The Complete Carding Bible
Everything about credit card fraud โ from where cards get stolen to how they become cash.
The internet stopped being polite a long time ago. This is what it actually looks like underneath.
So What The Hell Is Carding?
Carding = using stolen credit/debit card data to buy shit or drain money. Thatโs it. Thatโs the whole definition.
Nobodyโs hacking into bank mainframes like some Hollywood fever dream. Modern carding is a factory line โ boring, repetitive, industrialized:
- Malware on normal computers steals cards silently
- Cards get sold in bulk on underground shops like groceries
- Automated tools test which ones still breathe
- Working cards get used to buy goods or convert to crypto
Your card data has probably already been stolen. Not โmight have been.โ Probably has. Understanding this helps you see why fraud detection is always playing catch-up, why chargebacks exist as a system, and why that weird $1 charge showed up on your statement at 3am from a store youโve never heard of.
The Numbers โ Why This Will Never Stop
๐ The math that explains everything
FBI Internet Crime Report 2024:
- $16.6 billion lost to fraud โ up 33% from last year
- Cases actually solved: 1-4%
SpyCloud 2025 Report:
- 53.3 billion stolen identity records floating around the internet
- 17.3 billion stolen session cookies
- 3.1 billion exposed passwords
| Starting a carding operation | Under $50 |
| One stolen card | $5-15 |
| Full identity package | $10-100 |
| Getting caught | 1-4% chance |
When startup costs are pocket change and prison odds are a rounding error, the math writes itself. Thatโs the whole explanation for why this industry exists and why it wonโt stop. Ever.
The risk-to-reward ratio is better than most legitimate businesses. Let that sink in.
Where Stolen Cards Come From
Nobody wakes up with stolen cards in their pocket. Thereโs a supply chain โ and itโs disturbingly efficient.
Stealer Malware โ The Card Factory
Software that silently grabs everything saved in your browser. Passwords. Cookies. Autofill data. Saved credit cards. All of it. In seconds. Without you ever knowing.
๐ง How you actually get hit โ step by step
- You download cracked software, a โfree tool,โ some sketchy game mod, a pirated app
- Hidden malware runs in the background โ you will never see it running
- It grabs every saved password, every cookie, every autofill field, every card stored in your browser
- Sends it all to an attackerโs server in literal seconds
- Your data gets packaged and sold as โlogsโ on underground markets
That cracked Photoshop you downloaded? It came with a free copy of RedLine Stealer. Congratulations โ your entire browser is now someone elseโs shopping list.
๐ The Big Names (2024-2025) โ Stealer Malware Hall of Fame
| RedLine | Dominated the market โ 47-51% share. Taken down Oct 2024 after stealing 170M+ passwords. The king is dead. |
| Lumma | Rose to 92% of Russian Market logs. Disrupted May 2025 by Microsoft + DOJ. Long live the king. |
| Rhadamanthys | Growing fast. 12,000+ victims by Oct 2025. Written in C++ with advanced evasion. The new crown prince. |
The pattern that never fucking ends:
Takedown โ Competitors absorb the customers โ Business continues โ New stealer takes the crown โ Repeat forever.
Every. Single. Time. RedLine dies, Lumma fills the gap. Lumma gets hit, Rhadamanthys steps up. The code gets forked, the features get copied, and the stolen data keeps flowing.
Itโs a hydra with a subscription model. Cut one head off, two more pop up with a Telegram channel and a pricing page.
๐ฌ Stealer Log Analysis Tools โ For Researchers & Security Teams
When researchers or security teams need to parse through stolen log dumps to understand what was compromised, these tools do the heavy lifting:
| ITSEC-Research/bron-vault | GUI dashboard for log analysis โ visual, easy to navigate |
| lexfo/stealer-parser | Parse logs to JSON, supports multiple stealer formats |
| milxss/universal_stealer_log_parser | Handles RedLine, Raccoon, Vidar, and more in one tool |
| bikemazzell/stealer-log-processor | Multithreaded bulk processing for massive dumps |
| nak0823/RParseX | Blazing fast Rust-based parser โ speed demon |
| OpensourcedPro/DiamondChecker | All-in-one log utility |
| Joieux/stealer-log-detector | CLI scanner with SIEM-compatible output |
| 0xGilda/stealer | Stealer analysis repo |
These arenโt attack tools โ theyโre what security teams use to figure out the blast radius after a compromise. What got taken, how much, from where.
Whatโs Inside A โLogโ
When someone buys โlogsโ from underground markets, theyโre getting a neat little folder of someoneโs entire digital life. For about $5.
๐ Log anatomy โ what each file contains and why it matters
๐ victim_log/
โโโ ๐ Passwords.txt โ every saved login
โโโ ๐ Cookies.txt โ session tokens (MFA bypass gold)
โโโ ๐ Autofill.txt โ addresses, names, phones
โโโ ๐ CreditCards.txt โ saved payment methods
โโโ ๐ System.txt โ OS, IP, hardware info
โโโ ๐ Screenshots/ โ desktop captures
Why each file is a goldmine:
- CreditCards.txt โ Card numbers with CVV and expiry. The obvious prize. The thing everyone thinks about first.
- Autofill.txt โ Billing addresses that match with cards. AVS (Address Verification System) needs these to approve transactions. Without the billing address, a stolen card is way harder to use online.
- Cookies.txt โ Session tokens that bypass MFA entirely. You donโt need the password if you have the cookie. This is why cookies are worth more than passwords in 2026.
- System.txt โ Browser fingerprint data to mimic the victimโs computer so fraud detection systems think youโre them. Same OS, same screen resolution, same timezone, same everything.
One log can contain hundreds of accounts across dozens of sites โ banking, email, shopping, social media, crypto exchanges โ all in one $5 purchase.
Current market leader: Russian Market โ 180,000+ fresh logs listed in the first half of 2025 alone. Thatโs a thousand new victims every single day.
The Card Menu โ What Gets Sold On The Dark Web
Underground card shops have menus more organized than most restaurants. Hereโs whatโs on the shelf:
๐ The full product catalog โ types, prices, and what you actually get
| CC (basic) | $5-15 | Card number, expiry, CVV โ bare minimum |
| CC + Billing | $15-30 | Above + cardholderโs billing address for AVS matching |
| Fullz | $10-100 | Complete identity: SSN, DOB, motherโs maiden name, address, phone |
| Fullz + DL scan | $100-200 | Above + driverโs license image โ enough to pass most KYC |
| Medical fullz | Up to $1,000 | Health records โ most valuable because you canโt change your medical history |
| Dead fullz | $5-10 | Expired/cancelled cards โ still useful for building synthetic identities |
| Dumps (track data) | $20-125 | Magnetic stripe data for cloning physical cards |
| Kitz | Varies | Physical credentials โ actual stolen wallets, documents, the whole package |
2025-2026 dark web pricing update:
| US CC with CVV | $10-40 |
| UK CC with CVV | $10-60 |
| High-limit verified CC | $110-120 |
| Bank logins | $200-1,000+ |
| Coinbase accounts | $120-250 |
| Kraken accounts | Up to $1,170 |
| Bulk unverified cards | $5-20 per 100+ |
| Verified live cards | $20-200 each |
Quality tiers โ because even stolen data has a freshness rating:
- Fresh = just stolen, highest success rate, sells fast, premium pricing
- Aged = been sitting around, might be flagged by now, cheaper
- Dead = confirmed non-working โ but still useful for synthetic identity fraud (more on that later)
Better underground shops offer validity guarantees โ 90%+ valid cards or free replacement. Like Amazon customer service, but for stolen data. Some even have escrow, buyer ratings, and dispute resolution systems. The irony of criminals building trust systems to protect themselves from other criminals isnโt lost on anyone.
๐ From Data Breach โ Card Market โ The Full Pipeline
Stolen cards donโt appear from nowhere. The pipeline from breach to marketplace follows a predictable, almost industrial path:
- Breach happens โ company hacked, database dumped, POS malware deployed
- Data gets sorted โ automated tools separate cards by BIN, region, type, freshness
- Listed on markets โ automated vending carts (AVCs) list cards with search filters better than most legit e-commerce
- Buyers shop by specs โ BIN, country, card type, balance range โ like filtering shoes on Amazon
- Validity tested โ checkers confirm which cards are still live before purchase
- Dead cards recycled โ used for synthetic identity building or resold as โdead fullzโ at a discount
The marketplace ecosystem keeps evolving. Every law enforcement takedown just reshuffles the deck. BidenCash dumped 900K+ cards as a free promotional stunt to attract customers. B1ackโs Stash runs automated card shops with search filters that would make Shopify jealous.
When one market gets seized, the sellers migrate overnight. The data doesnโt disappear โ it just changes address.
Web Skimmers (Magecart) โ Stealing Cards At Checkout
Magecart = malicious JavaScript injected into e-commerce checkout pages. When you type your card number, the skimmer copies it and sends it to an attackerโs server. In real-time. While youโre still clicking โconfirm order.โ
โ๏ธ The injection chain โ how your checkout page becomes a card stealer
- Attacker compromises the merchantโs site (vulnerable plugin, stolen admin creds, supply chain attack on a third-party script)
- Malicious JS injected into the payment page โ often disguised as Google Analytics or Facebook Pixel code
- When a customer enters card details, the skimmer captures every keystroke in every field
- Data exfiltrated to a command-and-control server โ sometimes via Telegram bots as C2 channels
- Cards packaged and sold on dark web markets within hours
Youโre typing your real card number into a real checkout page on a real website. Everything looks completely normal. But thereโs an invisible JavaScript parasite sitting between you and the payment form, copying every digit.
Modern evasion tricks that make these hard to catch:
- Skimmer code hidden inside image pixels (PNG steganography โ the JavaScript is literally encoded in a picture)
- Obfuscated code that only activates on checkout pages โ stays dormant everywhere else
- Anti-debugging code that detects developer tools and goes completely silent when security researchers look
- Domain names mimicking legitimate analytics services (good luck spotting
g00gle-analytics.comin a code review)
๐ Magecart Detection Tools
| Sansec | Leading Magecart detection and research firm |
| Santandersecurityresearch/e-Skimming-Detection | Semgrep rules for detecting skimmers in code |
| FingerprintJS Bot Detection | Detect automated skimmer injections |
Physical Card Skimmers & Shimmers
Not all card theft is digital. The physical world has its own flavor โ and itโs older, cruder, and still working just fine in 2026.
๐ง How physical skimming works โ ATMs, gas pumps, and the invisible shimmer
Skimmers โ overlay devices slapped onto ATMs and gas station pumps. They sit on top of the real card reader and capture magnetic stripe data as you swipe. Bluetooth-enabled models transmit stolen data wirelessly โ the thief doesnโt even need to come back for the device. They just drive by and download.
Shimmers โ paper-thin circuit boards inserted inside the card slot. They sit between your chip and the terminalโs chip reader, intercepting the data during a chip transaction. Harder to detect because theyโre literally invisible from the outside. You canโt wiggle what you canโt see.
How to not get skimmed:
- Wiggle the card reader before inserting โ skimmers are often just glued on and come loose
- Cover the PIN pad with your hand when entering your PIN โ hidden cameras are common partners to skimmers
- Use contactless/NFC tap-to-pay when possible โ no physical card insertion means no skimmer contact
- Check for unusual bulk, weird plastic seams, or anything that looks โadded onโ around the card slot
- Use ATMs inside bank branches โ harder for criminals to install and maintain skimmers with cameras watching
Skimmers have been around since the 1990s. Shimmers appeared when EMV chips rolled out. Neither is going away because physical terminals still exist by the millions and humans still insert plastic into slots.
POS Malware โ RAM Scraping
Point-of-Sale malware targets the brief moment when card data exists unencrypted in a terminalโs memory. A fraction of a second. Thatโs all it needs.
๐ง How RAM scraping works โ exploiting the physics of payment processing
When you swipe or dip your card at a store, the terminal decrypts the data to process it. For a fraction of a second, your full card number, expiry, and track data sit in RAM in plaintext. No encryption. Completely exposed. POS malware lurks in that memory space, scraping every card that passes through.
The hall of fame hits:
- Target breach (2013) โ 40 million cards stolen via RAM-scraping malware on POS systems. The breach that made โdata breachโ a household term.
- Home Depot (2014) โ 56 million cards from POS malware. Even bigger, somehow got less press.
- 167,000+ cards stolen in a single 2022 POS malware campaign โ proving this attack vector is alive and thriving a decade later.
PCI DSS was supposed to fix this. It didnโt. The standard mandates encryption, but the RAM gap exists because terminals need to decrypt data to process it. Thatโs the physics of the problem โ and malware exploits physics, not policy.
You can write all the compliance rules you want. The card still has to be readable at some point, and that point is the attack surface. Always will be.
Data Breach โ Card Market โ The Full Lifecycle
Every major data breach feeds the underground card market. Hereโs how stolen data moves from a hacked database to someone carding a PlayStation โ with actual timelines.
โฑ๏ธ The breach-to-cashout timeline โ stage by stage
| Breach | Attacker compromises company systems | Day 0 |
| Exfiltration | Data dumped โ cards, PII, credentials | Day 0-7 |
| Sorting | Automated tools separate cards by BIN, region, type | Day 1-14 |
| Listing | Cards posted on dark web markets with search filters | Day 7-30 |
| Testing | Checkers validate which cards are still live | Day 7-60 |
| Sale | Buyers purchase cards matching their target specs | Day 14-90 |
| Use | Carding, cashout, resale | Day 14-180 |
| Death | Card gets reported, cancelled, or maxed out | Varies |
Dark web pricing (2025-2026):
| Single CC with CVV | $5-15 |
| CC with fullz | $15-100 |
| Bank login | $50-200 |
| Full identity package | $10-100 |
| SSN + DOB | $1-5 |
Notice how an SSN + DOB costs less than a coffee. Your Social Security number โ the one number thatโs supposed to secure your entire financial identity โ goes for a dollar. That tells you everything you need to know about the state of identity security in 2026.
