REFERENCES
Fraudster Jargon
16 min
bin example bin refers to the bank identifier number at the start of debit and credit cards each network (visa, mastercard) and financial institution has its own bin that identifies its customers fraudsters often buy credit card numbers based on a bin that is close to them it is easier for them to impersonate someone from their region as they have a more intimate knowledge of the institutions and have an ip that is local to the victim in the example above, a fraudster is offering to sell credit cards based on their bin once a bin is selected, there is no need however to specify the country or network as they are already included in the bin btc example btc refers to bitcoin , the most popular cryptocurrency used on the darknet fraudsters take advantage of the anonymous nature of bitcoin to launder their funds before sending the stolen funds back into the banking system bitcoins are also used to empty out hacked bank accounts by transferring funds from these accounts to a bitcoin exchange these exchanges convert the dollars to bitcoins and vastly facilitate money laundering in the example above, the fraudster is offering a method to buy bitcoins with a stolen credit card without having to provide any identity documents this will limit the ability of law enforcement to find the fraudster should they investigate the credit card fraud bypass example bypass refers to methods that evade security measures such as 2 factor authentication (2fa) codes sent by sms, the security questions at the time of login and verification codes sent via sms any the time of any major changes made to the back accounts sometimes logic flaws in web applications result in bypasses becoming available that can be exploited by hackers in the example above, the fraudster is advertising a method to add a new payee to a hacked bank account the fraudster can then send the funds to another bank account/payee from which it may be easier to cashout (see below) cashout example when fraudsters have taken control of a bank account they need to transfer the funds to other accounts through which they can launder them cashout is the name of a mixture of techniques used to steal the funds the techniques include adding new payees and finding drop accounts (see further below) in the example above, the fraudster advertises a technique to transfer the funds out of a hacked bank account the fraudster claims to know a method that will help others who have failed to cashout in the past even when they were using some of the best practices such as using a vpn cvv example cvv (card verification value) refers to stolen financial information that is used to make online purchases also known as fullz , cvv information includes the name of the victim, the address, a card number, expiration date and the code at the back of the card some cvv also include more personal information such as mother maiden name and phone number in the example above, the fraudster is offering stolen credit cards from canada with the billing information of the card’s owner the credit cards are usually not reported stolen at the time of the sale drop example a drop refers to a physical space or a bank account that receives stolen goods or funds the advertiser most often does not provide or rent out physical drop space instead, fraudsters sell their method for selecting safe delivery addresses (ex abandoned house) or how to safely use one’s home or a post office mailbox to receive goods bought online with a stolen credit card the method commonly includes using fake identity cards and bribing a post office worker for drop bank accounts, fraudsters use bank accounts from individuals – known as mules – recruited through work at home job postings the individuals keep a share of the money they receive in their bank account and wire the rest to the fraudsters’ account, usually in a country where it is unlikely to be traced or seized organized crime groups are often behind the drop bank account services they charge a commission of about 50% for every transfer they launder the groups hire the mules and train them to feign ignorance if they are arrested in the example above, the fraudster is selling a technique to use a bank drop account this method likely involves hiring a bank drop account service and setting up a foreign bank account in a country where account seizures are difficult and rare dumps example dumps refers to the information stored on a card’s magnetic stripe this information includes the card owner’s name, credit card number and expiration date it is replicated on two tracks (track 1 or 101 and track 2 or 201) dumps are usually stolen using malware on point of sale systems (pos) every card that is used on those terminals is copied and transferred to a malicious actor in the example above, the fraudster is offering credit card dumps that were stolen from a point of sale system either in the usa, in canada or in some other country they promise that all their dumps will not be reported stolen at the time of sale emt example emt stands for an electronic money transfer most banks limit where an emt can be sent and have time out periods when adding new payees the methods enable fraudsters to send any amount to any account instantaneously in the example above, the fraudster is offering a method to send an emt to a bank account controlled by the fraudster load example load refers to sending money to an account under the control of a malicious actor the loaded account is used to launder the money by transferring it on to a cryptocurrency exchange or by cashing out the account in an atm in the example above, the fraudster is offering to send a payment of up to cad $14,000 to a bank account the fraudster is only responsible for the service and charges a fee for facilitating the transfer of the money logs example logs refer to bank credentials the credentials sometimes include the answers to the security questions asked at login in addition to the username and password the price for logs varies depending on the balance of the bank account in the example above, the fraudster is offering the credentials for a bank account with a balance of cad $600,000 the bank account is likely to be in british columbia, ontario, or perhaps alberta ship example ship refers to the shipment of a physical item to an address controlled by the carder fraudsters use social engineering on call center employees to add new addresses to online accounts or by modifying databases through hacks in the example above, the fraudster is offering a method to force a well known retailer to send a purchase to a different address than the credit card’s billing address related articles