Scam Guide
Scam Guide
bank
drop accounts, and for setting up payment processors on fake online stores.
This
could also be used for many different things such as conducting an ATO
(Account-
name, and much more. Fullz are extremely valuable information to us and in
fact a
Checks, Credit Reports, Credit Scores, Full Names, Addresses, Social Security
Number (SSN), Date of Birth (DOB), Driver’s License Numbers, and more.
CVV: This can either be someone’s full credit card details, or someone’s full
debit
card details. CVV is simply a fraud slang for credit/debit card details, there’s
not
such as background or credit reports that can be used for various purposes
such as
CVV DUMPS: A credit card dump, is an unauthorized digital copy of all the
the intention of illegally making a fake credit card that can be used by
DUMPS SERVICE CODE: Many fraudsters think that there are only 2 types of
dumps, 101 and 201. The truth is there are many other types of dumps.
Carders
usually work with either 101 or 201 but the majority will prefer 101. This is
known
as the SERVICE CODE of a dump. The service code contains 3 characters and
you
can find a dump service code just by looking at a dump, regardless of the
fact if it
has both TRACK1+TRACK2 or just TRACK2. Example, let’s say we’re looking
at the
101, which is located right after the expiration date of the card, which in this
case
is 1402 (FEB 2014). The value of the service code determines where the
cards are
- 2xx: Worldwide use, does have a smart chip and required to use smart chip
if the
- 5xx: National use, a list of regions can be allowed by the bank (often called
region
locks).
- 6xx: National use, a list of regions can be allowed by the bank but required
to use
- 7xx: Only useable according to what has been agreed with the bank
- xx2: Can be used to buy goods or pay a service, cannot retrieve cash, PIN
not
required.
- xx5: Can be used to buy goods or pay a service, cannot retrieve cash. PIN
required
and often isn’t even physically present on the card by virtue of a narrower
Track 1 has a higher bit density, is the only track that may contain alphabetic
text,
and hence is the only track that contains the cardholder’s name. The
information
The “A” is only used by the bank itself, so we do not need to pay much
attention to
it. The “B” is where the holder’s financial information is stored, the most
%B5XXXXXXXXXXXXXX2^GEORGENULL/
MAX^110310100000000100000000300000
0?;
the number printed on the front of the card, but not always.
• ^ is the separator
• / is the separator
• ^ another separator
• ? is the end
So now that you’ve seen the information that is stored in track 1 and the
letter
containers, you should have already figured out that credit card dumps are
mainly
Track 2 data is used by ATMs, physical payment processors and in any online
website. There are a lot of components in this track, the layout is shown
below.
With a more in-depth examination of the data, you can see how a credit card
number and holder’s main information is stored into the track 2 data.
• ; : Start Sentinel
credit card number you always see printed on the front of the plastic.
card verification value and the last 3 digits on the back of the card aka the
CSC/CVV2 code.
completely useless.
Most carders and hackers, will only seek out the TR1 and TR2 data. That’s
where
address and credit card/bank details, in one central place. It also provides a
from any person or store across the globe. Such examples of web wallets are
PayPal, Google Wallet, and Venmo. We can use such wallets for many
purposes
swipe credit and debit card information when bank customers slip their cards
into
the machines to pull out money. Skimmers have been around for years, of
course,
but fraudsters are constantly improving them. Card skimming accounts for
more
than 80 percent of ATM fraud. Some sophisticated skimmers are even able to
EMBOSSER: A device that stamps the cards to produce the raised lettering
where
into actual physical blank cards or gift cards (and driver’s licenses, student
IDs,
etc..). If you want to use blank white cards, you will need a printer for the
card
POS (POINT-OF-SALE) SYSTEM: This is the time and place where a retail
owed by the customer, indicates that amount, may prepare an invoice for
the
customer (which may be a cash register printout), and indicates the options
for the
After receiving payment, the merchant may issue a receipt for the
transaction.
and debit transactions in batches. ACH credit transfers include direct deposit,
payroll and vendor payments. Moving money and information from one bank
or debit. This is used a lot by fraudsters to siphon money out of the bank
accounts
credit cards and debit cards for merchant acquiring banks. They are usually
broken
down into two types: front-end and back-end. Front-end processors have
connections to various card associations and supply authorization and
settlement
settlements from front-end processors and, via The Federal Reserve Bank for
example, move the money from the issuing bank to the merchant bank. In an
operation that will usually take a few seconds, the payment processor will
both
or card association for verification, and also carry out a series of anti-fraud
country of issue and its previous payment history, are also used to gauge the
received confirmation that the credit card details have been verified, the
information will be relayed back via the payment gateway to the merchant,
who
who will then decline the transaction. Such examples of payment processors
are
online retailers, or traditional brick and mortar stores. The payment gateway
may
2. If the order is via a website, the customer’s web browser encrypts the
In between other methods, this may be done via SSL encryption. The
payment gateway may allot transaction data to be sent directly from the
website.
gateway.
