Threat Hunter
top of page

About This Analysis


In today's digitized economy, payment cards have become one of the most widely used financial instruments worldwide. But with this convenience comes a growing and industrialized threat: payment card data leakage and fraud. From phishing pages and POS skimming to automated card number generation and live testing tools, cybercriminals are building scalable, cross-border operations that increasingly undermine global financial security.

 

This report presents a comprehensive landscape of global payment card leaks, based on Threat Hunter’s monitoring of over 199,000 BIN segments, thousands of issuing banks, and hundreds of underground channels. It reveals how card data is stolen, verified, traded, and ultimately abused across a mature three-tier black market structure — from data theft (upstream) to card testing and monetization (midstream) and fraudulent usage (downstream).

 

Key insights include:

  • The U.S. accounts for over 50% of all leaked cards, serving as the global testing ground for fraud syndicates.

  • Visa and Mastercard represent 95% of leaked card samples, showing overwhelming exposure.

  • Debit cards are most commonly leaked, due to weaker protection and faster cash-out options.

  • The black market has become highly industrialized, with bot-assisted shops, standardized pricing, and multilingual distribution.

  • Leakage data flows across borders, with criminal networks operating in multiple languages and regions.

 

For financial institutions, e-commerce platforms, and payment providers, this report delivers actionable intelligence on:

  • Identifying high-risk BIN segments and card sources.

  • Anticipating fraud risks before mass abuse occurs.

  • Strengthening fraud detection models with real-world leak patterns.

  • Making better-informed security decisions in the face of cross-border cybercrime.

 

By leveraging Threat Hunter’s global visibility into card data leaks and black market activity, organizations can shift from reactive defense to proactive prevention — before fraud becomes loss.

 

 

01 Data-Driven Insights into Payment Card Leakage Risk

 

Our comprehensive analysis of detected payment card data breaches reveals distinct geographical and organizational patterns, highlighting the pervasive and targeted nature of these attacks.

 

1.1 Unprecedented Concentration: United States Accounts for Over Half of Compromised Cards

The United States stands as the most severely impacted nation, representing an alarming 50.9% of all payment card data breaches identified by Threat Hunter. This disproportionate concentration significantly surpasses other affected countries, such as Mexico (5.47%) and the United Kingdom (3.43%), indicating a highly focused geographic targeting by illicit actors.

Figure : Proportion of Countries where Leaked Payment Cards originate
Figure : Proportion of Countries where Leaked Payment Cards originate


1.2 Dominance of Major Card Schemes and Widespread Issuer Compromise

The majority of compromised cards are associated with the two largest global card organizations, with an overwhelming 95% stemming from Visa and Mastercard, collectively impacting approximately 90% of global card-issuing institutions.

 

1.2.1 Understanding the Payment Ecosystem: Card Schemes vs. Issuing Banks

To clarify, Card Schemes (e.g., Visa, Mastercard) establish the foundational rules, allocate Bank Identification Number (BIN) ranges, and provide the payment network infrastructure that connects issuing banks and acquirers. They do not directly issue cards. Conversely, Card Issuers are financial institutions authorized by these schemes to issue bank cards, managing user accounts, credit services, and associated risk. An issuer can operate across multiple card scheme systems.

Figure: Relationship between Card Schemes and Issuing Banks
Figure: Relationship between Card Schemes and Issuing Banks

1.2.2 Visa and Mastercard: Preferred Targets for Illicit Monetization

Among the observed leaked payment card data, Visa accounts for 57.1% and Mastercard for 37.9%. This joint 95% share is primarily driven by the underground industry's strategic preference for cards with high utility and monetization potential. Visa and Mastercard's vast global issuance volumes and superior cross-border acceptance rates make them highly susceptible to compromise and subsequent exploitation. Unlike regional or closed-loop schemes (e.g., UnionPay, RuPay, JCB), Visa and Mastercard facilitate transactions through a wider array of international payment gateways (e.g., Stripe, PayPal, Apple Pay, Binance), offering a more direct and efficient path to illicit monetization.

Figure: Distribution of Leaked Credit Cards by Organizations
Figure: Distribution of Leaked Credit Cards by Organizations

 

1.2.3 Global Reach of Compromise: Nearly 90% of Active Card Issuers Affected

Our intelligence indicates that compromised payment card data currently involves 17,325 card-issuing institutions. This staggering figure represents approximately 90% of the estimated 20,000 globally active card-issuing institutions (based on major card association data and ISO 7812 BIN allocation). The presence of cards from both mainstream U.S. banks and smaller local issuers across Latin America, Asia, Eastern Europe, and Africa in leaked samples underscores the ubiquitous and globally pervasive nature of payment card compromise.

