Carding
Also known as: Credit card fraud, Card testing
The testing, trading, and fraudulent use of stolen credit card data — including "card testing" on e-commerce checkouts to validate which stolen numbers still work.
Last updated:
What is carding?
Carding is the umbrella term for the criminal economy around stolen payment-card data: obtaining the numbers, testing whether they still work, selling validated numbers on underground markets, and ultimately using them to buy goods, load gift cards, or cash out through a money mule. The data comes from phishing, skimming devices, point-of-sale malware, e-commerce data breaches, and — increasingly — account takeover of legitimate users whose cards are already stored.
Card testing: the most visible piece
The piece that hits ordinary merchants hardest is card testing — running small charges against thousands of stolen numbers to see which ones still authorize. A typical card-testing run looks like:
- Hundreds or thousands of transactions within minutes
- Each transaction is a small, consistent amount ($0.10 to $5.00)
- Cards usually decline, but a small percentage authorize
- The successful ones get flagged for downstream fraud; the rest are discarded
- Source traffic often rotates through residential proxies to avoid IP reputation checks
The merchant sees a sudden spike in authorization attempts, a spike in declines, and, if payments are gateway-billed per attempt, a real cost even from the rejected charges.
Defense
Payment processors apply velocity limits, bin-level risk rules, and device fingerprinting. Merchants can add CAPTCHA on checkout, require account creation for purchases above a threshold, enforce 3-D Secure on suspicious transactions, and block checkouts from known-abuse IPs. Checking the source IP against an IP abuse report checker will often return prior reports of card-testing or other fraud activity, letting the system gate the checkout before the authorization is even attempted.