Money transfer carding
Currently, there are more and more types of various fraud. Criminals and thieves do not sleep - every day they invent hundreds of new ways to deceive ordinary people who work honestly and get paid for their work. Increasingly, in the news, we see reports of crimes on the Internet.
Carding has become one of the fraudulent methods.
What is carding
Carding is one of the methods of carding money transfer. Criminals interact with an ordinary user's card, gain access to his data and steal money from the account. They have plenty of ways to use the card. They can make small payments in online stores, withdraw money from ATMs, order goods at fake addresses or for their intermediaries, as well as order certificates for certain amounts and subsequently spend them under a different name. The main problem is that calculating the carder is very difficult. They very carefully cover their tracks. It is even more difficult to prove to the mind of the carder. Even if it was possible to understand that this or that person was behind the abduction, it is necessary to provide strong evidence. And a criminal investigation is started only if the carder has stolen a large sum of money.
Fraudsters can use different resources to obtain the user's payment information - they can be hacked bank servers, hacked websites of online stores, special virus software that penetrates directly into a computer or mobile phone, giving out the user's bank information. They receive all the information they need - name and surname, card number, code on the back of the card, right up to the signature. The only thing that can limit their activities is the limit on the amount and the need to confirm the transaction. Most banks have already installed security technologies and transaction confirmation mechanisms, which require confirmation of the payment using an SMS authentication system. In this case, the SMS will be sent to the real card holder. If the fraudster is unable to intercept the SMS, the transaction will not be completed and his Internet address may be recorded. Compared to the past decade, security measures have been strengthened significantly. Banks are constantly complicating their verification mechanisms, as carders have caused enormous damage to their operations and the economy of the entire country over the past ten years. Material losses were in the millions. In some countries, the damage still significantly affects the country's economy.
A group of carders even managed to hack into the global payment system and steal $ 9 million from it. The amount is simply inconceivable.
Ria's transfer system also suffered. Carding ria money transfer took the money of thousands of people.
How carders carding PayPal
Many carders have chosen such a large network as PayPal as their main money transfer carding method of theft. They literally intercepted billing information. They found hacked bank accounts or stole cards. In Europe and America, bank accounts are often linked to a PayPal account. All that remained was to open it and start spending the victim's money. Carders do not make high-profile purchases for large amounts - this will immediately raise suspicion. They prefer to use small amounts, the disappearance of which may not be noticeable at first glance. Neither the cardholder nor the bank is suspicious of this.
In order to protect themselves, carders use intermediaries. They issue parcels and transfers to their address. Intermediaries withdraw money from banks and ATMs. If necessary, intermediaries send goods and parcels to carders, money to the specified address. However, the carder will never give his real address. Minimal contact between the intermediary and the carder will lead to the fact that even if the deception is revealed by the police, there will be no traces. Nothing can point to the carder - since he turned the scam with someone else's hands.
Over time, PayPal has learned to recognize such manipulations. Especially American PayPal. But carders adapt to the restrictions in any way - nothing is impossible for them.
Where carders find victims
Carders have their own communities and groups on the Internet. They have closed channels on social networks, messengers, where they communicate, share findings and exchange experiences. On the same sites, they even sell entire courses and training programs, which describe the most promising schemes for theft. Of course, you can't get them for free. The cost depends on how cool the carder sells them - they also have their own mentors and gurus. Sometimes, the sale of courses and materials brings carders even more income than the main activity.
The carder can use the stolen card until the bank that issued it blocks it. As soon as the owner discovers that money is leaving the card or the bank notices this earlier, all funds on the card will be frozen and the carder will no longer be able to use it. How much he managed to spend, so much will remain for him. In addition to online stores, carders can use self-service terminals. They do not require confirmation
using a pin code, especially if the card is contactless. These are often found in grocery stores, gas stations, etc.