Figure: Proportion of the number of card issuers involved in leaked payment cards to the global total
Figure: Proportion of the number of card issuers involved in leaked payment cards to the global total


1.3 Widespread BIN Exposure: Over 199,000 Compromised BIN Ranges

Threat Hunter's continuous monitoring has identified and analyzed over 199,000 distinct card BIN ranges associated with leaked data. These BINs encompass global mainstream and local card organizations including Visa, Mastercard, Amex, UnionPay, JCB, Discover, as well as localized networks like RuPay, Elo, and Mir. Spanning more than 50 countries and regions and linked to tens of thousands of issuing banks, these compromised BINs cover a full spectrum of card types and levels, including debit, credit, and charge cards. This extensive BIN exposure unequivocally demonstrates the widespread systemic vulnerabilities across the global payment infrastructure.


1.3.1 Concentrated Vulnerability: Top 10 BIN Segments Account for 1.2 Million Leaked Cards

A critical finding is the concentration of leaked card numbers within specific BIN segments. The Top 10 BIN segments alone account for 1.2 million compromised cards, representing over 10% of the total detected leakage. This concentration arises because certain BINs either lack robust 3D Secure (3DS) authentication or employ easily bypassable OTP verification methods, rendering them highly susceptible to fraud. The underground industry actively identifies and targets these vulnerable BINs, optimizing their collection and illicit trafficking efforts.

Figure: Top 10 bin segments with the highest leak volume
Figure: Top 10 bin segments with the highest leak volume

 

1.4 Predominance of Debit Card Compromise

Analysis of recent payment card data breaches reveals that debit cards account for the highest proportion of leakage, at 60.03%, significantly outpacing credit cards and other card types.

 

1.4.1 Categorization of Compromised Payment Card Types

Our monitoring classifies compromised payment card data into distinct types to enhance analysis.


1.4.2 Drivers Behind High Debit Card Leakage

The disproportionately high incidence of debit card leakage is attributable to several factors: their wider issuance and user base, generally weaker risk control mechanisms compared to credit cards, and their faster monetization potential in the illicit market.

Figure: Percentage of card types used for fraudulent payment card transactions
Figure: Percentage of card types used for fraudulent payment card transactions

The main reasons for debit cards having the highest proportion are: wide coverage, relatively weak risk control, and relatively faster monetization.

 

 

1.5 Illicit Market Dynamics: Card Pricing Reflects "Potential Value of Card Fraud"

The black market pricing of leaked payment cards is highly variable, directly correlated with the "potential value of card fraud." A key term in the underground economy is "Fullz" (Full Information), referring to a comprehensive package of a victim's identity and financial data. Fullz commands a significantly higher value than individual card numbers (CVVs) or account details, as it enables a broader spectrum of sophisticated criminal activities, including credit card fraud, loan fraud, identity registration, KYC bypass, and social engineering attacks.

 

1.5.1 Regional Pricing Discrepancies and Underground Industry "Modular Utilization"

Global payment card black market pricing exhibits pronounced regional differences, reflecting the underground industry's "modular utilization" strategy for cards from various countries. Threat Hunter's observations identify three primary cash-out characteristics:

 

(1) U.S. Cards: Low-Cost, High-Frequency "Trial-and-Error Mass-Market Material" Due to their vast supply, comparatively lax risk controls, and broad platform compatibility, U.S. cards are the preferred choice for illicit actors conducting activity testing, low-cost arbitrage, and automated fraud training. Consequently, U.S. leaked card prices are generally lower. This is further facilitated by high BIN data disclosure and extensive historical samples, streamlining mass acquisition and screening. The absence or weakness of 3D Secure or identity verification mechanisms on some U.S. card segments also contributes to their ease of initial testing.

 

(2) EU Cards: High-Value Targeted Attack Instruments EU cards are characterized by stringent risk control mechanisms, including EMV chip verification, PIN entry, 3D Secure dynamic authentication, and PSD2/SCA strong identity verification. Bypassing these controls typically necessitates complete "Fullz" data (e.g., billing address, cardholder details, birthdate), making them more challenging to exploit. The increased difficulty and scarcity of viable EU card materials drive their higher illicit market prices.