4. The payment gateway converts the message from XML to ISO 8583 or a
variant message format and then forwards the transaction information to the
Card was used, then the card association also acts as the issuing bank and
6. The credit card issuing bank receives the authorization request, verifies
the
credit or debit available and then sends a response back to the processor
the fate of the authorization request, the response code is also used to
define the reason why the transaction failed (e.g. insufficient funds, or bank
link not available). Meanwhile, the credit card issuer holds an authorization
associated with that merchant and consumer for the approved amount. This
can impact the consumer’s ability to spend further (because it reduces the
account).
website (or whatever interface was used to process the payment) where it is
DUNS: Apple D-U-N-S, which stands for data universal numbering system, is
used to maintain up-to-date and timely information on more than hundreds
of millions global businesses. used to identify your organization when
registering for sites such as FedConnect and SAM.gov. If you are unsure of
what your DUNS number is, please ask your senior management for
assistance, or locate the number on your SAM.gov account.
stand in for the numeric, and hard to remember, IP address of a website. This
allows the website visitors to find and return to a web page more easily. It
also
remember and come to, hopefully leading to conversions for the web page.
The
an actual physical store in-person and using pre-made credit cards with
dumps
TR1+TR2 data.
reaping: Term used when referring to using someone else’s CVV details to
store using DUMPS. Example, we can CARD a cellphone using someone else’s
details through Amazon, or CARD a $400 belt at a Gucci Store using dumps
that
were punched into a blank card using devices specifically made for such
purposes.
CARD HOLDER: The owner of the CVV that we’re using to conduct the
fraudulent
transaction.
card and the shipping address provided to the website are different.
AVS & NON-AVS: AVS stands for Address Verification System. This is a system
used
to verify the address of a person claiming to own a credit card. The system
will
check the billing address of the credit card provided by the user with the
address
on file at the credit card company. AVS is used by mostly all merchants in the
US,
Canada, and UK. Because AVS only verifies the numeric portion of the
address,
cardholder’s billing address. For example, if the address is 101 Main Street,
Highland, CA 92346, United States, AVS will check 101 and 92346.
Cardholders
may receive false negatives, or partial declines for AVS from e-commerce
verification systems, which may require manual overrides, voice
authorization, or
reprogramming of the AVS entries by the card issuing bank. Cardholders with
a
bank that does not support AVS may receive an error from Internet stores
due to
lack of data. All countries besides UK, US & Canada, are NON-AVS.
security layer for online credit and debit card transactions. VBV stands for
Verified
by Visa. This is used to validate the card holder’s identity and prevent
fraudulent
holder directly or by analyzing data behind the scenes to see if the purchase
fits
the usual payment behavior. When a website and a card have Verified by
Visa, a
message box pops up on screen after you have entered the Visa card details.
You
are then asked to identify yourself with your Verified by Visa password or a
code
sent to your phone. What you need to do at this stage varies but your bank
will tell
you about the method they use and what they expect from you
holder an additional layer of online shopping security. Only the card holder
and
the financial institution know what the code is, merchants are not able to see
it.
AMERICAN EXPRESS SAFEKEY: This is one of the least used security measures
around, and it is not even available in the United States. However, it is the
same
the checkout in any store, and most stores support NFC. Apple Pay for
example,
uses NFC.
the Social Security number has become the national identification number
for
generally require an SSN to set up bank accounts, credit cards, and loans-
partly
because they assume that no one except the person it was issued to knows
it.
MMN: Mother’s Maiden Name. This is the name of someone’s mother BEFORE
they got married, that is, her name with her original family name (or
“surname”),
the name she used when she was a girl and a young woman. “Maiden” here
means
takes the family name of her husband’s family, so her name changes.