The marketplace never sleeps. When one market gets seized, the sellers migrate overnight. The data doesnโt disappear โ it just changes address. And the next market usually has better UI than the last one.
How Payments Actually Work (And Where They Break)
You canโt exploit what you donโt understand. This part is the engine room โ how money actually moves when you click โPay Now,โ what checks exist, and where every single one of them has a crack.
Payment Gateway Internals โ The Plumbing
Every time you tap โPay Now,โ hereโs what actually happens in about 2 seconds:
โ๏ธ The full payment flow โ from your card to the bank and back
Your Card โ Merchant's Site โ Payment Gateway โ Processor โ Card Network โ Issuing Bank
โ
Your Card โ Merchant's Site โ Payment Gateway โ Processor โ Card Network โ Approved/Declined
The players in every transaction:
- Payment Gateway โ the front door (Stripe, Braintree, Adyen, Square, PayPal). Takes card data, encrypts it, sends it along the chain.
- Processor โ the middleman who talks to the card networks on the merchantโs behalf
- Card Network โ Visa, Mastercard, Amex, Discover. The highway system that routes money.
- Issuing Bank โ your bank. The one who says yes or no to every transaction.
- Acquiring Bank โ the merchantโs bank. Where the money eventually lands.
Auth vs Capture โ the two-step dance:
- Authorization โ โIs this card real? Is there money? Does the address match?โ Just a hold. No money moves yet. Think of it as a reservation.
- Capture โ โOkay, actually take the money now.โ This is when the merchant grabs the funds for real.
Most sites do auth + capture simultaneously โ you click pay, money moves. But some (hotels, gas stations, marketplaces) do auth first, capture later โ sometimes days later. That gap between auth and capture? Thatโs a window. And windows get climbed through.
Stripe allows up to 50 captures per PaymentIntent. Hotels authorize your card at check-in, capture at checkout. Gas stations pre-auth $100 and capture the actual pump amount later. Every gap is an opportunity for fraud or exploitation.
The 7-day rule: Most auths expire after 7 days if not captured. After that, the hold drops and the money goes back to the cardholder. Merchants lose the sale if they donโt capture in time.
PCI DSS โ The Rules Merchants Are Supposed To Follow
PCI DSS (Payment Card Industry Data Security Standard) is the rulebook every business that touches card data must follow. Version 4.0 went into full effect April 2025 with stricter requirements.
๐ The 12 requirements โ what merchants must do (and mostly don't)
| # | ||
|---|---|---|
| 1 | Install and maintain network security controls | Firewalls that actually work |
| 2 | Apply secure configurations to all system components | Donโt leave factory defaults on |
| 3 | Protect stored account data | Encrypt stored card data |
| 4 | Protect cardholder data with strong cryptography during transmission | TLS everywhere, no excuses |
| 5 | Protect all systems and networks from malicious software | Anti-malware thatโs actually updated |
| 6 | Develop and maintain secure systems and software | Patch your shit |
| 7 | Restrict access to system components by business need | Least privilege โ not everyone needs admin |
| 8 | Identify users and authenticate access | Strong passwords + MFA |
| 9 | Restrict physical access to cardholder data | Lock the server room |
| 10 | Log and monitor all access | Keep logs, actually read them sometime |
| 11 | Test security of systems and networks regularly | Pen test, vulnerability scan |
| 12 | Support information security with policies and programs | Write it down, train people |
Compliance levels by transaction volume:
| 1 | 6M+ | Annual on-site audit by QSA (Qualified Security Assessor) |
| 2 | 1M-6M | Annual SAQ (self-assessment) |
| 3 | 20K-1M | Annual SAQ |
| 4 | Under 20K | Annual SAQ (simplest form) |
The dirty truth: PCI DSS compliance doesnโt equal security. Target was PCI-compliant when 40 million cards got stolen. The standard sets a floor, not a ceiling. Most breaches happen at merchants who passed their last audit with flying colors.
CVV storage is permanently banned. Under PCI DSS, merchants cannot store CVV/CVC after authorization. Period. Full stop. This is why legitimate merchants never have your CVV on file โ and why a CVV appearing in a stolen database means the breach happened at the moment of transaction (skimmer, MITM), not from stored data.
PCI DSS resources:
- PCI Security Standards Council โ official standards body
- Stripe PCI Compliance Guide โ practical implementation guide
Payment Tokenization โ Why Your Real Card Number Doesnโt Go Everywhere
Tokenization replaces your actual card number with a random substitute (โtokenโ) thatโs useless if stolen. Two flavors exist, and both make cardersโ lives harder.
๐ How tokenization works โ and why carders avoid tokenized payments
Network Tokens (Visa/Mastercard level):
- Card networks generate tokens that route through the same payment rails
- Token is tied to a specific merchant โ canโt be reused elsewhere
- If the token leaks, itโs worthless without the merchant relationship
- Actual card number stored only at the network level in a vault
Gateway Tokens (Stripe/Braintree level):
- Payment gateway generates a token for the card on file
- Token only works with that specific gatewayโs API
- Merchant never sees or stores the real card number
- Gateway handles the token-to-card mapping internally
Why this matters for carding:
Tokenized transactions are nearly immune to replay attacks. Even if you steal a token, it wonโt work anywhere else โ itโs cryptographically bound to one merchant or one gateway. This is why Apple Pay and Google Pay have the lowest fraud rates of any payment method โ theyโre tokenized end-to-end. And itโs exactly why carders avoid them entirely.
The whole carding model depends on stealing a card number that works everywhere. Tokens break that model at the root.
Decline Codes โ The Language of โNoโ
When a transaction fails, the gateway returns a code. These codes follow ISO 8583 โ an international standard for financial messaging. There are about 100 response codes, but here are the ones that actually matter:
๐ซ Hard Declines โ dead end, stop trying, card is done
| 05 | Do Not Honor | Bank said no. Could be fraud flag, spending limit, anything. Generic rejection. |
| 14 | Invalid Card Number | Number doesnโt exist. Luhn check probably failed at the issuer. |
| 41 | Lost Card | Card was reported lost. Guaranteed fraud flag triggered. |
| 43 | Stolen Card | Same but worse. Cops may already be involved. |
| 54 | Expired Card | Card is past its expiry date. |
| 57 | Transaction Not Permitted | Card type canโt do this transaction (e.g., debit card on a subscription). |
๐ Soft Declines โ might work if you try again later
| 51 | Insufficient Funds | Card is broke. Try a smaller amount or try later. |
| 61 | Exceeds Withdrawal Limit | Daily limit hit. Try tomorrow. |
| 65 | Exceeds Frequency Limit | Too many transactions today. Cool off. |
| 91 | Issuer Unavailable | Bankโs system is down. Try later. |
| 96 | System Malfunction | General system error. Retry. |
Why carders care about decline codes:
Every code tells you why a card died. Code 51 means the card is real but broke โ try a smaller amount. Code 14 means the number is garbage โ throw it away. Code 41/43 means burn it immediately and move on, that card is hot. The codes are basically a diagnostic tool for sorting live cards from dead ones.
80-90% of all declines are soft. Most gateways have smart retry logic built in. Visa limits retries to 15 attempts before charging $0.10/retry penalty. Mastercard has its own MAC (Merchant Advice Code) system. Hitting retry limits means the merchant gets flagged โ and flagged merchants get watched.
Merchant Category Codes (MCC) โ Why Where You Buy Matters
Every merchant is assigned a 4-digit MCC (Merchant Category Code) that tells card networks what kind of business it is. This isnโt just bureaucracy โ MCCs directly affect whether your transaction gets approved or flagged.
๐ช How MCCs affect fraud detection โ and how the game is played
Why MCCs matter for fraud:
- High-risk MCCs get extra scrutiny โ gambling (7995), crypto exchanges (6051), money orders (6049), wire transfers (4829)
- Low-risk MCCs sail through with less friction โ grocery stores (5411), gas stations (5541), general retail
- Some cards block entire MCC categories โ government purchase cards restrict entertainment, travel, and cash advance MCCs
- 3DS challenges trigger more often for high-risk MCCs
- Velocity limits are tighter for suspicious MCC categories
Knowing the MCC helps pick targets. A $500 purchase at a grocery store (MCC 5411) triggers way less scrutiny than $500 at a gift card seller (MCC 5815). Same card, same amount โ wildly different fraud scores. The system treats a grocery run and a gift card bulk buy as completely different risk profiles.
MCC Resources:
- Stripe MCC Reference โ Stripeโs MCC guide
- Visa Merchant Data Standards Manual (PDF) โ official Visa MCC list
- Full MCC Code List (PDF) โ complete code listing
Velocity Checks โ When Too Fast = Fraud
Velocity checks = rate limits on transaction frequency. Try too many transactions in too short a time, and the gateway flags or blocks you. Simple concept, surprisingly effective.
โฑ๏ธ What gets checked and what triggers the alarm
| Transactions per card per hour | 3-5 | Same card used repeatedly |
| Transactions per IP per hour | 5-10 | Multiple cards from same IP address |
| Failed attempts per card | 3 in 10 minutes | Card testing detected |
| Total amount per card per day | Varies by card | Spending limit hit |
| Unique cards per device | 3-5 per day | Multiple cards on same device fingerprint |
Why velocity matters:
Legitimate shoppers donโt submit 50 card numbers per minute. They donโt try 3 different cards in 2 minutes from the same IP. They donโt make 10 $1 charges in a row. When the velocity pattern screams โbot testing stolen cards,โ fraud systems slam the door.
Gateway-level velocity controls:
- Stripe: custom Radar rules based on velocity patterns
- Braintree: configurable velocity thresholds per merchant
- Adyen: real-time velocity scoring integrated into risk engine
- Checkout.com: automated velocity limits with merchant override
Every gateway has these. The thresholds vary by merchant risk profile, transaction volume, and industry. A coffee shop that normally sees 50 transactions/hour will flag at 200. A large retailer doing 10,000/hour has a different baseline entirely.
AVS โ Address Verification System
The system thatโs supposed to verify your billing address. Emphasis on โsupposed to.โ
๐ฌ How AVS actually works โ and all the ways it doesn't
The process:
When you type your billing address at checkout, the gateway strips out just the numbers โ your street number and ZIP code. Thatโs it. โ123 Main Street, Anytown, NY 10001โ becomes just โ123โ and โ10001.โ
Those numbers get sent to the issuing bank. The bank compares them against whatโs on file and sends back a single letter:
| Y | Full match โ street + ZIP | Low |
| A | Street matches, ZIP doesnโt | Medium |
| Z | ZIP matches, street doesnโt | Medium-High (most common fraud pattern) |
| N | Nothing matches | High |
| U | Canโt verify (international card or system down) | Unknown |
| G | International issuer โ AVS not supported | N/A |
| S | AVS not supported for this card type | N/A |
The dirty secrets of AVS โ why itโs basically a coin flip:
-
AVS only works in US, Canada, and UK. Every other country? The response is basically โยฏ_(ใ)_/ยฏโ. International issuers return U or G, which most merchants just accept anyway because rejecting international customers means rejecting real money.
-
It only checks numbers. โ123 Main Stโ and โ123 Elm Aveโ both return the same match. Only the โ123โ part is compared. The street name is completely ignored.
-
Apartments break it. โ123 Main St Apt 4Bโ might fail because the bank has โ123 Main St #4Bโ on file. Different formatting = mismatch on a legitimate transaction.
-
The ZIP is trivially easy to get. The dark web sells โCC + billingโ packages that include the exact address on file. The Z code (ZIP match, no street) is the most common fraud pattern because the ZIP is known but the street number is guessed.
-
Prepaid cards always fail AVS. Thereโs usually no billing address on file for prepaid/gift cards. Many merchants learned to skip AVS for prepaid because rejecting those means rejecting real customers buying real things.
-
95% of AVS-mismatch orders are legit (ClearSale data). Meanwhile, over 50% of confirmed fraud had a full AVS match. The system is literally worse than a coin flip at catching fraud.
The bypass technique โ โaddress stuffingโ: Put the real billing address in address line 1 (for AVS to match), then put the drop address in address line 2 or the shipping address field. AVS only checks line 1. Fulfillment systems ship to whatever address you specify. Some merchants catch this. Many donโt.
Apple Pay, Google Pay, and tokenized wallets bypass AVS entirely. The wallet handles verification before the transaction even reaches the gateway. No address needed. This is why wallet payments have the lowest fraud rates โ and also why carders avoid them like the plague.
3D Secure โ The Extra Lock (And How It Gets Picked)
The popup that says โVerify your purchaseโ with a one-time code sent to your phone. Thatโs 3D Secure (3DS). It adds an extra authentication step between โcard enteredโ and โmoney taken.โ
๐ท๏ธ Brand names โ same tech, different marketing
- Visa โ โVerified by Visaโ (VBV)
- Mastercard โ โMastercard SecureCodeโ / โIdentity Checkโ
- Amex โ โSafeKeyโ
- Discover โ โProtectBuyโ
All the same underlying protocol. Different sticker on the box.
โ๏ธ 3DS1 vs 3DS2 โ night and day
3DS1 (the old one, mostly dead by 2026):
- Ugly popup window that looked like a phishing site โ because it basically was
- Static password (same every time โ defeat the purpose much?)