 

(3) Canada/Australia/UK Cards: High-Performance "Universal" Underground Tools Cards from Canada, Australia, and the United Kingdom offer strong compatibility within the global payment system, supporting diverse illicit uses like Stripe registrations, subscription service activations, and overseas payment verifications. Their risk control posture lies between that of the U.S. and the EU, positioning them as "stable card sources with controllable costs" for the underground economy.

 

 

1.6 Cross-Border Mobility and Multi-Lingual Underground Transaction Channels

Threat Hunter's intelligence extends across mainstream global language environments, including Telegram groups in English, Russian, Hindi, Arabic, Argentine Spanish, Indonesian, Spanish, and Chinese. Concurrently, we continuously track dark web stores and underground forums specializing in leaked payment card sales. Our findings confirm that compromised payment card data exhibits significant cross-border liquidity, with multiple illicit networks coexisting within these transaction channels.

 

For example, while some groups are predominantly language-specific (e.g., Spanish), their internal transaction content often reveals a diversity of national card sources, including data from the U.S., Argentina, and Mexico. This observation underscores that language environments do not strictly correlate with card origin, signifying pronounced cross-border information flow and the globalized nature of fraudulent activities. Illicit actors frequently engage in cross-border utilization and fraud leveraging these diverse data streams.

Figure:Language distribution of communication channels in the underground industry for leaking payment cards
Figure:Language distribution of communication channels in the underground industry for leaking payment cards


02 Dissecting the Illicit Pipeline: Payment Card Leakage and Underground Industry Operations

 

This section provides an in-depth, technical analysis of the end-to-end illicit supply chain driving payment card fraud. We reveal the sophisticated methodologies employed by the underground industry, from data acquisition to monetization, offering critical insights for proactive anti-fraud strategies.

 

2.1 Architectural Blueprint: The Payment Card Leakage Underground Industry Chain

The illicit ecosystem surrounding payment card compromise operates as a highly structured, multi-stage pipeline, typically segmented into three primary phases: Upstream Data Theft, Midstream Activity Verification and Sales, and Downstream Utilization and Monetization.

  • Upstream: Data Theft This foundational stage focuses on the acquisition of card numbers and associated sensitive data. Methods range from technical exploits to social engineering, including phishing page deployments, database breaches, Point-of-Sale (POS) skimming, and BIN-based card number construction.

  • Midstream: Activity Verification and Sales This critical intermediary phase is where raw, stolen data is transformed into marketable assets. Processes include card number activation verification (live testing), risk grading and labeling, format cleansing, and batch packaging. Commercialization occurs via established illicit channels such as Telegram groups, dark web marketplaces, and specialized forums. Notably, some midstream organizations offer "one-stop black card" services, indicating integrated end-to-end processing.

  • Downstream: Utilization and Monetization In the final stage, verified "live" cards are exploited for financial gain. Common monetization vectors include subscription service registration abuse, cross-border card skimming, virtual goods arbitrage, and money laundering operations. Furthermore, specialized services like "proxy card skimming" and "card testing and proxy binding" have emerged in certain regions, forming a self-sustaining illicit economic loop.

Figure: Illicit ecosystem for payment card compromise operations
Figure: Illicit ecosystem for payment card compromise operations

 

2.2 Upstream Malicious Activities: The Data Theft Vector

The initial phase of payment card compromise primarily revolves around the illicit acquisition of sensitive cardholder data. Key techniques observed include:

  • Bank Impersonation: Deploying SMS-based phishing links that mimic legitimate bank communications, directing users to deceptive login or verification pages.

  • Logistics/Refund Scams: Posing as courier companies or issuing fraudulent refund notifications to trick users into divulging payment card details.

  • Third-Party Platform Credential Harvesting: Forging login pages for popular third-party services to steal account credentials linked to bound payment cards.


Figure:Case of "Disguised Phishing Page + Social Engineering Inducement"
Figure:Case of "Disguised Phishing Page + Social Engineering Inducement"

 


2.2.2 POS and ATM Skimming: Physical Data Exfiltration

This method involves direct physical or digital compromise of Point-of-Sale (POS) terminals or Automated Teller Machines (ATMs):

  • Hardware Overlay/Tampering: Installation of clandestine listening devices, counterfeit card readers, or pinhole cameras on legitimate POS/ATM machines to capture card data (track data) and PINs.

  • Counterfeit POS Machines: Procurement and deployment of illicit POS terminals or modified card readers designed to copy card data during transaction processing.