Example, let
us say your mother’s name was Mary and she was born into the Smith family.
Her
maiden name would be “Mary Smith”. Then, let us say, she married your
father,
whose name was Tom Jones. When she married him, she became Mary Jones.
That is her married name, but her maiden name will always be Mary Smith.
This is
high value products, as most banks ask this as a security question for
making any
DOB: Date of Birth. This is one of the most important pieces of information
you
can get on your victim. The reason for that because with the date of birth,
full
name and hometown, you can easily find the person’s SSN. And also because
you
need this information if the bank ever asks you for it.
MAIL DROP: A mail drop is a location where you are able to freely receive
illegal
products that were either reaped, or drugs. You never want to use your own
house
for these purposes as it will bring a lot of headache for you in the future.
With a
mail drop, you can use it let’s say a month, and never show your face there
again.
This will make extremely hard for any law enforcement official to track you
down
BIN: Bank Identification Number. This is the first four to six numbers that
appear
issuing the card. The BIN is key in the process of matching transactions to
the
issuer of the charge card. This numbering system also applies to charge
cards, gift
cards, debit cards, prepaid cards and even electronic benefit cards. This
numbering
data, such as the address of the institution issuing the card and the address
of the
cardholder. The first digit of the BIN specifies the Major Industry Identifier,
such as
airline, banking or travel, and the next five digits specify the issuing
institution or
bank. For example, the MII for a Visa credit card starts with a 4. The BIN
helps
the first four to six digits of the card, the online retailer can detect which
institution issued the customer’s card, the card brand (such as Visa or
MasterCard), the card level (such as corporate or platinum), the card type
(such as
debit card or a credit card), and the issuing bank country. BINs can be check
https://www.bincodes.com/bin-checker/
http://binchecker.com/
https://bincheck.org/
https://binlists.com/
PROXY SERVER: Every time you reach out to a website or connect with
anyone
you’re connecting with. This is so that the other end knows how to send
stands for Internet Protocol and you can check yours by going to whoer.net.
others online wouldn’t be able to reach you. It is how you connect to the
world.
• Your IP address identifies where you are in the world, sometimes to the
street level.
• It ultimately ties your name and home address to your IP address, because
A proxy lets you go online under a different IP address identity. You don’t
change
your Internet provider; you simply get a proxy server. A proxy server is a
computer
on the web that redirects your web browsing activity. Here’s what that
means.
your Internet Service Provider (ISP) makes the request for you and connects
before.
• While using a proxy, your Internet request goes from your computer to your
ISP as usual, but then gets sent to the proxy server, and then to the
website/destination. Along the way, the proxy uses the IP address you chose
Proxy servers are commonly used by identity thieves to fake their location to
the
cardholder’s billing address. The reason for that is because some websites
will not
purpose of storing your dirty funds. Once you open them, you can decide
whether
you wish to withdraw the funds directly from the account as cash by going to
the
bank ATM, or possibly clean them with specific methods, and only after
cleaning
them, cashing them out (my preferred method and much safer). It is
important to
mention also, that all bank drop accounts, are opened ONLY with the
information
funds ever being traced back to your real identity. To open one of these bank
drop
with a transaction. Where is that IP address, and how does that location
relate to
although there are legitimate uses of proxies, fraudsters are well known to
use
proxies. Detecting proxies comes with two challenges. The first is how to
recognize
high risk in and of itself. To consider how best to address these challenges,
it’s
risk. Fraud detection uses transaction data as the basis for this thinking and
risk
assessment. Using this data and analysis, they’re able to gain insight into the
kind
Anything above 0.80, you should move on and look for another proxy as that
will
lead to a declined transaction 70-80% of the time. You can check your proxy
score
on the websites below. Ideally you want the lowest proxy score that you can
find, I
• https://getipintel.net/
• https://www.maxmind.com/en/request-service-trial?service_minfraud=1
(FREE TRIAL)
check this kind of stuff, send me a PM and I will send you an invite)
IBAN: An IBAN, or International Bank Account Number, is a unique code that
identifies a bank account for international payments. IBANs are used to
process financial transactions between institutions in different countries.
•Country code: Two letters that represent the country where the bank is
located
Amount
that are given high fraud scores (over 300), are placed under manual
verification
by an agent, who will decide if they contact the cardholder or let it through.
