According to them, this gesture was their way of saying thank you for choosing b1ack’s Stash for carding needs. The threat group mentioned that users could claim their share by signing up at their shop and visiting the freebies section. Over the past few months, as B1ack has been giving away free CCS/FULLZ, the card seller has received positive feedback from customers, who have attested to the high validity rate of the cards. This implies that the set of stolen data could have originated from a private collection and was not previously released to the public. The globalnature of NFC payments and the anonymity provided by money mules andencrypted communication channels make these fraud operationschallenging to track and shut down. These criminalsexploit the convenience and widespread adoption of NFC technology,targeting vulnerabilities in payment systems and taking advantage ofpoor security measures.
Technical Details And Data Sources

Cybercriminalsalso sell e-SIM contracts to activate the Internet on POS terminalsand communicate with payment gateways. As a result, it may take time todetect fraud involving them, and the seller may act as if they do notknow anything about it. Notably, such merchants are valuable to cybercriminalsbecause they already have an established track record and history oflegitimate customer transactions. Such fraudulent merchants have been identified in China, Malaysia, Nigeria, and South Africa. The bad actors register these terminals with money mules, creating merchant accounts in various processing systems and financial institutions globally.
- Despite its focus on illegal activities, Altenen attracts a loyal following, with many users seeking to learn the latest methods for committing financial crimes.
- Without some of the most reliable shops, threat actors were left with limited options for payment card purchases.
- Selecting the top dark web hacker forums requires a systematic approach to ensure that we identify the most relevant, active, and influential platforms.
- Our investigation into the activities of b1ack’s Stash has unveiled a substantial threat to the security of payment card data across local banks.
- Carding bots may attempt to mimic normal visitor behavior, but certain red flags can reveal their fraudulent intent.
Sites on the dark web typically use .onion domain names, which add a layer of anonymity for both users and administrators. Active since November 2017, UAS made around $3 million in cryptocurrency proceeds, of which $862,000 was made during the pandemic according to Elliptic’s internal data. Therefore, RDP credentials are a particularly valuable resource for those wishing to infect corporate machines with malware, disrupt operations or steal sensitive data. These allow users to access their accounts from other computers.
Why Is Monitoring Dark Telegram Channels Important For Cybersecurity Professionals?
Regarding the validity of the stolen payment card dataset, additional details such as user agents, IP addresses, dates of birth, and email addresses suggest with high confidence that the information is authentic and not generated. B1ack’s Stash made a significant splash when they officially launched their carding shop by releasing a staggering 1 million stolen payment cards for free last April. The dataset included a mix of debit and credit cards, mainly from MasterCard and Visa, but also included American Express and JCB. Typically, carding shops release free data in the thousands, but B1ack’s Stash’s strategy set it ahead of its competition, similar to BidenCash’s tactic last year, where they leaked 2 million stolen cards. Theirtactics involve sophisticated schemes, such as relaying stolen NFCcard data, registering fraudulent POS terminals by money mules, andconducting large-scale unauthorized transactions. Using stolen compromised payment data, Chinese cybercriminals automate transactions using tools like Z-NFC and NFC-enabled POS terminals, which are typically placed right in front of them.
Cyble Titan Endpoint Security
Despite growing crackdowns from law enforcement agencies, the dark web remains a hotbed of criminal activity, offering everything from drugs to stolen data. Get the threat data and protection strategies needed to combat bot attacks during the Black Friday season. This guide reviews each of the OWASP top 21 automated security threats and provides an overview of security capabilities required to mitigate each threat. Techniques include deep user behavior and intent analysis, semi-supervised machine learning algorithms, collective bot intelligence, and fingerprinting to effectively eliminate carding attacks before they happen. The skimmer is placed on a legitimate card reader, such as an ATM or gas pump, and records the card data when the victim swipes or inserts their card.

Carding Forums
While B1ack’s Stash has been most active on XSS since April 2024, it has also heavily advertised itself on Exploit, Verified, Club2CRD, WWH Club, ASCarding, and likely other forums. This incident underscores the persistent threat posed by dark web marketplaces like B1ack’s Stash, highlighting the critical need for enhanced cybersecurity measures to protect both individuals and organizations from such illicit activities. Joker’s Stash was one of the largest and most infamous dark web carding marketplaces, operating from around 2014 until it voluntarily shut down in early 2021.
How Do Carding Attacks Work?

Some carders also track your IP (Internet Protocol) address to snag your credit card info. Using strong, unique passwords for all your accounts is one of the best defenses against carding and other types of online scams. You can check out privacy-focused payment methods like PayPal, Apple Pay, Google Pay, or even prepaid cards.
How Carding Impacts Businesses

It’s a popular choice among fraudsters because it’s easy to pull off and can bring in big bucks. Get the latest updates on privacy, plus expert tips, and security guides to up your digital protection game. Prudence is the key to mitigating all online risks. But with the right preventive strategies, including real-time fraud detection, multi-layered authentication, and bot mitigation, organizations can reduce their exposure. Smaller businesses are often targeted because they may lack enterprise-level security infrastructure, making them easier to exploit. Correlating logs with threat intel sources can help uncover coordinated attacks.
The Best Dark Web Links — Safe & Verified Sites In 2025
Education and awareness play a crucial role in combating credit muling. It is important to research and utilize these options to avoid falling into the trap of credit muling. Many countries offer support systems for individuals facing financial difficulties, ranging from unemployment benefits to grants for small businesses. Another alternative worth considering is seeking financial assistance through government programs or non-profit organizations. While these options may require more effort and time initially, the long-term benefits outweigh the potential consequences of credit muling.
Continued Turbulence Across Dark Web Markets
Others suggest that the future of carding will move to other platforms, like Telegram – although not all users trust the instant messaging service. On January 2022, a message appeared on a prominent carding forum stating that the Russian Internal Affairs Ministry had shut down the site as part of a "special law enforcement operation". While the human cost of carding and credit muling is significant, it is essential to remember that victims are not alone in their struggle. Victims of these crimes should have access to resources such as financial counseling, legal assistance, and credit monitoring services to aid in their recovery. Financial institutions and online platforms must invest in robust security measures to detect and prevent fraudulent activities.
Practical Tips To Prevent Carding Fraud
Businesses are expected to monitor for suspicious activity, secure payment infrastructure and respond swiftly to emerging threats. Beyond compliance, proactive fraud prevention protects brand trust, customer relationships and financial stability. Regulatory frameworks, such as PCI DSS, require companies to implement safeguards to protect customer card data. Fraudulent transactions may result in penalties from payment processors or legal liability under consumer protection regulations. Businesses whose data is compromised often aren’t aware until fraudulent activity is detected or their data appears on underground marketplaces. The dark web offers full card details (including name, number, expiration date and CVV – sometimes bundled with other personal information).
It has a bidding feature, with new batches of stolen data being frequently added. Security researchers have been monitoring forums within the cybercriminal underworld to investigate the leading markets operating in 2026. The second category consists of data stores, which specialize in stolen information.