  • Insider Threats/Secondary Swiping: Collusion with compromised staff in service sectors (e.g., hospitality, transport) who perform unauthorized "secondary swipes" to duplicate customer card information.

 

Figure:Underground industry spreading tools for stealing information on POS machines (English translated)
Figure:Underground industry spreading tools for stealing information on POS machines (English translated)

 

Our monitoring has detected the propagation of specialized tools designed for POS information theft:

  • Tool 1 (NFC Card Reader - e.g., xxxx NFC_10.3.5 Card-Reader.apk): This Android-based application leverages NFC capabilities to read payment card chip data (e.g., card number, cardholder name, expiry date). It's typically deployed on modified Android devices or illicitly configured card readers.

  • Tool 2 (NFC POS Tapper - e.g., xxxx NFC_10.3.5 POS-Tapper.apk): This tool simulates POS terminal transaction processes, enabling small-scale, offline card skimming or initiating unauthorized transactions using copied card data.



2.2.3 Low-Cost Card Material Generation via Non-Full Information

Beyond direct theft, a significant upstream activity involves the synthetic generation of "usable card materials" from incomplete information, particularly through batch generation driven by partial card segment data.

  • Luhn Check Digit: The final digit of a card number, crucial for validating the preceding digits' logical correctness, serves as an "anti-transposition" checksum. Fraudsters often use this for validation of generated numbers.

  • /gen Command: In the underground lexicon, /gen is a common instruction within Telegram groups and automated bots (Bots) for generating fictitious card numbers that conform to valid structural formats.


The process typically unfolds as follows: 

  • a. Source Confirmation: Illicit actors collect partial card segments (e.g., the initial 6–8 digits of a BIN), often from phishing operations or SMS fraud, combining them with fields like expiry dates to form "non-full cards."

  • b. Automated Generation: Using /gen commands or custom generators, they batch-complete card numbers, expiry dates, and CVVs based on existing BINs, fabricating complete card structures with a semblance of authenticity.

  • c. Initial Screening: Data is filtered using rules, Luhn checks, and card type discrimination to eliminate logically erroneous or low "hit rate" numbers, preparing them for the subsequent activity testing phase.

 

This generation technique rapidly yields large volumes of "candidate card materials" at minimal cost, serving as a critical entry point for identifying and screening "live" cards for exploitation.



2.3 Midstream Malicious Activities: Activity Verification and Sales Ecosystem

The midstream segment serves as the central nexus of the payment card leakage lifecycle, focusing on the usability verification (live testing) and subsequent commercial sales of compromised card data. This pivotal stage bridges upstream data acquisition with downstream fraud actualization, directly influencing the efficiency and profitability of the overall illicit operation.



2.3.1 Activity Measurement Mechanisms: The Gateway to Card Monetization

While data theft is the initial step, a card's true monetization potential hinges on its "live" status (i.e., its ability to process transactions). Given the diverse and often compromised nature of data sources, a significant proportion of stolen card numbers are invalid (e.g., reported lost, expired, insufficient funds, or risk-flagged). Consequently, live card testing is an indispensable component of the underground trading system, directly impacting skimming efficiency and card material valuation.

Figure: Illicit Card monetization Process
Figure: Illicit Card monetization Process

Underground actors typically employ a two-stage process:

  • Preliminary Screening: Initial batches of raw card data (often low authenticity) undergo preliminary structural screening in a virtual gateway environment using commands like .mass. This rapidly filters out obviously invalid or malformed numbers, yielding "suspected valid" materials.

  • Accurate Activity Testing: These "suspected valid" numbers are then subjected to real payment gateways where small-value authorization transactions are initiated via commands like .chk. This precisely identifies "live" card resources suitable for actual card skimming. This dual approach balances efficiency with accuracy, establishing a standardized operational path for card material utilization.

 

Common activity assay methods include:

a. Real Gateway Actual Measurement:

  • Core Steps: Submission of small payment requests ($0.01–$1) by connecting to legitimate third-party payment platform APIs (e.g., Stripe, Braintree, Square).

  • Features: Requires a legitimate (owned or rented) merchant account and capability to bypass platform risk controls. Offers high precision but incurs high risk and cost. Return codes (e.g., Authorized vs. Declined/Do Not Honor) are analyzed to confirm live status.

  • Primary Use: Final verification of high-value card materials to ensure transactional capability.

 

b. Real Gateway Pre-Authorization:

  • Core Steps: Initiating $0.00–$1.00 pre-authorization requests via merchant APIs on real payment platforms (e.g., Stripe, Braintree) to validate card authenticity with the issuing bank.