Scores
over 500 with auto-decline, will block the card and an agent will immediately
contact the cardholder. Some banks have different criterias but certain
things that
For example, a $15.56 charge in the cardholder’s local Walmart will not
trigger
RISK SCORE: This is a percentage given to each transaction that ranges from
0.00%
to 100.00%. The factors that determine this score are whether an IP address,
email, device and proxy used are high risk or low risk. This is determined by
fraud
systems that websites have in place such as MaxMind, which establishes the
network connection. You can for example, be using a Linux machine, and
connect
is because these RDPs are from a REAL PERSON, with a REAL LOCATION/IP,
and
your success rate. They will also be discussed in more detail further in this
guide.
SOCKS5: This is a proxy server that allows us to fake our real location. This is
very
good if let’s say, we have a credit card with a billing address in Miami, we
can use a
SOCKS5 near the billing address in Miami so that the website we are
conducting
the fraudulent transaction in doesn’t raise our fraud score because the
transaction
is being conducted in another state/far away from the credit card’s billing
address
computer. They allow you to run an operating system using an app window
on
your desktop that behaves like a full, separate computer. The most used
software
for virtual machines are respectively, Virtual Box and VMWare. Unfortunately,
they are not as reliable as using an RDP, but they are very good to CONNECT
to an
still not reliable enough in the aspect of leaving no traces, as the virtual
machine in
these operating systems, will leak information to the host OS, and
consequently
caught, and have all of your assets seized by the government. Unfortunately,
the
United States doesn’t take these things lightly, and they will do everything
they
can to persecute cybercriminals and put them in jail, which most of the time
are
given sentences of over 10 years in jail for minor offenses. They are the
biggest
and most powerful nation in the entire world, and their resources are
absolutely
and to make sure our hard work will never be taken from us by such
governments.
Even if you do not live in the United States, you should still very much worry
about
them as they are involved in pretty much every single international issue
that
I have written an extensive guide over 100 pages long on just the topic of
OPSEC
and creating your perfect fraud expert setup for maximum success, and
security
goes, as there are many things to keep in mind and I wouldn’t be able to fit
everything into only one chapter, that’s the reason I made a guide
specifically for
the purpose of explaining privacy and security. However, I will give you a
perfect
First of all, I want to introduce you to the absolute best operating system
available
today when it comes to security and privacy. It is called Qubes OS. This
operating
You can run different OSs in Qubes as different virtual machines. For
example, we
have a virtual machine for the Whonix OS, another for Fedora, Debian, and
those
are only the VMs that come pre-installed with the OS. You can install Kali
Linux in
Qubes, Windows, and all kinds of different OSs. If one of these VMs ever get
compromised, we are fine. We simply delete the VM and create a new one. If
you
want to learn more about the Qubes OS, then navigate to the link below, it is
full
of tutorials and even videos about the OS so you can get a good look at what
we’ll
be working with.
https://www.qubes-os.org/doc/
Qubes has a very small compatibility range and so will not work with most
for you in the future, trust me on that. Below are the laptops I recommend,
from
best (most expensive) to worst (cheapest). All of them work perfectly with
the
current Qubes 4.0. All of the prices were taken from Amazon at the time of
this
amazing, and if you have money to buy it, then do it. It’s totally worth it, as it
will
last you for many years to come. This was voted the best business laptop at
CES
2018. The performance of this laptop is absolutely incredible and will make
your
work incredibly smooth and easy. This is the laptop that I currently use and
the
LENOVO THINKPAD T460P ($1350): Also works perfectly with Qubes 4.0 and
the
performance is amazing. The one above is much better, but if you want to
get this
LENOVO THINKPAD T450S ($530): This laptop is also very good, although the
performance of the above one is much better, this one does boast some
impressive features. You can get it on Amazon for very cheap. It comes with
i7
processor, 8GB RAM, 256GB SSD (you may want to upgrade the SSD). I have
tested
this computer with Qubes 4.0 and it also works perfectly and smooth.