- No mobile-friendly design
- 20-30% cart abandonment because shoppers genuinely thought it was a scam
- Merchants hated it because it murdered sales
3DS2 (current):
- Embedded in checkout flow โ no popup, no redirect, no panic
- One-time codes via SMS, push notification, or biometrics
- Sends 100+ data points to the issuer for risk-based analysis
- Supports โfrictionlessโ authentication โ no customer action needed if the risk is low enough
- Mobile-native design that doesnโt look like it was built in 2003
๐ฏ Frictionless vs Challenge โ the big 3DS2 change
Not every transaction interrupts the customer. Thatโs the whole point of 3DS2:
Frictionless flow (90% target): The issuer analyzes device fingerprint, transaction history, location, spending patterns, and 100+ other signals. If everything looks normal? Transaction goes through silently. Customer never sees a verification prompt. They donโt even know 3DS happened.
Challenge flow (triggered when risk is elevated): Customer gets a one-time code via SMS/push/biometric prompt. Must complete within 5-15 minutes or the transaction dies.
What triggers a challenge:
- New device or browser nobodyโs seen before
- Unusual purchase amount for this cardholder
- Different country than usual
- Behavioral anomalies (typing speed, mouse patterns that scream โbotโ)
- Transaction risk score above the issuerโs threshold
๐ธ The Liability Shift โ who actually pays for fraud
Before 3DS: If a fraudulent transaction happens, the merchant eats the loss. Every time.
With 3DS authenticated: If the transaction was authenticated with 3DS and still turns out to be fraud, the issuing bank eats the loss instead.
This is why merchants push 3DS โ it shifts the liability away from them. And why some merchants skip it for low-value transactions โ the friction costs more in lost sales than the fraud would cost to absorb.
ECI (Electronic Commerce Indicator) values โ the 3DS scorecard:
| 05 (Visa) / 02 (MC) | Fully authenticated โ best protection, liability shifts to issuer |
| 06 (Visa) / 01 (MC) | Attempted but not completed โ partial liability shift |
| 07 (Visa) / 00 (MC) | No authentication โ no liability shift, merchant holds the bag |
๐ช๐บ PSD2 & SCA โ Europe's mandatory 3DS law
PSD2 (Payment Services Directive 2) is European law requiring Strong Customer Authentication (SCA) for most online payments. SCA means at least 2 of 3 factors:
- Something you know โ password, PIN
- Something you have โ phone, card, hardware token
- Something you are โ fingerprint, face scan
Exemptions (how transactions skip 3DS even in Europe):
| Low-value | Under โฌ30 (resets after 5 transactions or โฌ100 cumulative) |
| Trusted beneficiary | Customer whitelisted the merchant |
| Recurring payments | Same amount, same merchant (after first authenticated payment) |
| Transaction Risk Analysis (TRA) | Merchantโs fraud rate below threshold โ โฌ100 limit if fraud rate <0.13%, โฌ250 if <0.06%, โฌ500 if <0.01% |
| Secure corporate | B2B dedicated payment processes |
Every exemption is a potential bypass vector. The TRA exemption is especially interesting โ merchants with very low fraud rates can skip 3DS on transactions up to โฌ500. Thatโs a lot of headroom.
๐ Non-VBV โ the holy grail for carders
Non-VBV = cards that skip 3D Secure entirely. Payment goes through with just card number + expiry + CVV + matching billing address. No OTP. No verification popup. No phone needed. Just card details and youโre in.
Why Non-VBV still exists in 2026:
- Some banks havenโt upgraded (especially smaller credit unions and international issuers)
- Some countries lag behind in 3DS adoption (parts of Asia, Africa, Latin America)
- Business/corporate cards often skip it
- Prepaid cards frequently skip it
- Merchants can request SCA exemptions โ TRA exemption under โฌ100 means no 3DS needed if the merchantโs fraud rate is low enough
- Recurring payments after first auth are exempt
Non-VBV cards are actively hunted by carders using VBV checkers. Finding a batch of live Non-VBV cards from a specific BIN range is hitting the jackpot. No OTP means no roadblock means smooth cashout.
BIN Databases โ Finding The Good Cards
BIN = Bank Identification Number โ the first 6-8 digits of any card number. Think of it as the cardโs DNA. Those digits tell you which bank issued it, what type it is, what country itโs from, and whether it triggers 3D Secure.
๐งฌ Card Number Anatomy โ every digit has a job
A credit card number isnโt random. Every digit has a purpose:
4 5 3 7 1 2 0 0 9 8 7 6 5 4 3 2
โ โโโโโโโโโโโโโโโโค โโโโโโโโโโโโค โ
โ BIN/IIN Account # Check Digit (Luhn)
โ (first 6-8) (variable) (last digit)
โ
MII (Major Industry Identifier)
First digit = industry:
| 3 | Travel & Entertainment (Amex, Diners Club) |
| 4 | Banking โ Visa |
| 5 | Banking โ Mastercard |
| 6 | Merchandising/Banking โ Discover |
| 7 | Petroleum |
Card lengths vary: Visa = 13/16/19 digits. Amex = 15. Mastercard = 16. Most cards = 16.
๐ The 8-Digit BIN Migration โ why BINs got longer
In 2022, Visa and Mastercard moved from 6-digit to 8-digit BINs. Why? Fintech explosion. Too many new card issuers, not enough 6-digit combinations to go around. Both formats coexist now โ existing cards keep their numbers (no reissuance needed), but all new BINs are 8 digits.
For merchants this meant updating masking logic (can now show first 8 + last 4 instead of first 6 + last 4 under PCI DSS), updating fraud blacklists, and updating BIN lookup databases. For carders it meant better precision when hunting specific issuer/card type combos โ 8 digits narrows down the bank and card product way more than 6 did.
๐ BIN Lookup Resources
| binlist.net | Free BIN lookup API โ returns issuer, type, country |
| BinCodes.com | Online BIN validator with ISO/IEC 7812 format diagrams |
| Mastercard BIN Lookup | Official Mastercard lookup |
The Luhn Algorithm โ Why Card Numbers Arenโt Random
Every credit card number follows the Luhn algorithm (a.k.a. Mod 10). Checksum formula invented by IBMโs Hans Peter Luhn in 1954. Public domain since 1977. Every major card network uses it.
๐งฎ How Luhn works โ and what it can't do
What it does: Catches typos. Thatโs literally it. When you mistype a digit at checkout and get โInvalid card numberโ instantly โ before anything even talks to your bank โ thatโs Luhn doing its one job.
How it works (5 steps):
- Start from the rightmost digit, move left
- Double every second digit
- If a doubled digit is 10 or more, subtract 9 (so 7ร2=14 โ 14-9=5)
- Add all digits together
- If the total is a multiple of 10 โ valid. Otherwise โ invalid.
What Luhn catches:
All single-digit typos (100% detection)
Most adjacent digit swaps (except 09โ90)
Canโt detect 22โ55, 33โ66, 44โ77 swaps
Doesnโt verify the card is real, active, or funded
Doesnโt check CVV or expiry
Luhn is a typo detector, not fraud prevention. Passing Luhn means the number is structurally valid. It could still be completely fake โ no account, no bank, no cardholder. A random number that passes Luhn is like a key that fits the lock shape but doesnโt actually open anything. Itโs the difference between โcorrectly formattedโ and โreal.โ
CVV/CVC โ Why You Canโt Calculate It
The 3-digit code on the back of your card (4 digits on Amex front) is not generated by Luhn. Itโs generated by the issuing bank using DES/3DES encryption with a secret key that lives in tamper-proof hardware.
๐ The CVV generation process โ why brute force is the only option
Inputs to CVV generation:
- Your full card number (PAN)
- 4-digit expiry date
- 3-digit service code
- A pair of DES encryption keys (CVKs) known only to the bank
The bank feeds these into an encryption algorithm inside a Hardware Security Module (HSM) โ a physical tamper-proof device that self-destructs if someone tries to open it. The output gets truncated to 3-4 digits = your CVV.
Why itโs uncrackable:
- One-way process โ you canโt reverse-engineer the CVV to find the keys
- HSM-protected โ the encryption keys never leave the physical hardware
- Different keys per batch โ banks use different CVK pairs for different card groups
- PCI DSS bans storage โ merchants are forbidden from storing CVV after authorization
CVV variants โ more than one type:
- CVV1 โ embedded in the magnetic stripe (for in-person swipes)
- CVV2 โ printed on the card (for online/phone purchases)
- iCVV โ different value for chip/contactless transactions
- dCVV (Dynamic CVV) โ changes every ~60 seconds on some modern cards, displayed on a tiny e-ink screen or via mobile app
Dynamic CVV is the real killer for carders. Even if someone steals your card data at this exact moment, the CVV expires in a minute. Some banks are already rolling this out โ and it makes stolen card data decay faster than milk in the sun.
CVV Technical Resources:
- PaymentCardTools.com โ CVV calculator, DES/3DES tools, CAVV decoder (requires bank keys)
Card Checking โ The Validation Pipeline
Buying stolen cards is gambling. Maybe 30-50% of any batch are already dead โ reported, cancelled, maxed out, expired. You need to know which ones still breathe before wasting them on real targets.
โ Checker types โ how stolen cards get validated
| Stripe checkers | Validate against Stripeโs payment gateway using leaked API keys |
| Braintree checkers | Same concept, using Braintree/Authorize.net gateways |
| Silent testers | Check validity without triggering fraud alerts (small $0-$1 auth) |
| Balance checkers | See how much money is actually on the card |
| VBV checkers | Confirm if card triggers 3D Secure or not |
How Stripe checkers work:
- Use stolen or leaked Stripe API keys (
sk_live_xxx) - Send an authorization request โ no actual charge, just a $0 or $1 auth
- Gateway returns: valid/invalid, card type, sometimes risk signals
- Carder sorts live cards from dead ones
This is called card testing โ and itโs one of the biggest fraud problems for merchants in 2026. A sudden spike of tiny authorizations from the same IP means someone is testing a batch of stolen cards against your checkout. If you run an online store, youโve probably seen this.
๐ฃ BIN Attack โ brute force card generation
A BIN attack is when fraudsters take a known BIN (first 6-8 digits of a real bankโs cards), generate thousands of possible card numbers using Luhn math, add random CVVs and expiry dates, and test them all against merchant checkouts until something hits.
Three phases:
Phase 1 โ Generate: Start with a known BIN. Randomize the remaining digits. Calculate Luhn check digit. Generate random 3-digit CVVs (only 1,000 possibilities per card). Generate expiry dates (limited range: current month โ 5 years out).
Phase 2 โ Test: Hit merchant sites with tiny authorizations ($0.50-$5). Use bots (Selenium, Puppeteer) to automate form submission. Bypass CAPTCHAs with solver services. Spread across multiple merchants to avoid triggering velocity limits at any single one.
Phase 3 โ Exploit: Store working card details. Use for real purchases. Or sell validated cards on dark web for $5-50 each. A validated, live, Non-VBV card is worth way more than an untested one.
Detection signals for BIN attacks:
- Sudden spike in authorization requests (10-100x normal volume)
- Repeated small charges from same IP/device fingerprint
- High volume of specific decline codes (invalid CVV, expired)
- Same BIN range targeted repeatedly
- Purchases at odd hours from unusual geolocations
Merchant defenses: Rate limiting (3 attempts per 10 minutes per IP), CAPTCHA, device fingerprinting, 3DS for suspicious transactions, velocity checks, behavioral analytics. Legit users donโt submit 50 card numbers per minute.
๐ค CAPTCHA Solvers โ bypassing the bot check
CAPTCHAs are supposed to stop automated card testing. In practice, theyโre a speed bump with a price tag. Every CAPTCHA has a market of humans and AI models willing to solve it for fractions of a cent.
How solver services work:
- Bot encounters CAPTCHA at checkout
- CAPTCHA image/challenge forwarded to solver service via API
- Human workers or AI models solve the CAPTCHA in 5-30 seconds
- Solution returned to bot
- Bot submits the solved CAPTCHA and continues testing โ seamlessly
The solver market:
| 2Captcha | $0.50-3.00 | 10-30s | Human workers |
| Anti-Captcha | $0.50-1.00 | 5-20s | Human workers |
| AI-based solvers | $1-5 | 1-5s | Neural networks |
reCAPTCHA v3 (score-based, no visible challenge) was supposed to fix this by analyzing behavior instead of showing puzzles. But browser automation tools with human-like mouse movement patterns score 0.7+ (the threshold for โprobably humanโ is 0.5). The behavioral analysis gets fooled by good enough behavioral mimicry.
hCaptcha, Turnstile (Cloudflare), and Arkose Labs each have their own economics โ but every CAPTCHA ever invented has a solver market. The solve cost just varies.
๐ง CC Checker & Generator Resources
| github.com/topics/cc-checker | CC checker repositories (304+ stars) |
| github.com/topics/stripe-checker | Stripe-specific checkers |
| github.com/topics/braintree-checker | Braintree checkers |
| github.com/topics/luhn-algorithm?l=python | Python Luhn implementations |
| github.com/topics/luhn-validation | Luhn validation libraries |
| Namso Gen | BIN-based card number generator (Luhn-valid, for testing) |
๐งช Test Cards โ the legit sandbox ones
Payment gateways provide fake card numbers for developer testing. These only work in sandbox mode โ theyโre not real accounts and they fail on live gateways:
| Visa | 4242 4242 4242 4242 | Always succeeds |
| Visa (debit) | 4000 0566 5566 5556 | Debit card simulation |
| Mastercard | 5555 5555 5555 4444 | Always succeeds |
| Amex | 3782 822463 10005 | 15-digit format |
| Discover | 6011 1111 1111 1117 | Always succeeds |
| 3DS challenge | 4000 0027 6000 3184 | Triggers 3DS prompt |
Any future expiry date + any 3-digit CVC works with these. They exist so developers can test payment flows without real money. Nothing nefarious about them โ theyโre in every gatewayโs public docs.