  • Features: Provides real return codes (e.g., authorized, declined), yielding high judgment accuracy for batch testing. However, pre-authorization does not guarantee successful subsequent actual transactions, often requiring a .chk fallback.

  • Primary Use: Confirming card authenticity, though not a guarantee against 3D Secure or other dynamic verification failures.

 

c. Virtual Gateway Simulation:

  • Core Steps: Does not connect to real payment channels; instead, it simulates responses locally based on rule libraries or historical logic.

  • Features: Tools like MrChecker and BinChecker offer low cost and high speed but are prone to high error rates and necessitate .chk for secondary verification.

  • Primary Use: Large-scale initial screening to rapidly discard structurally invalid or clearly fabricated cards.


The underground industry predominantly adopts a two-stage "initial screening with free tools + rechecking with high-precision gateways" methodology. This ensures the identification of truly monetizable "live" card resources while maintaining cost control, prior to entering pricing, sales, and downstream utilization phases.

Figure: Messages for activity testing in a Telegram group & Payment Cards in the Dark Web: "Liveness Testing" Websites respectively
Figure: Messages for activity testing in a Telegram group & Payment Cards in the Dark Web: "Liveness Testing" Websites respectively


2.3.2 Robust Payment Card Sales Ecosystem: Abundant Channels and Advanced Functionality

The illicit market for compromised payment cards is characterized by a sophisticated and resilient sales infrastructure.

 

2.3.2.1 Proliferation of Sales Stores and Private Domain Channels:

Threat Hunter currently monitors over 100 dedicated CVV stores and nearly 8,000 private domain sales group chats. This vast network underscores the scale and accessibility of the illicit market.

 

2.3.2.2 Evolving Functionality of Illicit Card Stores:

Monitored payment card sales platforms and private channels exhibit advanced functionalities, mirroring legitimate e-commerce platforms, demonstrating standardization, batch processing, automation, and strong portability:

  • Sophisticated Search & Filtering: Support for precise retrieval based on criteria such as BIN, country, value range, and CVV "survival rate".

  • Transparent Pricing & Categorization: Clear price structures and well-defined product categories, with some stores implementing differentiated pricing based on region, issuing bank, and card type.

  • Emerging Credit Mechanisms: Implementation of features like "Live Card Guarantee," "Refund Policy," and "Marked as LIVE/TESTED," aimed at building buyer trust within the illicit ecosystem.

  • Professionalized Operations & Scaled Inventory: Increasingly professional platform operations with expanding inventories. Some even offer API interface calls, catering to medium and large-scale bulk buyers.

  • High Engagement & Resilience: Characterized by high user engagement and long operational cycles, demonstrating resilience against takedowns and ensuring continuous supply, forming a critical support system for underground circulation.

 

Figure:  Example of a Payment Card Sales Store
Figure:  Example of a Payment Card Sales Store


2.3.2.3 Enduring Vitality of Payment Card Sales Channels:

Beyond their sheer number and functional maturity, these illicit sales channels exhibit remarkable vitality:


  • High Substitutability & Rapid Recovery: Operators can rebuild new groups and migrate operations within hours of a block, showcasing robust resilience.

  • Decentralized Node Structure: No single point of failure; numerous independent groups, channels, and sellers operate in parallel, making comprehensive targeting exceptionally difficult.

  • Flexible Dissemination Paths: Card compromise information is dynamically spread via mass messaging, bots, forwarding, and password-protected content, creating a resilient "mesh diffusion" model.

  • Autonomous Transaction Processes: Bot-driven automation enables self-service for querying, ordering, payment, and delivery, lowering usage barriers by eliminating the need for platform accounts or logins.

  • Localized Terminology & Linguistic Diversification: Use of underground slang and non-mainstream languages (e.g., Hindi, Spanish) enhances operational secrecy and information concealment.

  • Decentralized Payment Methods: Widespread support for peer-to-peer cryptocurrency payments (e.g., USDT, BTC, Binance Pay) bypasses centralized platform custody and associated risk controls.

 

Figure: Self-service Store of a Bot in a Telegram Group
Figure: Self-service Store of a Bot in a Telegram Group

 


2.4 Downstream Malicious Activities: Payment Card Monetization

Once payment cards are compromised and verified "live," the underground industry rapidly moves to monetization. Key cash-out paths include:

  • Gift Card Laundering

    This is a highly prevalent and low-cost monetization method due to gift cards' high liquidity and direct resale potential on black markets. Illicit actors use stolen payment cards to purchase gift cards from e-commerce, payment, and gaming platforms. This method offers quick conversion into untraceable value.