As a measure of protection against carding, some use the owner's signature. On the back of the card there is always the cardholder's signature - it must match the one that the paying person puts on the check. Otherwise, the fraud will be immediately recognized and the police will be called in to investigate. Some countries and states require you to present identification documents when paying by card. But such actions are not very common, as many consider it to be a violation of their personal boundaries.
Some banks block card transactions if they were made in another country - also an example of security measures against carding.
What data and how should a carder receive for transactions
To make transactions, the carder must have the user's personal data, card expiration date, CVV number and code. Without it, you cannot confirm transactions on most sites. If the carder cannot independently obtain the card data, he can attract people to his side who will help him with this. Often, waiters in large cafes and restaurants, cashiers in supermarkets and shops become accomplices. Tracking programs can get into the computer while downloading some programs and multimedia files. Fraudsters can introduce themselves as employees of the bank in which the user's card is registered and ask for confirmation of data or operations for debiting funds.
Large payment systems such as VISA, MasterCard use additional technologies for security - 3D Secure. This technology involves obtaining an additional verification code, which the owner can receive using the phone - in an SMS or call, at an ATM or a bank branch. Much depends on the transaction itself, its size and purpose.
What is skimming
Skimming is a relatively new concept in the field of carding. The method came from the name of the device that cybercriminals use to cheat. The skimmer reads user data. As a source of information, he can choose, for example, the magnetic track of a plastic card.
Types of skimming devices:
• Reading the magnetic track.
• Video cameras at ATMs.
• Malicious code in ATMs.
Devices that read the magnetic stripe can often be installed in the bank branch itself. They are placed at the entrance to the card reader. It has a magnetic head, a signal converter and amplifier, memory and an adapter to connect the device to a computer. When a person is in the range of the device, he quickly captures the data from the magnetic strip of the card, converts it and stores it in memory so that later the thief can view it on a computer. Such devices are usually very small and portable. The card details will be copied and used each time to confirm the transaction.
Cameras are installed on ATMs so that the keyboard and the data entered on it are visible. Most often it is disguised as a visor or advertisement. Usually, carders install it in conjunction with skimmers in order to accurately get the pin code. This allows the card to be used not only for online transactions, but also for withdrawing cash from ATMs using a fake card.
The virus is most often embedded in ATMs of small, little-known cards. An ordinary person will never understand that there is a virus in an ATM, since the entire operation takes place without any special features. The virus copies all the information, and after the operation is completed, the scammers copy it and use it further. This method is rare compared to the other two.
All devices have their own autonomous power source - mini-accumulators and batteries. They are carefully camouflaged and difficult to find.
Information from these devices is copied in a matter of seconds and in a minute the fraudster can completely empty the card.
How carders manage to avoid punishment so easily
The police gloomily throw up their hands due to their inability to fight the carders. The capabilities of the modern Internet allow them to carefully disguise themselves and it is not possible to track their actions. They literally leave no trace. The logical chain in this case cannot serve as a worthy argument for starting an investigation and imposing punishment. You can only catch a carder if he makes a mistake. This happens most often with newcomers - they forget to delete their correspondence history or find data on other people's cards and accounts on their devices. They can catch a witness and turn him to their side - he can give more detailed information about the carder and help to capture him. But most often carders themselves pretend to be intermediaries and avoid punishment by agreeing to cooperate with the investigation.
Use protective measures to avoid carding.
Always pay for your purchases and expenses yourself. Do not give your card into the hands of strangers - for example, waiters or cashier. am. Make sure the card is attached to the tested device. If it seems suspicious to you, clarify whether it is real or refuse to pay by card altogether.
When using an ATM, cover the data you enter with your hand. Look at the ATM for strange signs, unusual placement of items, overly bright advertisements, etc.
Remember what your bank's ATM looks like, and if you see an ATM that looks different, do not make any transactions in it. As a rule, ATMs of the same bank look almost the same.
Drive in the pin code quickly so that your movements are hard to catch.