LENOVO THINKPAD X230 ($235): This is a last resort type of laptop, and you
should only get it if you’re really low on money. The performance will be
terrible,
but definitely usable. Qubes 4.0 runs perfectly with it, and everything works
exactly as it should, just really slow due to the old processor and low
memory. If
you’re thinking of buying this laptop, keep in mind you will most likely need
to
Having a perfect setup for your fraudulent activities, is one of the most
important
aspects of being successful in this business. If you have a bad setup, you will
most
likely run into problems, and declined transactions on a daily basis. As I have
for our purposes, and is the OS I use for my fraudulent activities, in fact it is
THE
ONLY ONE I use. Not only will Qubes protect you to the maximum extent
possible,
will look like just another shopper looking for something expensive to buy,
which
in turn will make us extremely successful. Below I will outline the perfect
setup for
Qubes OS. All of the setup outlined below is explained in much more detail
on my
OPSEC guide, so I would highly recommend you get that one as well.
NetVM.
• Once we have fully anonymized our MAC address, we will route our NetVM
to the FirewallVM. From there, we will route the traffic to the VPN VM.
• Now we need to setup our VPN VM to route all traffic to the VPN tunnel and
restrict all non-VPN connections with iptables rules. If you are running Qubes
(https://www.reddit.com/r/Qubes/comments/6h4ue2/guide_setting_up_a_
into any problems. Check everything is good and that there are no leaks in
conducting tests. Even with webRTC enabled, you should have 0 leaks
• Once we have setup our VPN VM, we will create another VPN VM and route
our traffic to the 2nd VPN tunnel. This is extremely important, as it will add
an
amazing extra layer of security to your setup. You should use 2 different VPN
NordVPN, TorGuard, and Mullvad. You should follow the same steps as the
1st VPN VM to create the 2nd. Check everything is good and that there are
no
conducting tests. Even with webRTC enabled, you should have 0 leaks
From the 2nd VPN VM, we will send our traffic to our Tor network VM (usually
called sys-whonix).
In sys-whonix, we will edit the torrc configuration file and make sure we are
using obfs4 bridges to connect to it. This will make much harder for anyone
snooping on our traffic to see we are using Tor (although I seriously doubt
(https://www.whonix.org/wiki/Bridges).
Now that we have our network completely set up, we will move on to
create a new AppVM, name it whatever you so wish, use the Template
WHONIX-WS for it, give it network access through sys-whonix, and open a
new Terminal on it. Once you have done that, run the following command on
That command will install a program called “remmina” which will enable us
For the RDP, I recommend you purchase a Windows 7 one from xDedic (if
you don’t have an account there, send me a message and I will sell you an
RDP from there, or you can also purchase an invite to the website from me if
you so prefer, that way you won’t rely on me or anyone else to purchase
your RDPs, you can simply login the website and purchase them yourself).
xDedic is the best website for RDPs, and the reason for that is because they
sell clean hacked RDPs, that belong to an actual real person, with a real
digital fingerprint, and with a real IP/real location. The reason we want this is
so that the website we are conducting our work in, doesn’t realize we are a
fraudster and declines our transaction. I prefer not to use Socks5 as they are
far from being reliable as RDPs are, and PLEASE, do not use a Socks5 in
conjunction with one of these RDPs, as that would be dumb, and will mess up
Once you have all of this setup, all you need to do is pick a website that you
want to card, get a CVV close to the zip code of your RDP (some websites will
decline your transaction if you are placing an order too far away from the
CVVs billing/shipping address) and work your magic! This “magic” will vary
from website to website, and one thing you need to keep in mind is that
most websites will require you to call the card holder’s bank using a burner
spoofed to the card holder’s number to change his billing address. The
United States and United Kingdom, all have AVS systems in place that will
check your billing address with the card holder’s bank. If you use a shipping
address that differs from the billing address, especially a shipping address
too far from the card holder’s address, you will get a declined transaction.
You could still get approved if the shipping address you are using is not too
far from the card holder’s billing address (anything 30-50 miles away is
already too much), but it’s always better to call the bank and do a change of
billing.
• If you are purchasing anything above $600 dollars, chances are you will
need
stands for Account-Take-Over. This is a process in which you will call the
bank, change the card holder’s phone number, then wait 5-7 days and call
again to change his billing address, you can also add a temporary address if
allow temporary addresses unfortunately, Chase is the best one for this). The
reason for this is because most websites will require you to put the card
holder’s billing phone number on check out and for orders above $600, they
will call the card holder to confirm the transaction. Not to mention that the
bank may find all of this very suspicious, especially if the card holder hasn’t
done a purchase as big as that in months and will ring them to confirm. And,
there is also the possibility of the card holder having what is known as “text
updates/alerts” for charges that big on his account. All of those things may
• I also recommend you use a .edu, .org or .gov email with the card holder’s
significantly lower your fraud score and will help you a lot in getting
approved.
