Carding is the use of stolen credit or debit card information without authorization for making payments or for fraud.
It often comes with buying or selling card information on dark net sites or card stores.
Abisola Tanzako | Sep 03, 2025
Amidst the vast, ever-growing world of cybercrime, carding is often the most pervasive and harmful illicit enterprise.
Although everyone has heard of the term, few are aware of the crime’s scope, methods, and ramifications.
Statista reports that global losses from payment card fraud totaled $32 billion in 2021.
Meanwhile, a 2023 Federal Trade Commission (FTC) report revealed that credit card fraud was the most common type of identity theft in the U.S., accounting for over 416,582 reported cases that year alone.
This article examines the history and development of carding, the techniques employed by cybercriminals, the structure of underground marketplaces, law enforcement responses, and, importantly, how ordinary individuals and organizations can protect themselves from being victimized.
Carding is the illegal use of stolen credit card account information to buy goods or services, or sell the stolen information on its own.
It usually has several steps:
1. Capturing card data includes card numbers (PAN), CVV codes, expiration dates, and occasionally personal details such as addresses and phone numbers.
2. Card data testing: Criminals can test card data using small purchases or online verification platforms.
3. Buying and selling of information: The functional cards are then used to buy expensive things or sold to other potential offenders for another type of exploitation.
They include:
1. Card data harvesting: Carders obtain credit card information employing a variety of methods:
a. Phishing: Fake sites or emails that trick users into entering card information.
b. Skimming: Devices fitted on ATMs or fuel pumps to capture magnetic strip data.
c. Malware: Keyloggers or spy software on victim computers.
d. Data Breaches: Hacking company databases (e.g., large stores or banks).
e. Social Engineering: Trick customer care operators into spilling confidential data.
2. Verifying the cards: Carders use software called CC checkers to test whether a card is valid.
Some websites are used as “test sites,” where one makes a small, undetectable transaction (such as $1) to determine if the card is functional.
3. Use or sale of the data: Once a card has been tested, the data can be:
a. Used to make phony online purchases.
b. Tracked down, transferred into counterfeits with encoded magnetic strips, and used in actual stores.
c. Sold in bulk at carding shops or Telegram channels.
Carding has a robust underground support system. Here’s how it tends to operate:
1. Marketplaces: These are platforms where users trade card details, tools, and services.
They tend to operate similarly to eBay, featuring listings, escrow, and seller ratings. Popular past examples include:
a. Joker’s Stash (shut down in 2021)
b. Brian’s Club (aptly named after journalist Brian Krebs)
c. UniCC (shut down in 2022)
2. Tools of the trade: Carding forums sell or auction tools such as:
a. BIN lists: Bank Identification Numbers to hack into specific banks or classes of cards.
b. Credit Card Generators: Fake card numbers for testing purposes.
c. RATs (Remote Access Trojans): Malware that grants hackers remote computer access.
d. Fake ID templates and drop addresses are used to receive merchandise.
3. Educational content: Numerous forums offer guides or tutorials, some even sell “carding courses.”
Some of these topics might include:
a. How to use Tor and VPNs anonymously.
b. How to sell gift cards or cryptocurrencies for cash.
c. How to avoid two-factor authentication (2FA).
The impacts include:
1. Individuals: Most banks, however, offer zero-liability fraud protection, but the inconvenience can be significant.
Victims of carding can experience:
a. Unauthorized charges on their accounts
b. Freezing of accounts or temporary damage to credit scores.
c. Emotional distress and wasted time in challenging charges.
2. Businesses: Due to fraud, merchants are vulnerable to chargebacks, lost goods, and higher transaction fees.
Some also face reputational losses if they are perceived as insecure.
3. Financial systems: Carding facilitates more extensive criminal activity, including money laundering, terrorism financing, and identity theft.
The FBI and Interpol both identify financial cybercrime as a top-tier threat.
Law enforcement fights carding by:
1. International cooperation: Because carding is global, agencies like Interpol, Europol, the FBI, and individual country cybercrime offices work on a task force level.
Some of the significant takedowns are:
2. Undercover operations: The agents infiltrate forums posing as carders to gather information or track transactions.
3. Advanced tracking tools: Blockchain analysis tools track crypto transactions.
AI-based fraud detection systems enable financial institutions to identify suspicious activity.
Protection from carding includes:
Joker’s Stash was a massive carding store that operated between 2014 and 2021, selling over 40 million stolen credit/debit card accounts, with profits exceeding $1 billion.
It gained notoriety by selling data from major breaches like Wawa (30M cards) and Buca di Beppo.
The store used a credit score system to assess the quality of stolen information.
It was dismantled in 2021 as part of a global law enforcement operation aimed at seizing infrastructure.
Joker’s Stash exemplifies the scope and sophistication of carding operations on the dark web, underscoring the need for global cooperation against cybercrime.
Reporting carding sites (websites that sell stolen credit card information or facilitate credit card fraud) to the right authorities can help stop illegal activities and protect victims.
Here’s a clear step-by-step guide on how you can report them:
1. Gather Evidence: Before reporting, collect as much information as possible:
2. Report to local law enforcement
3. Report to national cybercrime agencies: Depending on your location, you can report to these agencies:
4. Report to domain registrars & hosting providers:
You can look up who hosts the website using Whois lookup and then report abuse to the hosting provider. Most providers shut down illegal sites quickly.
5. Report to search engines & browsers:
6. Report to financial institutions: If the site is using stolen cards or fake payment gateways, report it to:
7. Submit to anti-fraud & cybercrime hotlines:
Carding is not just a niche corner of the dark web; it is a multi-billion-dollar global threat that affects everyone, from individual cardholders to multinational banks.
With online transactions on the rise, cybercriminal methods are becoming more advanced, and carding remains a significant threat in the cyber world. But while the problem is vast, the tools for defence are equally powerful.
Awareness, strong digital hygiene, robust corporate security practices, and proactive collaboration with law enforcement are all vital weapons in the fight against financial cybercrime.
Whether you are a consumer checking your bank statement or a business storing thousands of customer profiles, vigilance is no longer optional; it’s essential.
Stay one step ahead, protect your data, monitor your accounts, and share this article to spread awareness about carding and online fraud.
Carding is the use of stolen credit or debit card information without authorization for making payments or for fraud.
It often comes with buying or selling card information on dark net sites or card stores.
They easily steal sensitive cardholder information through phishing, malware, ATM skimmers, data breaches, or social engineering.
Yes.
Carding is criminalized in most countries and can result in fines, imprisonment, and the seizure of assets for the perpetrators.