Anti-Fraud Systems โ What Youโre Up Against
The other side of the arms race. Every tool above has a counter-tool below. Hereโs what fraud detection looks like in 2026.
โก Stripe Radar โ the gold standard of fraud ML
Stripe Radar uses machine learning trained on data from millions of merchants. It scores every transaction from 0-99 on fraud risk.
What Radar looks at:
- Device fingerprint (hardware, screen, fonts, timezone)
- IP address and geolocation
- Email age and reputation
- Transaction velocity (how fast, how many)
- Card testing signals (repeated small charges)
- Network-wide data (if this card was already flagged across other Stripe merchants)
- Behavioral signals (time on page, mouse movements, typing patterns)
Risk levels: normal / elevated / highest. Merchants set rules: block all highest, review elevated, auto-approve normal.
Custom rules merchants can set:
- Block if CVC check fails
- Block if billing country โ IP country
- Require 3DS if risk score > 65
- Block if email domain is
@tempmail.com - Block if more than 3 failed attempts in 10 minutes
Radarโs 2025 upgrade: Adaptive AI rules that automatically adjust thresholds based on your specific fraud patterns. Enhanced Issuer Network that shares fraud signals between banks. +1.3 percentage point improvement in approval rates. The machine gets smarter every day.
๐ The competition โ other anti-fraud platforms
| Signifyd | Guaranteed fraud protection โ they pay your chargebacks | Revenue share |
| Riskified | ML-based, guaranteed chargeback coverage | Per-transaction |
| Sift | Real-time ML scoring, 16K+ signals per event | Subscription |
| Forter | Identity-based decisions, 300M+ consumer profiles | Per-transaction |
| Kount | Device fingerprinting + AI, owned by Equifax | Subscription |
| ClearSale | Human + AI hybrid reviews, strong in LATAM | Per-transaction |
Most of these offer a guarantee model: if they approve a transaction and it turns out to be fraud, they pay the chargeback. Merchants love this because it removes all risk from their side. The fraud platforms eat the losses and price that risk into their fees.
๐ง Email Verification & Reputation Scoring
Fraud detection doesnโt just check your card โ it checks your email too. Every email address has a โreputation scoreโ based on age, domain, breach history, and usage patterns.
What gets flagged instantly:
- Disposable/temp email domains (tempmail.com, guerrillamail.com, 10minutemail.com)
- Recently created email addresses (under 30 days old)
- Email addresses found in known data breaches
- Domains with no MX records or suspicious DNS
- Emails that donโt match the cardholder name pattern
Email verification services fraud systems use:
| IPQualityScore | Email risk scoring API, 10B+ emails tracked, disposable detection |
| Verifalia | AI-powered verification, 30+ validation steps |
The disposable email problem: Temp-Mail alone gets 46.26 million monthly visits. Every fraud system worth its code checks for disposable domains. Using a burner email at checkout is basically wearing a neon sign that says โIโM FRAUD.โ Carders who use custom SMTP setups with aged domains get much further โ but that takes more work to set up and maintain.
The arms race never stops: fraud platforms get smarter โ carders buy better antidetect tools โ fraud platforms add new signals โ carders find new evasion methods โ repeat forever.
Cookies Beat Passwords
In 2026, a password is a locked door. A session cookie is the door already open with the lights on.
Session Cookies โ The MFA Bypass
๐ Why cookies > passwords โ the authentication shortcut
The problem with stealing just passwords:
MFA exists. Password alone = blocked at 2FA prompt. Victim gets an OTP notification on their phone and immediately knows somethingโs wrong. Password theft alone is a dead end in any modern system.
The cookie solution:
Session cookies prove โthis browser already authenticated.โ Hereโs how it works:
- You log into a site โ enter password + MFA code
- Site creates a session cookie and stores it in your browser
- Every future request includes that cookie automatically
- No re-authentication needed until the cookie expires
- The cookie IS the proof of identity โ nothing else needed
What carders figured out: Steal the cookie โ load it into your browser โ youโre already logged in. No password needed. No MFA triggered. No notification sent. You become that userโs authenticated session. The server canโt tell the difference between the real user and someone replaying their cookie.
This is why cookies are worth more than passwords in 2026. Way more. A credential dump with passwords is worth cents per entry. A log with fresh session cookies is gold.
Genesis Market โ The Cookie Revolution
๐งฌ The marketplace that sold entire digital identities
What Genesis sold: Not just passwords. Complete digital identities called โbotsโ:
- IP address and geolocation
- All session cookies โ already authenticated
- Complete browser fingerprint
- OS info, installed plugins
- Timezone, language, screen resolution
Buy a bot โ import into antidetect browser โ become that person online. Instant access to everything they were logged into. Banking, email, social media, crypto โ all of it.
Genesis was taken down in April 2023 (Operation Cookie Monster, FBI + international law enforcement). But the concept didnโt die โ competitors absorbed the market immediately, just like every other takedown in this space.
The EA Breach โ ten dollars to breach a billion-dollar company: Started with a $10 cookie purchase from Genesis Market. Attacker bought an EA employeeโs Slack session cookie, walked into internal Slack channels, social-engineered their way to source code access. Ten dollars โ full access to one of the worldโs biggest game companies. Thatโs the ROI on a single stolen cookie.
๐ง Cookie Tools
| Moustachauve/cookie-editor | Browser extension for editing/importing cookies |
| get-cookiestxt-locally (Chrome) | Export cookies in Netscape format |
| dandv/convert-chrome-cookies-to-netscape-format | Chrome โ Netscape format converter |
| Lessica/CookiesTool | Multi-format converter (BinaryCookies, JSON, Netscape) |
Looking Human โ Antidetect & Proxies
Fraud detection is looking for patterns that scream โthis isnโt a real person.โ This section is about looking like one.
Antidetect Browsers โ Digital Identity Factories
Browsers that let you control every fingerprinting parameter. Each profile looks like a completely different person to every fraud detection system.
๐ฐ The major players โ antidetect browser comparison
| Multilogin | โฌ99-399/mo | 55+ parameters, AES encryption, most established in the market |
| GoLogin | $49-299/mo | 53 parameters, cloud sync, good for beginners |
| Octo Browser | โฌ29-329/mo | Auto-config, popular in underground forums |
| Dolphin Anty | $89-299/mo | Team collaboration features |
| AdsPower | $9-50/mo | Budget option that still works |
| Kameleo | Varies | Android app support |
| Incogniton | Varies | Multiple browser engine support |
| Undetectable | Varies | Cloud-based profile management |
| Lalicat | Varies | Chinese market focused |
| ClonBrowser | Varies | Multi-account management |
| Karta | Varies | Privacy-focused antidetect |
| Camoufox | Free | Open-source, modified at C++ level โ JavaScript detection literally canโt see it |
What they spoof: Canvas fingerprint, WebGL renderer, screen resolution, timezone, installed fonts, browser plugins, user agent, hardware concurrency, audio context, WebRTC leaks โ everything that makes your browser unique gets replaced with whatever you want.
Camoufox deserves special attention โ itโs a modified Firefox fork where the anti-fingerprinting is done at the C++ source code level, not through JavaScript injection like most paid tools. Standard fingerprint detection tests return 0% detection rate. Itโs free, open-source, and arguably more effective than tools costing $300/month. Thatโs embarrassing for the paid options.
๐ง How to set up an antidetect profile โ the basics
Setting up an antidetect browser isnโt just โinstall and go.โ Every profile needs consistent fingerprint parameters that donโt contradict each other:
- Pick a browser โ Multilogin for reliability, GoLogin for simplicity, Camoufox for free + undetectable
- Create a new profile โ each profile = one โidentityโ
- Set the fingerprint parameters:
- User agent matching your target OS/browser combo
- Screen resolution (pick common ones: 1920x1080, 1366x768)
- Timezone matching your proxyโs geographic location
- Language matching the region
- WebGL and Canvas values (auto-generated or borrowed from real devices)
- Assign a proxy โ residential proxy from the same region as your fingerprint
- Warm the profile โ browse normal sites first (Google, YouTube, news sites) to build cookies and history
- Test the fingerprint โ run it through detection tools before using it on any target
The warmup step is critical. A browser with zero cookies, zero history, and a brand-new fingerprint screams โjust created for fraud.โ Real browsers have accumulated weeks or months of browsing data, cached images, stored preferences. A sterile profile is a red flag.
๐งฌ Device Fingerprinting โ what fraud systems actually check
Fraud detection doesnโt just look at your IP. It builds a unique fingerprint from dozens of browser attributes. Hereโs what theyโre checking:
Canvas fingerprinting โ your browser renders an invisible image. Tiny differences in GPU, drivers, and font rendering make each output unique. Two โidenticalโ computers produce different canvas hashes. Itโs like a digital fingerprint that your graphics card doesnโt know itโs leaving.
WebGL fingerprinting โ similar concept but using 3D rendering. Your GPU model, driver version, and rendering quirks create a unique signature visible through the WebGL API.
AudioContext fingerprinting โ your browser processes an audio signal. The processing differences between audio hardware create a unique hash. This oneโs especially hard to spoof because itโs deeply hardware-dependent.
Font enumeration โ which fonts are installed on your system. The specific combination of fonts is surprisingly unique across machines.
Behavioral fingerprinting โ how you type, move your mouse, scroll, and interact with pages. Machine learning models can distinguish individual humans by their behavioral patterns alone. This is the hardest to fake because it requires mimicking natural human behavior in real-time.
๐ฌ Fingerprint Testing Tools โ check before you wreck
| CreepJS | Advanced fingerprint analysis with lie detection โ catches spoofing |
| FingerprintJS | Standard fingerprinting demo |
| BrowserLeaks | Canvas, WebGL, fonts, everything in one place |
| Cover Your Tracks | EFFโs tracking uniqueness test |
| Am I Unique | Statistical uniqueness score |
| Undetectable Panopticlik | Antidetect-specific fingerprint test |
| Wade.is | Fingerprint testing tool |
๐ Antidetect Resources
| daijro/camoufox | Camoufox source โ C++ level Firefox mod |
| github.com/topics/antidetect-browser | Antidetect browser repos |
| github.com/topics/anti-detection | Detection evasion tools |
| github.com/topics/puppeteer-extra | Puppeteer stealth plugins |
| AXP-OS/AXP-Antidetect-Detector | Detect antidetect browsers (defender tool) |
| rebrowser/rebrowser-bot-detector | Detect browser automation (defender tool) |
Residential Proxies โ Becoming A Real Personโs IP
Why VPNs donโt work for fraud: VPN IPs are known and blacklisted. Datacenter IPs get flagged instantly. Fraud detection sees โthis IP is a known VPNโ โ automatic block.
Residential proxies use IPs from actual home internet connections. To fraud detection, you look like someoneโs grandma checking her email from Des Moines. Indistinguishable from a real customer.
๐ How residential proxies work โ scale, sourcing, and why they're unstoppable
The scale: ~100 million residential IPs in the US alone. More than all VPN servers combined globally. Blocking them = blocking real customers. Websites canโt afford that.
How proxy providers get residential IPs:
- SDK embedding โ apps install a proxy client hidden in their code (Hola VPN famously did this โ sold user bandwidth without disclosure)
- โFree VPNโ services โ users become exit nodes without knowing it. Free VPN = you are the product.
- Browser extensions โ legitimate-looking tools route traffic through your connection silently
- Malware โ infected phones and computers become proxy nodes in botnets
The numbers that explain the problem: 836% increase in residential proxy use for fraud (HUMAN Security 2023). 84% of websites cannot detect bots using residential proxies (DataDome report). Thatโs not a detection problem you can patch โ itโs a fundamental limitation.
๐ Proxy Protocol Differences โ SOCKS5 vs HTTP vs HTTPS
Not all proxies are equal. The protocol determines how much you leak:
HTTP proxies โ only handle HTTP traffic. Can read and modify requests. Headers visible. Fine for basic web browsing but can leak proxy-identifying information.
HTTPS proxies โ handle encrypted traffic via CONNECT tunnel. The proxy sees the destination but not the content. Better privacy but still reveals youโre using a proxy if headers arenโt clean.
SOCKS5 proxies โ protocol-agnostic. Handle any TCP/UDP traffic (web, email, torrents, DNS). No header modification, no content inspection. Support authentication. The gold standard for carding because they donโt inject proxy-identifying headers.
| Protocol support | HTTP only | HTTP/HTTPS | Any TCP/UDP |
| Speed | Fast | Medium | Fast |
| Header modification | Yes (leaks) | Tunnel only | No |
| UDP support | No | No | Yes |
| Authentication | Basic | Basic | Username/pass |
| Detection difficulty | Easy to spot | Medium | Hard to detect |
The standard combo: SOCKS5 + residential IP. HTTP proxies leak too much metadata. Datacenter SOCKS5 gets flagged by IP reputation lists. Residential SOCKS5 hits the sweet spot โ protocol that doesnโt leak + IP that looks real.
๐ก Proxy Resources
| monosans/proxy-scraper-checker | Rust-powered scraper/checker, 5K+ stars |
| monosans/proxy-list | Auto-updated hourly free proxy list |
| github.com/topics/residential-proxy | Residential proxy repos |
Bypassing 2FA โ OTP Bots
Two-factor authentication was supposed to be the wall. Turns out itโs more of a speed bump with a price tag.
How OTP Interception Works
Some sites require OTP even with Non-VBV cards. Solution: automated phone calls that trick victims into handing over their one-time codes. In real-time. While the transaction is pending.