• Make sure you act like a real shopper. Wait 2-3 days before purchasing and
during that meantime, put products in your cart, look around the website,
make it look LEGIT. Make it look like you care about how much you’re
spending, because people do care about that. If you register an account, and
then right off the bat purchase a laptop worth $1500, you can’t expect to be
I realize most people will not go as far as the setup above requires them. And
although that is very unfortunate, it is a fact that I can’t neglect. Below I will
backdoors and are just not safe from a privacy standpoint, proceed with
caution
create a hidden encrypted volume with at least 30GB of space, then mount
that
that you are able to complete the next step. Next, download MagicISO
into a bootable media on a blank CD using WinISO. Then mount the .iso into
the
Then, create a new virtual machine on Virtual Box and name it whatever you
so
wish. Go to settings and on “System” use at least 2GB RAM for the base
memory.
On boot order use HDD and CD/DVD. Then, go to storage and add your
virtual
NAT and refresh the MAC address (refresh every single time you boot the
Once you have done all that, move the .vdi files into the hidden encrypted
change the MAC address every time you connect to the internet
temporary data.
Then every time you start the machine, go to the Windows 7 CMD, and type
these
commands:
ipconfig /release
ipconfig /renew
ipconfig /flushdns
Once you have completed all these steps, download the VPN of your choice
and
install it on your newly created virtual machine. You can also get another VPN
and
install it on your main OS, that way you have 2 VPNs for added security. I
that can’t be traced back to you, and only pay with clean BTCs.
From that virtual machine, connect to an RDP by going to the Start menu and
appears in the search results, click on it. Next, enter the IP address of the
target
computer and press connect. Enter the login credentials, click OK and you
should
Now that you have your OPSEC set up, I will teach you about how to card
successfully.
else’s credit/debit card details. However, there is A LOT more to it. You can’t
simply get someone’s CVV details and go on a shopping spree, that will not
work
and will only lead to burnt cards & declined transactions. There are many
things
you need to keep in mind and in this chapter I will go into detail on how
exactly all
of it works.
The main goal of a carder, is to cheat websites into thinking he’s the legit
owner of
a CVV. This is the most important aspect of reaping, because if you can’t do
that,
nothing else will work. To be able to cheat the website, there are a couple of
on xDedic, again, if you don’t have an account there just send me a message
and we can work something out). Windows 7 is the 2nd most used operating
using it. We want to appear as generic as possible to the website, and never
a legit user, which will tell the website that we are a real person, from a real
location, with a real computer, and not a fraudster using a proxy server in a
virtual machine.
our hacked RDP. The reason for that is because again, we want to appear as
generic as possible to the website, and those browsers are currently the
ipleak.net, then conduct tests to see if your real location is leaking. Then
location and the system time, if that happens then simply change the system
time to match your IP location, and do a re-test, it should then say 100% in
your score. You should do this every time you wish to conduct a fraudulent
transaction.
• Now we get a CVV that is close to the CITY and STATE that our RDP is
located
in. Example, if we have an RDP located in MIAMI FL, we want a CVV from
MIAMI FL. The level of the CVV you need to get will depend much on the
value of the transaction that you want to conduct. A card that would be used
to purchase movie tickets/food delivery online, is not the same card you
would use to purchase a $1000 laptop. However, a card that can be used to
delivery purchase transaction, but you would never use a card like that for
• If you are reaping something worth $500 or more, you will need to get a
free
.edu email registered in the name of the CVV holder by navigating to the
drop-down menu (this changes from time to time so Cuesta may not work for
you, if it doesn’t just try other colleges and one of them should eventually
work). From there you apply to the college, and for the Social Security
from that you just need the SSN which will look something like this 427-
70XXXX. Just substitute the XXXX for any numbers and that should do fine.
Fill
out all the rest with the fake info (phone, address, etc…), just provide the
correct sex. If you have his SSN, then you can use that as well and it will be a
HUGE plus. For the email, you can use disroot.org, navigate to their website,
create a new account with the CVV holder’s name and use it for registering
for the college. You will soon receive on that email your newly created
• If the .edu email method doesn’t seem to be working for you, then you can
simply card a domain with ipage.com and use a .org email that the domain
provider will let you generate. You can also generate as many .org emails as
you wish with your domain, just make the domain name something legit such
the domain, follow the same steps outlined above and register with the
domain provider with a yahoo email in the name of the CVV holder.
