avatarFozle rabbi chowdhury✔️

Summary

The website content discusses the evolving tactics of scammers on the darknet who leverage stolen personal and financial information for credit card fraud, emphasizing a new approach that involves impersonating the cardholder from the moment the card is activated.

Abstract

The article titled "Darknet Dangers: How Scammers Leverage Stolen Info for Carding and Credit Card Fraud" delves into the sophisticated methods employed by cybercriminals to commit credit card fraud. It explains how scammers use terms like BINS, DUMPS, and VBV on the darknet to facilitate the illegal use of stolen credit card details. Despite advancements in security measures by credit card companies, scammers adapt by using high credit scored "fullz" (full sets of personal information) to create convincing identities. They use drops in the same location as the stolen identities to receive fraudulent goods, and they employ strategies such as using VPNs, Google Fi numbers, and fresh browser cookies to appear legitimate. The article also touches on how scammers cash out by either finding merchants willing to process transactions on compromised cards or by opening their own merchant accounts using services like Stripe, Square, or PayPal. The success of these methods is attributed to the abundance of personal data available due to frequent data breaches.

Opinions

  • The author suggests that the traditional methods of carding are becoming less effective due to increased security measures by credit card companies.
  • There is an opinion that scammers are adapting to these security measures by developing new, more sophisticated approaches to carding.
  • The article implies that the darknet marketplace is thriving with stolen personal information, making it easier for scammers to obtain "fullz" for fraudulent activities.
  • The author indicates that the success rate of these new scamming methods is high, with scammers reportedly achieving a 90% success rate.
  • There is a hint of irony in the suggestion that scammers are using legitimate services like Stripe, Square, and PayPal to facilitate their illegal activities.
  • The article conveys a sense of urgency for individuals to be aware of their personal information's vulnerability and the potential for it to be used in elaborate fraud schemes.

“Darknet Dangers: How Scammers Leverage Stolen Info for Carding and Credit Card Fraud”

BINS, DUMPS, VBV… These have been long discussed on the dark net, with the general goal being to take someone else's credit card info and spend it.

This, as we know, always results in the money being returned back to the card holder, and any purchases hacker succeed in making having a small window of opportunity to succeed. Over the last 5–7 years, credit card companies have cracked down on the wild west of carding, and as much as the carding underworld tries to keep up, releasing new and more complicated methods.

For an organization with teams dedicated to to convince people for their otp, app verification, it may still possible to card the gullible, but for the average person, the one man wolfpacks, it may be beneficial to rethink carding, and come at it from this new approach.

So the scammers started new approaches to succeed. Let me explain to you how they are doing it from a scammer point of view!

Carding hinges on convince both the card issuer and the website that you are the cardholder, but why wait until purchase to convince them when we can convince them from the day the card is activated?

Photo by Sander Sammy on Unsplash

First you’ll need high credit scored fulz (pros) and a drop in the same general location as them. A high credit score fullz can cost you around 50–180$. You can find them from darknet marketplaces.

The more info the fullz come with, the better. Driver license number is a necessity as you’ll either need a photo of theirs or to make your own.

When making your own, research the state that the pros is from to find out how many years the licenses are good for. For the expiration and issue date, use the date you’re making the license, then add however many years its good for and use their birthday on that year as the expiration date.

Get a paid VPN or socks, one that will be available to use for a long time, and pick one to have as your dedicated IP for this person.

Use google fi to get a number in their area code, and a browser with fresh cookies.

When everything above is ready apply for a card and wait until you get approved and the card is being delivered to your drop.

The best drops with be PO boxes or businesses, as listing them as the mailing address and your targets home address as the residential is more believable than a random other residential address in another state.#

Once the card is in your possession, and the number on file is yours, and the email, and drop, you can spend freely without jumping through all the hoops.

The most efficient way to cash out is to find someone with a merchant account that can charge your card until its maxed out. you’ll usually have to split the profits with them, but if you’ve got good pros, then this will still net you more money than trying to card a MacBook.

If you don't want to split the money, open your own merchant using stripe, square or PayPal and do it yourself.

This method is more dangerous and scammers are using it and getting 90% of success rate. As each day we are having data breach the darknet market is getting more and more Fullz in their hand!.

If you don't know some of the terms used in the post let me break it down for you.

Fullz: “Fullz” is a term used in the underground (darknet) communities to refer to financial information of an individual which includes the person’s full name, Social Security number, birth date, account numbers, and other personal data.

Drop: A “drop” refers to a location or an individual who acts as a receiver of goods purchased through fraudulent means. When cybercriminals use stolen credit card information to purchase goods, they require a safe location or individual to receive these goods, hence the term “drop.” They avoid using their real addresses to evade detection by law enforcement agencies.

Cybercrime
Credit Card Fraud
Dark Web Scams
Carding Techniques
Osint
Recommended from ReadMedium