๐ญ The OTP bot process โ social engineering at machine speed
Step by step:
- Carder initiates purchase โ OTP sent to victimโs phone
- OTP bot immediately calls the victim โ within seconds
- Automated voice: โThis is your bankโs security department. Weโve detected unusual activity on your account. Please enter your one-time verification code to secure your account.โ
- Panicked victim enters the code on their phone keypad
- Bot relays code to carder in real-time
- Carder enters code โ transaction completes
- Victim realizes what happened approximately 30 seconds too late
Major OTP bots in the wild:
| SMSRanger | Telegram-based automated calls | ~80% when victim answers |
| BloodOTPbot | SMS spoofing + automated calls | High |
| OTP.agency | Full service with customizable templates | Varies by template |
| SMS Buster | Specializes in Canadian bank scripts | High |
Pricing:
- $40-100/week rental
- $300-1,200/month unlimited
- $4,000 for lifetime access
Why it works: People trust phone calls from their โbank.โ The automated voice sounds professional and urgent. The caller ID is spoofed to show the bankโs real phone number. In the moment of panic โ โunusual activity detected on your accountโ โ most people comply immediately. Fear overrides rational thought.
Your 2FA isnโt protection. Itโs a speed bump. A speed bump that costs between $40 and $4,000 to flatten.
๐ฑ SIM Swapping โ The Nuclear OTP Bypass
When OTP bots fail, thereโs a more aggressive approach: SIM swapping. Take over the phone number entirely.
How it works:
- Attacker gathers victimโs personal info (name, DOB, account PIN, last 4 of SSN)
- Calls the victimโs carrier (T-Mobile, AT&T, Verizon) pretending to be them
- Convinces carrier support to transfer the phone number to a new SIM card
- Victimโs phone goes dead โ no signal, no service
- Attacker now receives ALL calls and texts to that number
- Every SMS-based OTP, password reset, and 2FA code goes straight to the attacker
The scale of the problem:
- FBI IC3: 982 complaints, $26M in US losses in 2024 alone
- UK saw a 1,055% surge in SIM swap attacks (Cifas data)
- T-Mobile lost a $33M arbitration case over a SIM swap that drained a customerโs crypto
- IDCARE reports 90% of attacks succeed without victim interaction โ itโs all social engineering the carrier
- The SECโs official X (Twitter) account was hijacked via SIM swap in January 2024 โ the fake Bitcoin ETF post spiked BTC 10% to $48K before correction. Eric Council Jr. was sentenced to 14 months for the attack, exploiting T-Mobileโs eSIM QR code provisioning.
eSIM attacks โ the new frontier:
eSIM doesnโt fix the problem. Attackers now generate eSIM QR codes through compromised carrier portals โ the entire swap cycle can complete in under 5 minutes. NOPORT fraud flags that carriers implemented? Already defeated.
Insider threats โ the real access vector:
- Carrier employees sell SIM swaps for $300-1,000 per swap on Telegram
- Jonathan Katz (T-Mobile employee) was convicted for taking $1,000 per line in bribes
- T-Mobile was breached 100+ times in 2022 alone through employee credential phishing
- Kroll (risk advisory firm) was hit when an employeeโs T-Mobile account was SIM-swapped โ downstream breach hit BlockFi, FTX, and Genesis customers
- Scattered Spider/UNC3944 used SIM swapping + Azure Serial Console abuse for enterprise-level attacks, including the M&S breach in April 2025
SS7 Protocol Exploitation โ the telecom backdoor:
The SS7 protocol (Signaling System 7) is the 50-year-old backbone of global telecom. It was designed in the 1970s with zero authentication โ any node on the network is trusted by default.
- 2,000+ known vulnerabilities in the protocol
- Attackers use SRI-SM (Send Routing Information) and PSI (Provide Subscriber Information) commands to intercept SMS messages
- A $5,000 zero-day SS7 exploit appeared on darknet with 1,200+ vulnerable gateway IPs
- The exploit operates at 50 transactions/second through SIGTRAN interface exposure
- Tools like SigPloit (open-source) allow Point Code spoofing and MitM attacks
- The Diameter protocol (4G/5G successor) has its own vulnerabilities โ the migration didnโt fix the fundamental trust model
- Group-IB found 39% of SIM swap fraud involves multiple transactions โ once they have your number, they drain everything fast
Detection & Prevention โ carrier-side APIs:
- CAMARA SIM Swap API โ real-time SIM swap detection with timestamp/yes-no responses
- GSMA Open Gateway โ standardized API for financial institutions to check SIM swap status before authorizing transactions
- Telefรณnica Open Gateway โ deployed by Itaรบ Unibanco, MovyPay, LankaPay
- Carriers now offer SIM Protection features (Verizon) and port-freeze policies
Why SMS 2FA is the weakest form of 2FA. Push notifications (Google Authenticator, Authy) and hardware tokens (YubiKey, FIDO U2F) canโt be SIM swapped. They require physical possession of a specific device โ not just control of a phone number that lives on a tiny swappable chip.
Phone OSINT Tools โ for researchers tracking SIM swap infrastructure:
| FOGSEC/PhoneInfoga | E164 format analysis, Google Dork generation, VoIP detection |
| The-Osint-Toolbox/Telephone-OSINT | Truecaller alternatives, carrier ID tools |
| phoneintel/phoneintel | Neutrino API integration, batch processing |
| github.com/topics/phone-number-information | PhoneInfoga, Moriarty, OwlTrack ecosystem |
| N0rz3/Inspector | Carrier identification modules |
๐ก OTP & SMS Resources
| Shelex/free-otp-api | Free OTP API aggregator |
| github.com/topics/sms-verification | SMS verification tools |
| github.com/topics/phone-number-verification | Phone verification repos |
| grizzlysms.com | Virtual number service |
| TextVerified | Premium SMS verification |
| receive-smss.com | Free online SMS receiving |
๐ง Temp Mail & Disposable Email Services
Every carding operation needs throwaway emails. Disposable email services provide single-use addresses that self-destruct:
| Temp-Mail | 10M+ Android installs, instant disposable emails |
| AdGuard Temp Mail | Privacy-focused temp email |
| TempMailTo | Simple disposable addresses |
Fraud systems maintain blacklists of known disposable email domains. IPQualityScore checks every email against these lists. So carders move to custom SMTP setups with aged domains โ harder to detect but more work to maintain.
๐ฑ Virtual Phone Number Services
When you need a phone number for SMS verification but canโt use your real one:
| GrizzlySMS | Virtual numbers for verification |
| TextVerified | Premium SMS verification service |
| SMSPVA | Bulk virtual number service |
| receive-smss.com | Free online SMS receiving |
Non-VoIP numbers pass more verification checks than VoIP numbers. Carriers can detect VoIP-originated numbers and reject them, so the market for โrealโ non-VoIP numbers commands a premium.
AI Joined The Game
AI didnโt just change the defense. It changed the offense. Both sides got the same upgrade simultaneously โ and the attackers moved faster.
Dark LLMs โ The New Arsenal
๐ค WormGPT and the dark LLM ecosystem โ full breakdown
WormGPT (June 2023) โ the one that started it:
- Built on GPT-J 6B, fine-tuned on malware data
- โฌ60-100/month subscription from creator Rafael Morais (โlast/lasteโ)
- Distributed on HackForum + Exploit forum with Mitre ATT&CK mappings
- Wrote perfect phishing emails โ no grammar mistakes, no โdear sir/madamโ cringe
- Creator got doxxed by Brian Krebs โ shut down the same day
- 200+ customers already had access at โฌ500+/month; model was already being shared freely
WormGPT didnโt die. It evolved:
- WormGPT v2 โ โฌ550/year, private build โฌ5,000 โ rebuilt with same group behind FraudGPT
- WormGPT 4 โ $50/month, $220 lifetime access โ rebuilt on Grok and Mixtral architectures (CATO Networks analysis, BreachForums distribution Oct 2024-Feb 2025)
- Variants by xzin0vich and โkeanuโ running on Grok keep appearing
The current dark LLM market (2025-2026):
| FraudGPT | Phishing emails, scam scripts, fake pages โ plug-and-play for non-technical actors | $200/mo to $1,700/yr |
| GhostGPT | Rapid exploit development, social engineering scripts | $50/week on Telegram |
| KawaiiGPT | Anime-themed, community-maintained, 500+ users, ransomware generation tested | Free on GitHub |
| DarkGPT | โGodmode ChatGPTโ โ general fraud assistance | Varies |
| OnionGPT | Tor-based access | Varies |
| DarkBard | Built on Google Bard architecture | Varies |
| WolfGPT | Polymorphic malware generation | Varies |
| EvilGPT / XXXGPT | Various specialized criminal use cases | Varies |
Xanthorox AI (late Q1 2025) โ the game changed again:
Xanthorox abandoned all dependency on GPT, LLaMA, and Claude. Itโs a fully self-hosted, multi-model architecture running on private servers. SlashNext called it โthe next evolution of black-hat AIโ and โthe killer of WormGPT.โ
- $300/month or $2,500/year
- Five specialized models: Xanthorox Coder, Xanthorox Vision, Xanthorox Reasoner Advanced, voice interface module, and web scraping module
- Scrapes 50+ search engines for real-time data
- Runs entirely offline โ no API calls to trace, no cloud dependency to shut down
- Has a GitHub page, YouTube channel, and accepts Discord crypto payments
- KELA report: โmaking lives of cybercriminals much easierโ โ but primarily scaling known scams rather than enabling novel attacks
The ecosystem growth:
- KELA 2025 report: 219% increase in malicious AI tool mentions on underground forums
- 52% increase in jailbreaking discussions
- Chinese LLMs (DeepSeek, Qwen) being adapted by hackers for uncensored use
- Retrieval poisoning is emerging โ NewsGuard found 3.6 million Russian disinformation articles designed to contaminate LLM training data
What they actually generate:
- Perfect phishing emails in any language
- Social engineering call scripts with objection handling (โif they say X, respond with Yโ)
- Convincing customer service chat responses for social engineering
- Fake refund request templates
- Code for automated attacks, scrapers, and testing tools
- Polymorphic malware that mutates to evade detection
The real shift isnโt that AI can write phishing emails. Itโs that AI eliminated the skill barrier. Before, you needed to actually know English well enough to write a convincing email. Now you just describe what you want and the model handles the rest. In any language. Including perfect BEC (business email compromise) that passes executive review.
Deepfakes Killed KYC
Your face is no longer proof of identity. Thatโs not hyperbole โ thatโs the result of actual testing.
๐ค The deepfake KYC bypass โ $30 to become anyone
The $25 million video call (February 2024, Hong Kong / Arup):
A finance employee joined a video call with his โCFOโ and several colleagues. They discussed an urgent fund transfer. He authorized $25 million.
Every person on that call was AI-generated. Every face. Every voice. Real-time deepfakes running in a video meeting. Nobody was real except the victim.
The scale of deepfake fraud in 2026:
- Deepfake attacks grew 2,000%+ over 3 years
- 1 in 15 fraud attempts now use AI (a deepfake attempt occurs every 5 minutes)
- 244% rise in digital document forgeries
- 42.5% of fraud attempts use AI, 29% succeed (Signicat data)
- Projected losses: $40 billion by 2027 (FS-ISAC)
- WEF estimates $12 billion in synthetic media fraud annually
Deepfake KYC bypass services โ the full menu:
| Basic KYC verification bypass | $30-600 |
| Deepfake-as-a-Service images | $10-50 per image |
| Synthetic identity package | ~$15 |
| Biometric training datasets | ~$5 |
| Crypto exchange identity unlock | $400-600 |
| ProKYC (full toolkit โ face gen + document gen + liveness bypass) | $629/year |
47 specialized KYC bypass tools identified (Sensity 2024 report), from a landscape of 10,206 image generation tools, 2,298 face-swap tools, and 1,018 voice cloning tools.
Key tools in the wild:
- Deepfake Offensive Toolkit (DoT) โ purpose-built for KYC bypass
- Deep-Live-Cam โ real-time face swapping for video calls
- ProKYC โ generates synthetic documents + faces + liveness bypass in one package
- GPT-4o โ being used to generate fake ID documents that pass automated checks
Test results:
- Bypassed Veriff liveness detection

- Bypassed IDScan anti-spoofing

- Got 99% confidence scores from KYC detection systems
- Group-IB documented 8,065 liveness bypass attempts at a single bank (Jan-Aug 2025)
- An AI-generated Polish passport went viral after bypassing real KYC verification
- Javelin Research: $6.2B in new account fraud in US alone (2024)
Regulatory response:
- EU AI Act (2025) classifies deepfake KYC bypass as โhigh-riskโ
- ISO 25456 injection-attack testing standard emerging
- ISC2 launched a Deepfake Mitigation Specialist credential in 2025
For $30, you can bypass the identity verification that banks, crypto exchanges, and financial services rely on. Your face is not proof of identity anymore. Not on video calls. Not on KYC selfie checks. Not anywhere that a camera is the only verification method.