• Once you got the email ready, then you are finally ready to conduct the
fraudulent transaction. Navigate to the website you want to card. If you are
reaping something worth $200 or more, then you should first create an
account on the website using the .edu/.org email, browse the website to look
like a real buyer, wait 2 days and browse the website during those 2 days for
at least 30-40 min looking at products, putting stuff in your cart, etc… After
you have done that, you can go ahead and proceed with the transaction.
• Keep in mind that as I mentioned previously, some websites will not accept
transactions in which the billing and shipping addresses are too far away
from each other (30 miles is already too much). If you get a card with a
billing
address less than 30 miles from your drop address, then you are very very
lucky and you can proceed. If not, you will need to call the bank using a
spoofed burner number (spoof to the CVV holder’s number) and ask them to
account. They should be able to do that for you, unless it’s Bank of America,
I’ve run into problems before doing that with BoA. They will require you to
• For the burner phone, it is entirely up to you to either purchase a phone for
completely when done with reaping for a few websites/CVVs. For the SIM
card, you can go to T-Mobile and ask them for the $30 monthly plan (make
sure you show them your phone so that they give you the right SIM card and
ALWAYS pay with cash, you can even go a step further and use a hoodie
very reliable.
• Before buying your RDP, ALWAYS check its PROXY, RISK, and FRAUD score.
You can check all of that through the xDedic website (if you don’t have an
CVV
There are a lot of websites nowadays on the web that will sell you stolen
CVV.
However, the problem with these websites is that they will most of the time,
sell
you CVVs that are either dead, or that are complete shit. I know this from my
own
The only one I can currently recommend under good conscience is Yale
Lodge
and I have spoken to the owner, he is not currently selling registrations, but
will
very soon for 300-400 dollars (that money will be added to your balance on
the
website). So, if you want to purchase the registration, keep checking the
website.
security systems many times to hack their databases. With that said, I
currently
have in my possession over 70k CVV and over 50k dumps for sale from
different
online databases. I check my CVVs for validity every single time before
sending
them out to my buyers, so you can be safe you will get valid cards from me.
To check out the balance of a card and check its validity, you can simply call
the
bank to which the card belongs to using your burner phone. Let’s say it’s
Chase,
you call Chase bank and use the automated prompt by typing your CVV
number
and its zip code. From there the automated prompt will tell you the balance
of the
you need it. It is also good to know the CVV holder’s spending patterns so we
can
mimic it. This will make things look much less suspicious to the bank.
reaping LEVELS
When it comes to reaping, there are 3 different levels to it. They are each
outlined
LEVEL 1 reaping: This is the entry point for most carders, it includes such
things
as ordering pizza, movie tickets, and small purchases below $50. This is
considered
very easy reaping and you will usually just require the CVV details, along
with the
below $200. For this you will require the same details as LEVEL 1 reaping.
However, it will vary depending on the website you are reaping. Different
websites
Things that fall under this category are for example, high value physical
products
ATO (Account-Take-Over) on the CVV holder’s account. This will require you to
have the CVV details, full billing address, along with the victim’s DOB, MMN,
SSN,
and background report. For this it is always good to get as much information
as
you can on the victim, as we will have to call the bank and perform changes
in the
holder’s account to take over. This will be explained in much detail further in
this
guide.
CVV LEVELS
As mentioned previously in this guide, different cards are used for different
purposes. You would never use a Signature Visa, with a credit access line of
$30,000 to card movie tickets or pizza. Below I will outline all the card levels
in
existence today. It is important to mention, that for high value purchases you
should ALWAYS look for CREDIT CARDS. Debit Cards are not good for making
these
high value purchases online. However, they could still have many uses such
as
purchasing background reports, credit reports, and all purchases below $200.
merchants all over the world, including the Internet. This card is usually used
by
limits and greater purchasing power, the Visa Gold card is the choice of
consumers
who want more from their cards. Average limit of this type of card is $3000.
PLATINUM – Platinum is one of the best cards around. Average limit could be
around $8000.
$15,000 as well.
SIGNATURE – The 2nd best card around. I’ve gotten many signature cards
with a
limit of $30,000.
find. If you do manage to get your hands on one of these, you are very lucky.
There