russia and abroad. Also, fraudsters can use the received information about the bank card to make purchases in retail outlets.

In the next article, you will learn about my experience with this type of fraud. I recommend that you seal your mouth with scotch tape - from the amounts heard, your jaw may fall off :)
 
Top