AI Voice Cloning & Vishing โ Your Voice Is Not Your Password
๐ The voice cloning explosion โ 30 seconds of audio is all it takes
The numbers are insane:
- Vishing surged 442% from H1 to H2 2024
- Deepfake vishing specifically spiked 1,600%+ in Q1 2025
- AI fraud attempts surged 194% in 2024 vs 2023
- Voice cloning jumped 400%+ in 2025 (FBI alert, April 2025)
- Annual voice fraud losses: $25 billion (Truecaller data)
- Projected: $40 billion by 2027
How it works:
All you need is 30 seconds of audio from the target โ a voicemail, a YouTube video, a podcast clip, a social media post. AI clones the voice convincingly enough to fool family members, colleagues, and bank voice authentication systems. Underground pricing: โa few dollars.โ
Case studies that should terrify you:
- $25 million Arup CFO scam โ deepfake video call, every participant AI-generated
- Retool crypto breach โ attacker cloned an IT employeeโs voice to authorize access
- Italian Defense Minister Crosetto โ voice clone extracted โฌ1 million from a business executive
- UK energy firm CEO โ voice clone extracted โฌ220,000 in โemergencyโ wire transfer
- Sharon Brightwell โ lost $15,000 to a cloned voice of a family member
- WPP CEO โ voice cloned on Microsoft Teams (Guardian reporting)
- Senior US government officials targeted with cloned voices (FBI 2025 alert)
- Elon Musk deepfake voice used in crypto scam campaigns โ hundreds of thousands of AI-generated scam sites
Organized operations:
- SilverPhantom โ collective targeting Brazil/Argentina procurement departments with AI-cloned executive voices
- Xanthorox AI automates voice cloning + live delivery for vishing campaigns
- Less than 30% of cyber insurance policies cover AI-powered social engineering attacks
Defenses being deployed:
- Acoustic fingerprinting to detect synthetic audio
- Multimodal authentication (voice + behavior + device)
- Code words for high-value transfers (low-tech but effective)
Behavioral Biometrics โ The Defense Thatโs Actually Working
๐ฌ How behavior beats deepfakes โ the one signal AI can't easily fake
What it measures:
- Keystroke dynamics (how you type โ speed, pressure, rhythm)
- Mouse movement patterns (acceleration, curve, drift)
- Touchscreen gestures (swipe pressure, finger angle)
- Voice cadence and micro-expressions
- Gaze tracking patterns
Why it works: GANs (the AI behind deepfakes) struggle to simultaneously synthesize face + speech + gait in a way that matches real behavioral patterns. You can fake a face. You can fake a voice. Faking both plus natural typing patterns plus mouse movements in real-time? Thatโs exponentially harder.
Detection rates:
- 98.7% detection rate against synthetic identity fraud (Innovify research)
- 75-90% false positive reduction compared to rule-based systems
Key platforms:
- BioCatch (Oct 2025) โ behavioral biometrics for banking, including vulnerable customer protection
- Incode Deepsight (Dec 2025) โ dedicated deepfake detector
- Feedzai โ ML-based behavioral scoring (Spark Matrix top ranking)
What fraudsters use to counter it:
- Anti-detect browsers with human behavior simulation
- Device emulators + proxy networks
- Cursor drift injection scripts
Itโs the newest front in the arms race โ and for now, behavior is the one thing AI canโt convincingly replicate in real-time across multiple modalities simultaneously.
AI-Driven Card Testing โ Bots Got Smarter
โก When AI meets carding automation
The convergence of AI agents and card fraud is accelerating:
- OpenAI Operator, DeepSeek, and Qwen are being studied for weaponization potential โ browser automation AI repurposed for fraud workflows
- BidenCash has been dumping cards since 2022 as promotional stunts โ AI bots process these dumps at unprecedented speed
- Luhn algorithm generators combined with AI-driven testing can validate cards at scale
- AI behavioral mimicry makes bot traffic indistinguishable from human browsing
- Bulk unverified cards go for $5-20 per 100+ โ AI testing validates them into $20-200 each verified cards
The bottleneck used to be human speed. Now bots with residential proxies and behavioral mimicry can test thousands of cards per hour while looking like normal shoppers. The math changed overnight.
Cashout Methods
Stolen cards are useless until the value is extracted and converted to something untraceable. This is where the money actually moves.
Gift Card Cashout
Most popular method. Low risk, fast turnaround, nearly untraceable.
๐ด The gift card pipeline โ from stolen card to crypto
How it works:
- Card storeโs e-gift cards (Walmart, Target, Amazon, Best Buy, Apple)
- Keep orders under $200 to avoid manual verification triggers
- Receive codes instantly via email โ no shipping, no physical goods
- Sell codes on Paxful, Telegram, or reseller markets
- Get 50-70% face value in crypto
Why gift cards dominate the cashout market: Digital delivery means no shipping address needed. Instant fulfillment. Hard to trace back to the buyer. Easy to resell on secondary markets. The codes are just strings of characters โ no physical evidence, no fingerprints, no DNA.
A $200 Amazon gift card bought with a stolen card becomes $100-140 in Bitcoin within an hour. Scale that across 50 cards and you see why this is the go-to method.
โฟ Crypto Ramp Cashout
๐ Stolen card โ Bitcoin pipeline โ the fully digital cashout
The flow:
- Get card with full billing info (fullz preferred for AVS matching)
- Buy crypto through services accepting cards: MoonPay, Changelly, Ramp
- Buy privacy coins (Monero/XMR) or stablecoins first
- Move through mixers/tumblers to break the transaction trail
- Cash out through non-KYC exchanges or P2P platforms
Why it works: No physical goods. No drop addresses. No shipping labels. No waiting. Once crypto is tumbled through enough hops, tracing becomes effectively impossible โ especially with Moneroโs ring signatures that obscure sender, receiver, and amount by design.
๐ Crypto Tumblers & Mixers โ how dirty money gets clean
Tumblers/mixers break the link between the sending address and the receiving address. You send Bitcoin in, it gets pooled with other peopleโs Bitcoin, and a different set of coins comes out to a new address.
| Centralized mixers | Third party pools and redistributes | Medium (operator knows the link) |
| CoinJoin | Multiple users combine transactions into one | Low (no central operator) |
| Monero (XMR) | Ring signatures + stealth addresses built into protocol | Near-zero (privacy by default) |
| Cross-chain swaps | BTC โ XMR โ BTC on different address | Very low |
The Monero advantage: Bitcoinโs blockchain is public โ every transaction is traceable with enough effort and tooling. Moneroโs ring signatures make every transaction look like it could have come from dozens of possible senders. Chainalysis has admitted limited Monero tracing capabilities compared to Bitcoin.
๐ฑ Crypto Off-Ramps โ getting to actual cash
Once crypto is cleaned, it needs to become usable money:
Non-KYC exchanges โ the exit door:
| MEXC | 10 BTC daily | Email-only registration |
| PrimeXBT | Email only | No KYC for basic accounts |
| Various DEXs | None | Decentralized, no accounts needed |
| P2P platforms | Varies | Cash trades, LocalBitcoins-style |
Off-ramp services convert crypto to fiat (real money) via bank transfer, mobile money, or cash pickup. Some process payouts in under 5 minutes. The speed matters โ the longer funds sit in any one place, the higher the seizure risk.
Goods Resale
๐๏ธ The classic carding method โ buy stuff, flip it
The flow:
- Card high-value items โ electronics, luxury goods, designer products
- Ship to drop address (never your real address)
- Reship to buyer or list on Facebook Marketplace, Craigslist
- Sell for 40-60% retail value
Best items to card for resale: iPhones (always liquid โ instant demand), gaming consoles (easy resale at near-retail), AirPods (small + valuable + high demand), designer goods (steady luxury resale market).
The older method. More risk because physical goods need physical delivery. But some carders prefer it because the resale markets are mature and the conversion to cash is straightforward.
Money Transfer Carding
๐ฆ Carding wire transfer services
- Card Western Union, Remitly, or similar transfer services
- Send money to a receiver (usually in another country)
- Receiver picks up cash at a local agent
- Takes their cut (20-40%), sends the rest back via crypto
Limits: ~$2,000 per card before fraud flags trigger. Approximately 20-minute window before detection systems catch up. Speed is literally everything โ if you havenโt completed the transfer in 20 minutes, itโs getting blocked.
๐ณ Prepaid Card Loading & Cashout
Prepaid cards as a cashout channel โ load stolen funds onto reloadable prepaid cards, then withdraw at ATMs or spend in stores:
- Buy reloadable prepaid cards (Green Dot, Serve, Bluebird) with minimal ID
- Load via stolen card-funded money transfers or direct deposits
- Withdraw at ATMs (daily limits: $500-1,000)
- Or spend in stores for goods to resell
Why prepaid cards get exploited: Weak KYC at activation, reloadable without full identity verification, and ATM withdrawal converts digital fraud directly into physical cash in your hand. FinCEN tracks suspicious prepaid activity, but the volume overwhelms monitoring systems.
Drop Systems
Every carded physical good needs to land somewhere that isnโt your real address. That somewhere is a โdrop.โ
Whatโs A Drop?
๐ Drop types โ from mule houses to business fronts
A drop = an address where carded goods get shipped. Never the carderโs actual address. Never.
| Residential drop | Recruited muleโs house โ they receive and forward | Medium |
| Vacant property | Abandoned house, intercept package on delivery day | High |
| Reshipper service | Organized network handles everything end-to-end | Low (for the carder) |
| Business front | Fake company with a commercial address โ looks completely legit | Low |
Reshipping Services
๐ฌ How reshipping operations work โ including the $1.8B bust
The process:
- Carder ships goods to a US drop address
- Reshipper receives the package
- Removes original shipping labels and any identifying information
- Reships to final destination (usually overseas โ Russia, Eastern Europe, Southeast Asia)
- Takes a 30-50% cut of the goodsโ value
SWAT USA Drop (exposed November 2023):
- Operated by a Russian syndicate
- 1,200+ US reshippers recruited via Craigslist and Indeed ads
- Workers genuinely believed they were doing legitimate โlogistics coordinatorโ or โpackage handlerโ work
- Processed $1.8 billion in reshipped fraud goods per year
- Average mule lost $1,156.93 when banks clawed back the deposits used to pay them
How reshippers get recruited:
- Craigslist โpackage handlerโ ads
- Indeed/LinkedIn โlogistics coordinatorโ job postings
- โWork from home, make $3,000/monthโ โ sounds too good to be true because it is
- They receive packages, rebox them, ship them overseas, and eventually get a visit from postal inspectors
๐ฎ Shipping Carrier Fraud Detection
UPS, FedEx, and USPS arenโt clueless. They have their own fraud detection systems:
- Package redirection scams โ changing delivery address after shipment using stolen account credentials
- ROS (Receipt of Shipment) fraud โ claiming shipment was received when it wasnโt
- Empty package scams โ shipping empty boxes to generate tracking numbers for FTID schemes
- Address pattern analysis โ carriers flag addresses receiving unusually high volume from different senders
Average loss per shipping fraud incident: $400K+ per affected business. Carriers increasingly share fraud intelligence with merchants and law enforcement.
Physical Carding โ EMV Cloning
Digital carding is one thing. Physical card cloning is another beast entirely โ and the myth that EMV killed it is exactly that. A myth.
Dumps vs Fullz โ Different Tools, Different Jobs
๐ When to use dumps vs fullz
| Dumps | Physical carding โ magnetic stripe data written to blank cards for in-person use at ATMs and stores |
| Fullz | Online carding โ complete identity for card-not-present fraud at e-commerce sites |
Different products for different attack surfaces. Dumps need physical equipment. Fullz need antidetect browsers and proxies. The skillsets barely overlap.
EMV Cloning Still Works
The myth: โEMV chips are uncloneable.โ
The reality: EMV-bypass cloning exists. It works on ATMs and POS terminals that donโt properly validate chip data โ which is more of them than youโd think.
๐ง The EMV cloning process โ hardware, software, and why terminals still fall for it
Hardware needed:
- JCOP cards (Java Card blanks) โ $2-5 each on Amazon
- Smart card reader/writer โ $20-50
- EMV writing software (X2 EMV 2024) โ $1,499+
Process:
- Get โ201 dumpsโ (includes EMV cloning data โ track 1, track 2, and chip data)
- Load data into EMV writer software
- Generate IST file (authentication data)
- Write to blank JCOP card
- Use at compatible ATMs or POS terminals
Why it still works in 2026: Many terminals still have fallback modes. If the chip read fails, they fall back to magstripe โ which defeats the entire purpose of the chip. And some terminals donโt fully validate the chip cryptogram โ they check the format but not the cryptographic integrity. That gap between โformat checkโ and โcrypto validationโ is the entire cloning business.
Video tutorials exist showing the entire cloning process step by step. The tools are sold openly. The blanks are on Amazon. The only thing separating anyone from a card cloner is $1,500 and the moral compass to not use it.
Chargebacks & Refund Fraud
The merchantโs nightmare. The carderโs insurance policy. The system that makes fraud economically viable because even when caught, the money often stays gone.
How Chargebacks Actually Work
A chargeback is when a cardholder disputes a transaction and the bank forcibly reverses it. The money goes back to the cardholder, and the merchant loses the sale + gets hit with a $15-100 fee per chargeback.
โฑ๏ธ The chargeback timeline โ step by step
- Cardholder disputes โ calls bank or files dispute online
- Issuing bank reviews โ decides if claim seems valid
- Provisional credit โ cardholder gets money back immediately (before investigation even starts)
- Merchant notified โ has 20-45 days to respond with evidence
- Bank reviews evidence โ decides who keeps the money
- Pre-arbitration โ if merchant fights, it escalates to the card network
- Arbitration โ Visa/Mastercard makes final decision. Loser pays $500+ in fees.
Visa reason codes (the common ones):
- 10.4 โ Fraud. Cardholder says they didnโt make the purchase.
- 13.1 โ Goods not received.
- 13.3 โ Not as described.
- 13.6 โ Credit not processed (refund not issued).
Mastercard reason codes:
- 4837 โ No cardholder authorization (fraud)
- 4853 โ Goods not as described
- 4855 โ Goods not received
The dirty secret: If a merchantโs chargeback rate exceeds 1% of transactions, they get put on monitoring programs (Visa VDMP, Mastercard ECM). Above 1.5% = fines. Above 2% = potential termination of payment processing. Losing your ability to accept cards is a business death sentence.
โ๏ธ Chargeback Representment โ merchants fighting back
Merchants arenโt defenseless. Representment = the merchantโs right to dispute the chargeback with evidence.
What wins representment cases:
| Delivery confirmation with signature | Proves goods were physically received |
| IP address + device fingerprint matching customerโs location | Links transaction to real customerโs devices |
| Email correspondence | Shows customer engaged with merchant before/after purchase |
| Customerโs transaction history | Previous legitimate purchases from same account |
| AVS + CVV match proof | Card details were correct at time of purchase |
| 3DS authentication proof | Liability should be on the issuer, not merchant |
Win rates:
- Average merchant representment success: 20-30%
- With professional chargeback services: up to 50-75%
- Visaโs Compelling Evidence 3.0 (CE3.0): uses historical transaction footprint to prove the real cardholder made the purchase
Time limits โ miss them and you automatically lose:
- Visa: 20 days to respond to initial chargeback
- Mastercard: 45 days
Chargeback resources:
- Stripe: Representment Explained โ how to build a representment case
- Mastercard Official Chargeback Guide (PDF) โ Mastercardโs own rulebook
๐ Bank Fraud Investigation โ what happens after you dispute
When you call your bank and say โI didnโt make that charge,โ hereโs what actually happens on the bankโs side:
- Intake โ agent collects dispute details, provisional credit issued to you
- Pattern analysis โ bank checks if other cardholders reported the same merchant
- Transaction review โ IP address, device fingerprint, velocity, location data all examined
- Merchant contact โ acquiring bank notifies merchant, requests evidence
- Decision โ bank weighs customer claim vs merchant evidence
- Arbitration (if escalated) โ card network (Visa/MC) makes final binding decision
What banks actually check:
- Was the device used for the transaction associated with the cardholderโs history?
- Did the shipping address match known addresses?
- Were there other suspicious transactions in the same timeframe?
- Has this cardholder made excessive disputes before? (Friendly fraud detection โ yes, banks track this)
Refund Fraud โ The Art of Getting Paid Twice
๐ฐ The refund fraud playbook โ DNA, FTID, Empty Box, and FaaS
DNA (Did Not Arrive):
Claim the package never showed up. Under $200, most retailers just refund without investigation. They eat the loss because fighting it costs more than the refund itself.
FTID (Fake Tracking ID):
Create a shipping label with the merchantโs address as both sender and recipient. The tracking shows โdeliveredโ because the label was scanned โ but nothing actually went to the merchant. Some sophisticated operations use real tracking from unrelated shipments that happen to show delivery to the same ZIP code.
Empty Box / Wrong Item:
Claim the box arrived empty or contained the wrong item. Works best with high-value electronics. Some people ship back boxes filled with sand or broken items of similar weight.
FaaS โ Fraud as a Service:
Professional refund services charge 15-30% of the item value to process refunds on your behalf. They have scripts, established methods for each major retailer, and experienced โrefund specialistsโ who know exactly what to say on customer service calls.
Major retailer policies that get exploited:
- Amazon: generally refunds anything under $300 without requiring a return for first-time claims
- Walmart: refund threshold varies by account history and item category
- Target: in-store returns with receipt manipulation
- Best Buy: price match + return arbitrage
Synthetic Identity Fraud
Building a completely fake person from scratch. The fastest-growing type of financial crime in the US โ and the hardest to detect because the โpersonโ technically exists in the credit system.
๐งช The recipe โ how synthetic identities get built
- Get a real SSN (stolen from a child, elderly person, immigrant, or deceased individual โ people who donโt check their credit)
- Pair it with a fake name and fabricated date of birth
- Apply for credit โ the first application gets denied, but it creates a credit file at the bureaus
- Apply to a few more places โ each inquiry builds the synthetic file
- Get added as an authorized user on a legitimate account (tradeline piggybacking โ some people sell this)
- After 6-12 months of โcredit buildingโ โ the synthetic identity has a real credit score
- Apply for credit cards, max them all out, disappear
Why it works: Credit bureaus automatically create new files when they see a SSN + name combination they donโt recognize. Thereโs no verification that the name actually belongs to that SSN. The system trusts the data format, not the data source.
The scale: Federal Reserve estimates synthetic identity fraud costs $6 billion/year and is the fastest-growing type of financial crime in the US. Experian reports a 60% increase in synthetic fraud cases in 2024 vs 2023 โ now representing 29% of all identity fraud.
๐ฃ The Full Bust-Out Pipeline โ from fake SSN to $310K loss
The Federal Reserve mapped the complete bust-out lifecycle:
Step 1 โ Create the Identity: Start with a real SSN. Childrenโs SSNs are 50x more likely to be used as CPNs because kids donโt check their credit for years. SSN paired with fabricated name and DOB. Cost: $1-5 per SSN on dark web markets.
Step 2 โ Establish the Credit File: First credit application gets denied โ but the denial itself creates a new credit file. Apply at 2-3 more places. Each inquiry adds to the file. The synthetic identity now โexists.โ
Step 3 โ Boost the Credit: Get added as an authorized user on a legitimate credit card with good history. This is tradeline piggybacking โ services sell authorized user slots for $200-1,000. The synthetic ID inherits the accountโs positive history. Credit score jumps from nothing to 650-700+ in as little as 30 days.
Step 4 โ Harvest: Apply for credit cards, personal loans, auto financing, even bank accounts. With a 700+ credit score and a โcleanโ file, approvals flow freely. Build up $50K-200K in available credit across multiple issuers.
Step 5 โ Bust Out: Max every card, draw every credit line, take every cash advance โ all within a few days. Then disappear. The synthetic identity never existed as a real person, so thereโs nobody to collect from. Average bank loss per synthetic bust-out: $310,000.
๐ท๏ธ CPN Schemes โ the 'legal SSN alternative' that isn't
CPNs (Credit Privacy Numbers) are marketed as โlegal alternativesโ to your SSN for credit applications. Theyโre not. Theyโre either stolen SSNs repackaged or fabricated numbers.
CPN vendors operate openly on social media, selling packages for $200-2,000 that include a โcleanโ SSN, a fake name backstory, and instructions for building credit.
The law: Using a CPN on a credit application is federal identity theft (18 U.S.C. ยง 1028) and bank fraud (18 U.S.C. ยง 1344). Penalties: up to 30 years imprisonment.
๐ Synthetic ID Scale & Statistics
| Annual losses | $6B+ (Federal Reserve) |
| Exposure H1 2025 | $3.3B (TransUnion) |
| Pass onboarding rate | 95% (Equifax) |
| YoY increase | 50-60% |
| Share of all identity fraud | 29% (Experian 2024) |
| Time to build a synthetic ID (with AI) | 7 minutes |
| Average bank loss per bust-out | $310,000 |
| Businesses reporting impact | 46% globally |
๐ Synthetic ID Detection โ what catches them (and what doesn't)
eCBSV (Electronic Consent Based SSN Verification) โ the SSAโs API that lets financial institutions verify if a SSN/name/DOB combo is real. Match rate: ~95%. But it canโt catch established synthetic identities that are already in the credit system.
What works better:
- Tri-bureau merge analysis (checking all 3 credit bureaus for inconsistencies)
- Behavioral analytics during application (typing patterns, device fingerprinting)
- Graph network analysis (finding clusters of connected synthetic identities)
- Alternative data sources (utility records, phone records, address history)
Synthetic ID Resources:
- Federal Reserve Synthetic ID Hub โ whitepapers, toolkit, mitigation framework
- SSA eCBSV Service โ real-time SSN verification API
AI is making it worse: Deepfake-generated ID documents pass automated KYC checks. AI-generated faces pass liveness detection. Synthetic identities that took months to build manually can now be created in days. With AI, the full pipeline from CPN purchase to bust-out can be compressed to weeks.
OPSEC โ Not Getting Caught
The part nobody writes about in enough detail. Because the best technical setup means nothing if your operational security is garbage.
๐ป Operating Systems For Anonymity
| Tails | High | Beginners โ runs from USB, leaves zero trace on the host machine |
| Whonix | Very High | Two VM setup โ one for Tor routing, one for work. Network isolation. |
| Qubes | Maximum | Compartmentalized identities โ each activity runs in its own VM |
๐ Basic OPSEC Rules
- Never mix identities โ personal life and operations use completely separate devices, accounts, and networks. One crossover = everything connected.
- Burner phones โ cash purchase, activate far from home, never connect to home WiFi. Your home routerโs MAC address is a fingerprint.
- VPN + Tor โ never use your home IP for anything operational. Tor alone is slow but safe. VPN alone is fast but logged. Both together = layers.
- No personal info โ donโt brag, donโt flex, donโt tell your friends. Assume everything is logged, everything is monitored, everything is evidence.
- Compartmentalize โ each operation is separate. Different browser profiles, different proxies, different email addresses. If one gets burned, the others survive.
The number one way carders get caught isnโt technical forensics. Itโs bragging. They post screenshots. They flex on social media. They tell their girlfriend. They use the same username on a forum and on their personal Instagram. The FBI thanks them for the cooperation.
Automated Checkout Bots & Browser Automation
Nobody clicks checkout 500 times by hand. Bots handle scale. Hereโs the stack.
๐ง The bot frameworks โ what powers automated card testing
| Puppeteer | Chrome automation by Google โ the industry standard |
| Playwright | Microsoftโs cross-browser automation |
| Selenium | The OG browser automation |
| Nodriver | Undetectable Chrome automation |
| Rebrowser-puppeteer | Anti-detect Puppeteer fork |
The problem: Standard browser automation is detectable. Sites check for navigator.webdriver, CDP (Chrome DevTools Protocol) fingerprints, and automation-specific JavaScript properties.
The solution: Stealth plugins and custom patches:
| rebrowser-patches | Patches for stealth automation |
| undetected-chromedriver | Selenium-compatible undetected Chrome |
| FakeBrowser | Anti-fingerprinting automation |
| Bot Detector Test | Test if your bot is detectable |
โ๏ธ Cloudflare & Anti-Bot Bypass
Cloudflare protects millions of sites with Turnstile challenges and JavaScript fingerprinting. Bypassing it is its own cottage industry:
Methods that work (2025-2026):
- SeleniumBase UC Mode โ handles Cloudflare challenges automatically
- Camoufox engine โ C++ level modifications invisible to Cloudflareโs JS checks
- CDP patching โ removing Chrome DevTools Protocol fingerprints that Cloudflare looks for
- TLS fingerprinting โ matching real browser TLS signatures so Cloudflare canโt distinguish bot from human at the protocol level
Resources:
- CloudflareBypassForScraping โ automated Cloudflare bypass
- Chrome DevTools Protocol docs โ understanding what gets detected
Telegram โ The Undergroundโs Operating System
Telegram replaced dark web forums as the primary infrastructure for the carding ecosystem. Everything happens here now.
๐ก The Telegram carding ecosystem โ channels, roles, and scale
The ecosystem:
| Card shops | Automated vending via bots โ search by BIN, country, type |
| Checker bots | Validate cards against gates (Stripe, Braintree) |
| Log markets | Sell stealer log output โ passwords, cookies, cards |
| OTP services | Automated voice calls to intercept verification codes |
| Drop coordination | Connect carders with reshippers and mules |
| Escrow services | Hold funds during trades to prevent ripping |
| Reviews/vouches | Reputation systems for sellers |
Scale: BidenCash dumped 900K+ cards as a Telegram promotion. CrdPro has 7K+ members. Moon Cloud has 20K+. Academic analysis identified 1,489+ active carding channels.
Roles in a carding Telegram channel:
- Admin โ runs the channel, sets rules, takes a cut of every transaction
- Vendor โ sells cards/logs/tools
- Checker โ runs card validation bots
- Ripper โ scams other members (ironic but constant โ criminals scamming criminals)
- Escrow โ trusted middleman for trades
- Mule โ provides drop addresses or bank accounts
๐ฃ Phishing Page Infrastructure โ the modern phishing stack
Modern phishing doesnโt use sketchy free hosting anymore. Sophisticated operations run professional infrastructure:
The stack:
- Domain registration โ typosquatted domains via privacy-respecting registrars
- SSL certificates โ Letโs Encrypt provides free HTTPS (the padlock means nothing for trust โ it only means the connection is encrypted, not that the site is legitimate)
- Hosting โ bulletproof hosting or compromised legitimate servers
- Phishing toolkit โ Evilginx2 for real-time MITM proxy phishing
- Exfiltration โ stolen credentials sent via Telegram bot, email, or C2 server
Evilginx is the game-changer โ it acts as a reverse proxy between the victim and the real site. The victim sees the real site, enters real credentials, completes real 2FA, and Evilginx captures the session cookie. Even hardware 2FA tokens get bypassed because Evilginx captures the authenticated session, not just the credentials.
Phishing resources:
- Evilginx2 โ MITM proxy phishing framework
- Evilginx Phishlets โ pre-built phishing templates
- Evilginx TTPs + Blacklist โ tactics and IP blacklist
๐ Telegram OSINT Resources
| The-Osint-Toolbox/Telegram-OSINT | Investigation toolkit |
| ItIsMeCall911/Awesome-Telegram-OSINT | Curated OSINT tools for Telegram |
| sockysec/Telerecon | Channel reconnaissance |
The Complete Toolkit
Every tool mentioned throughout the encyclopedia, plus the analysis and investigation resources you need โ all in one place.
Malware Analysis
๐ฌ Sandboxes & Detection Rules
Sandboxes โ upload suspicious files, watch them detonate safely:
| any.run | Interactive cloud sandbox โ watch malware execute in real-time |
| Hybrid Analysis | Free upload, detailed behavioral reports |
| Tria.ge | Recorded Future sandbox |
| VirusTotal | Multi-engine scanner (70+ antivirus engines) |
YARA Rules โ pattern-matching for malware detection:
| Yara-Rules/rules | Massive community rule collection |
| bgd-cirt/LummaStealer-YARA-Rules | Lumma-specific detection rules |
Crypto Investigation
๐ On-chain analysis tools
| Blockchain3D | 3D transaction visualizer |
| TxStreet | Live Bitcoin/ETH transaction visualizer |
| Mempool.space | Bitcoin mempool explorer |
| OffcierCia/On-Chain-Investigations-Tools-List | Complete investigation toolkit |
OSINT Collections
๐ Investigation resource libraries
| jivoi/awesome-osint | THE definitive OSINT resource list |
| cipher387/osint_stuff_tool_collection | 500+ categorized tools |
| fastfire/deepdarkCTI | Dark web intelligence collection |
The Glossary
Every term youโll encounter in the carding ecosystem โ decoded.
๐ Full glossary โ A to Z
| Fullz | Complete identity package โ SSN, DOB, motherโs maiden name, address, phone |
| Dead Fullz | Expired cards โ still useful for synthetic ID fraud |
| Dumps | Magnetic stripe track data for physical card cloning |
| CVV/CVC | Card Verification Value โ 3 digits on back (4 on Amex front). Generated by bank with DES encryption, not Luhn. |
| BIN/IIN | Bank/Issuer Identification Number โ first 6-8 digits of a card |
| Non-VBV | Cards that skip 3D Secure โ no OTP verification required |
| VBV | Verified by Visa / 3D Secure โ requires OTP, blocks carders |
| 3DS | 3D Secure โ extra authentication layer. 3DS1 (old popup) vs 3DS2 (embedded + frictionless) |
| SCA | Strong Customer Authentication โ PSD2 requirement in Europe |
| ECI | Electronic Commerce Indicator โ shows 3DS authentication result |
| Drop | Shipping address thatโs not yours |
| Reshipper | Person who receives and forwards carded packages overseas |
| Logs | Stealer malware output โ passwords, cookies, cards, everything from a victimโs browser |
| Burn | Address/card/account thatโs been flagged and canโt be reused |
| COB | Change of Billing โ redirect statements to a new address |
| Checker | Tool to validate if cards are still active |
| Ripper | Scammer who scams other criminals (honor among thieves is a myth) |
| AVC | Automated Vending Cart โ automated underground card shop |
| Antidetect | Browser that spoofs fingerprinting parameters |
| RDP | Remote Desktop โ accessing a remote machine to mask location |
| OTP | One-Time Password |
| SE | Social Engineering โ manipulating people to get information |
| Kitz | Physical credentials package โ actual stolen wallets, documents |
| 201 | Dumps with EMV cloning data |
| JCOP | Java Card blanks for writing cloned chip data |
| Gate | Payment gateway used for card checking |
| SK | Stripe Key โ API key used in checkers |
| AVS | Address Verification System โ checks billing address numbers against bank records |
| ISO 8583 | International standard for financial transaction messaging |
| PAN | Primary Account Number โ your full card number |
| MII | Major Industry Identifier โ first digit of card number |
| HSM | Hardware Security Module โ tamper-proof device for cryptographic operations |
| dCVV | Dynamic CVV โ changes every ~60 seconds |
| Luhn | Checksum algorithm that validates card number structure (typo detection, not fraud prevention) |
| DNA | Did Not Arrive โ claiming a package wasnโt delivered |
| FTID | Fake Tracking ID โ creating false shipping proof |
| FaaS | Fraud as a Service โ professional refund services |
| Synthetic ID | Fake identity built from mixed real/fabricated data |
| TRA | Transaction Risk Analysis โ SCA exemption based on merchant fraud rate |
| CNP | Card Not Present โ online/phone transactions (vs in-person) |
| CPN | Credit Privacy Number โ stolen SSN rebranded and sold as โlegalโ alternative |
| MCC | Merchant Category Code โ 4-digit code classifying the type of business |
| PCI DSS | Payment Card Industry Data Security Standard โ rules for handling card data |
| eCBSV | Electronic Consent Based SSN Verification โ SSAโs real-time SSN check |
| Tradeline | Credit account on a credit report โ used in piggybacking schemes |
| Bust-out | Running up all credit lines to max and disappearing |
| Magecart | Web skimmer attack โ malicious JS injected into checkout pages |
| POS | Point of Sale โ in-store payment terminal |
| RAM scraping | Extracting card data from POS terminal memory |
| Shimmer | Thin device inserted into chip reader to capture EMV data |
| Evilginx | MITM phishing proxy that captures session cookies, bypasses 2FA |
| Residential proxy | IP address from real home internet connection, hard to detect as proxy |
| SOCKS5 | Protocol-agnostic proxy supporting TCP/UDP โ preferred for carding |
| Tokenization | Replacing real card numbers with non-reversible substitutes |
| SIM Swap | Hijacking a phone number by tricking the carrier into transferring it to a new SIM โ intercepts all SMS-based 2FA |
| SS7 | Signaling System 7 โ 50-year-old telecom backbone protocol with zero authentication, exploited for SMS interception |
| Xanthorox AI | Self-hosted dark LLM ($300/mo) with 5 specialized models โ runs offline, no dependency on GPT/Claude/LLaMA |
| FraudGPT | Dark LLM for phishing/scam generation โ $200/mo to $1,700/yr |
| WormGPT | First major dark LLM (2023), now in v4 on Grok/Mixtral โ multiple variants still active |
| GhostGPT | Telegram-based dark LLM โ $50/week, rapid exploit development |
| KawaiiGPT | Free anime-themed dark LLM on GitHub โ 500+ users, community-maintained |
| ProKYC | Deepfake toolkit for KYC bypass โ face gen + document gen + liveness bypass ($629/yr) |
| Deep-Live-Cam | Real-time face swapping tool used for video call deepfakes |
| CAMARA API | Carrier-side SIM swap detection API โ checks swap status before authorizing transactions |
| Behavioral Biometrics | Authentication via typing/mouse/touch patterns โ 98.7% detection rate vs synthetic fraud |
| Scattered Spider | Threat group (UNC3944) using SIM swaps for enterprise attacks (M&S, MGM) |
Legal Consequences โ The Price Tag For Getting Caught
The prosecution rate is 1-4%. But when it lands, it lands hard. These arenโt slaps on the wrist. These are decades.
18 USC ยง1029 โ The Federal Carding Statute
โ๏ธ The law, the thresholds, and the sentencing math
18 U.S.C. ยง 1029 โ Fraud and Related Activity in Connection with Access Devices. This is the statute that covers credit card fraud, device fraud, and access device trafficking at the federal level.
Key thresholds:
- Possession of 15+ unauthorized access devices (cards, account numbers, PINs) triggers federal charges
- Maximum penalty: 10-20 years depending on offense type
- 18 USC ยง1028A (Aggravated Identity Theft) adds a mandatory 2-year consecutive sentence on top of any other sentence โ no parole, no reduction
- 18 USC ยง1344 (Bank Fraud) carries up to 30 years
- Loss amount directly impacts sentencing guidelines โ higher losses = more points = longer sentences
- Forfeiture provisions allow seizure of all proceeds and instruments of the crime
- Extraterritorial jurisdiction โ the statute applies even if the fraud occurred partially outside US borders
Major Prosecutions โ Case Studies
๐ Infraud Organization โ 'In Fraud We Trust'
The Infraud Organization was one of the largest cybercrime enterprises ever prosecuted. Founded in 2010 by Ukrainian Svyatoslav Bondarenko, it operated as a structured criminal organization with screening protocols, VIP member tiers, and its own motto: โIn Fraud We Trust.โ
The numbers:
- 10,901 members by March 2017
- $568 million in actual losses
- $2.2 billion in intended losses
- 4 million+ compromised payment cards
- 36 people indicted across 7 countries
- Operated on clearnet with invitation-only access
Key sentences:
- Sergey Medvedev (co-founder, ran escrow services) โ 10 years
- Valerian Chiochiu โ 10 years
- Aleksey Burkov (Cardplanet admin) โ 9 years
- Arnaldo Sanchez Torteya โ 8 years
- Andrii Kolpakov โ 7 years + $2.5M restitution
- Marko Leopard (abuse-immune hosting) โ 5 years
- John Telusma โ 4 years (14th member sentenced)
Medvedev was extradited from the US. Bondarenko (founder) โ believed to be in Russia. Russia exemption rule applied: Russian nationals operating from Russia remained largely untouchable. Andrey Novak was arrested by FSB but details remain murky.
The organization used FastPOS malware, had RICO conspiracy charges applied, and the takedown required coordination across 7 countries. The infrastructure included escrow services, review systems, and a reputation economy that mirrored legitimate marketplaces.
๐ FIN7 / Carbanak Group โ The Billion-Dollar Hacking Crew
FIN7 (also known as the Carbanak Group) has been active since 2015, targeting restaurants, gambling, and hospitality industries worldwide. They ran like a tech company โ complete with a fake security firm called Combi Security that recruited unwitting pen testers.
The damage:
- 20 million+ debit and credit cards stolen
- $1 billion+ in damages
- 6,500+ POS terminals compromised
- Victims across all 50 US states plus UK, Australia, and France
- Used JIRA project management to coordinate breach operations (yes, really โ they tracked hacking projects like sprints)
Key sentences:
- Fedir Hladyr (systems admin) โ 10 years
- Andrii Kolpakov (high-level manager, arrested in Lepe, Spain 2018) โ 7 years + $2.5M restitution
- Denys Iarmak (pen tester) โ 5 years
What made FIN7 different:
- Ran as a corporate structure with managers, developers, and pen testers
- Used Combi Security as a legitimate-looking front company to recruit developers
- Deployed Carbanak malware + phone call legitimization (social engineering calls to confirm fraudulent transactions)
- Conducted BadUSB attacks โ mailing physical USB drives disguised as Best Buy gift cards to targets
- Even after co-conspirators were arrested, operations continued โ new members stepped in
- Affiliated with ALPHV/BlackCat and Ryuk ransomware operations
The prosecution proved that even nation-state-level criminal enterprises can be partially dismantled โ but FIN7โs continued operations after arrests also proved that arresting individuals doesnโt kill the organization.
๐ Albert Gonzalez โ The Ghost in the Wire
Albert Gonzalez pulled off the largest credit card theft in history at the time โ and he did it while being a $75,000/year Secret Service informant.
The hit list:
- TJX Companies โ 90 million cards (some sources say 45.7M, TJX settled for $171.5M)
- Heartland Payment Systems โ 130 million cards, 250+ financial institutions affected
- BJโs Wholesale Club, OfficeMax, Barnes & Noble, 7-Eleven, Hannaford Bros โ all compromised
- 170 million+ cards total across all operations
The method:
- Wardriving โ literally driving around Miami with a laptop, finding vulnerable WiFi networks at retail stores
- Installed sniffer programs (written by co-conspirator Stephen Watt) on corporate networks
- Exfiltrated data to encrypted servers in Eastern Europe
- Part of Operation Firewall / ShadowCrew โ turned informant, then kept hacking while working with the feds
The sentence: 20 years (concurrent sentences for TJX and Heartland cases)
Forfeiture: $1.65 million in cash, a Miami condo, a BMW โ plus $25,000 fine
The absurdity: Gonzalez threw himself a $75,000 birthday party while under Secret Service employment. He claimed internet addiction and Asperger syndrome as mitigating factors. The judge was unimpressed.
Total costs to victims: TJX alone spent $200 million+ on breach remediation. Heartlandโs costs were comparable. The ripple effects across 250+ financial institutions took years to resolve.
The Bottom Line
๐ฐ The equation that explains everything
The math hasnโt changed:
- Startup cost: under $200
- Monthly overhead: $200-500
- Prosecution risk: 1-4%
- Potential return: unlimited
When the startup cost is less than a PS5 and the prosecution rate is a rounding error, the math writes itself.
โ๏ธ The arms race that never ends
| Device fingerprinting | Antidetect browsers |
| MFA / 2FA | OTP interception bots + SIM swapping |
| KYC verification | Deepfake tools ($30) |
| IP blocking | Residential proxies (100M+ IPs) |
| 3D Secure | Non-VBV BIN hunting + SCA exemptions |
| EMV chips | EMV bypass cloning |
| AVS address checks | Address stuffing + fullz with billing |
| AI fraud detection | AI-generated attacks |
| Machine learning models | Behavioral mimicry + cookie theft |
| CAPTCHAs | Solver services ($0.50/1000) |
| Email verification | Custom SMTP + aged domains |
| Velocity limits | Distributed bot networks |
| PCI DSS compliance | RAM scraping + supply chain attacks |
| Credit bureau checks | Synthetic identities (95% pass rate) |
| Cloudflare protection | CDP patching + stealth automation |
| Voice authentication | AI voice cloning (30 seconds of audio) |
| Liveness detection | Deep-Live-Cam + DoT bypass ($30-600) |
| Behavioral biometrics | Anti-detect browsers + cursor drift injection |
| Dark LLM takedowns | Xanthorox self-hosted architecture (offline, untraceable) |
Every defense creates a market for the evasion tool. Every lock sells a lockpick. The fraud ecosystem doesnโt just survive takedowns โ it uses them as marketing events. โRedLine got busted? Switch to Lumma. Hereโs a discount code.โ
The carding ecosystem has achieved permanent operation.
Itโs not a bug to fix. Itโs a feature of how digital payments work. The system was built for convenience first, security second. And convenience always wins because the people writing the checks want frictionless checkout, not Fort Knox at the payment terminal.
Understanding how it works is the first step to not being a victim โ and maybe, eventually, building payment systems that donโt rely on shared secrets (card numbers) that can be stolen and replayed.
This document is for educational and research purposes.
- The systems described here are illegal. The people who run them get caught eventually โ or more often, they get scammed by other criminals first. The biggest risk in carding isnโt the FBI. Itโs the ripper who takes your money and delivers nothing. Honor among thieves is a fairy tale.
Understanding how it works helps you protect yourself, detect fraud in your systems, and contribute to building better defenses. The criminals already know all of this. Now you do too.
!