  • Illicit Commodity Generation/Arbitrage

    Compromised payment cards are used to place orders on legitimate e-commerce platforms. Goods are then shipped via "proxy ordering" intermediaries to virtual addresses, consolidation warehouses, or addresses controlled by money launderers. After being "laundered" (resold or converted), these goods flow back into gray markets, generating profits for the underground industry.

  • BIN Registration Abuse

    High-risk BIN segments are combined with card generators to construct bulk card numbers. These are then used for mass account registrations on platforms with weak risk controls. Even if the generated card numbers cannot complete transactions, weak verification mechanisms can allow initial binding or trial use. These illicitly registered accounts or services are subsequently sold at low prices or leveraged for further fraudulent activities.

 


03 Current Situation Analysis Deconstructing Payment Card Fraud: Typologies and Attack Vectors

 

This section delves into concrete examples of payment card fraud, dissecting the operational characteristics and underlying technical mechanisms employed by illicit actors. These case typologies illustrate the sophisticated fraud schemes prevalent in the underground economy.

 

3.1 Card Verification and Sales: Establishing Illicit Credibility

3.1.1 Case Description: The "Verified Live Card" Market

 

Figure: Examples of Selling Verified Bank Cards
Figure: Examples of Selling Verified Bank Cards

Observed instances within the underground illicit market demonstrate vendors actively promoting "verified" bank cards. As depicted in forensic evidence, these illicit sellers display textual confirmations indicating successful gateway verification of card numbers. This serves as undeniable proof of the card's active status and transactional viability. Furthermore, screenshots of successful "card skimming" operations on compromised platforms are often presented. This visual evidence aims to validate their demonstrable ability to exploit the cards, thereby bolstering trust among prospective buyers or attracting collaborative partnerships within the fraud ecosystem.

 

3.1.2 MarketCase Characteristics: Assuring Illicit Quality and Service Delivery

This operational transparency reflects a concerted effort by certain underground sellers to enhance their "data authenticity" and "service delivery capabilities." By publicly showcasing card number verification results and evidence of successful skimming, they aim to build product credibility and foster customer confidence in a largely unregulated and distrustful environment. This practice mirrors quality assurance protocols found in legitimate markets, adapted for illicit trade.



3.2 Unauthorized Transactions and Proxy Purchases: The Arbitrage Loop

3.2.1 Case Description: The "Half-Price Goods" Deception

Within various Telegram channels, illicit actors advertise services offering to procure any product from specific platforms at a "half-price" discount. An illustrative example includes a quoted price of $89 for a service that includes "instructional guidance." This veiled offering is, in essence, the sale of access to compromised credit card information. The perpetrators explicitly claim the ability to process orders on target platforms or acquire gift cards (e.g., a $500 gift card for only $235).

 

Figure: Case of Gift Card Theft via Bank Card Fraud
Figure: Case of Gift Card Theft via Bank Card Fraud

These illicit service providers actively guide buyers through the process of completing orders or cashing out gift cards, promising "full assistance" and even offering to perform the operations on the buyer's behalf. Crucially, these transactions are covertly funded using stolen bank card data. Further investigations into the sale of identical gift cards reveal them being offered at a mere 10% to 30% of their original face value, with the confirmed source of acquisition being illicit payments made with stolen bank cards.

 

Figure: Case of Gift Card Theft via Bank Card Fraud
Figure: Case of Gift Card Theft via Bank Card Fraud

3.2.2 Case Features: A Mature Arbitrage Ecosystem

This fraud typology represents a sophisticated, self-contained arbitrage closed loop: "bank card theft → virtual commodity acquisition → white-domain resale for monetization." It exhibits clear hallmarks of a platform-like operation with a mature service structure.


This model is a quintessential example of the "gift card realization" tactic within the contemporary CVV black and gray market supply chain, demonstrating high efficiency and a low risk profile for the perpetrators.



3.3 Direct E-commerce Skimming: Exploiting Platform Vulnerabilities

3.3.1 Case Description: Card-Not-Present Exploitation on Digital Platforms

Direct card skimming on e-commerce and other digital platforms refers to the execution of fraudulent transactions without the need for a physical card. This involves leveraging compromised card data directly through online payment gateways.

 

Figure:Platform Fraudulent Transaction Cases
Figure:Platform Fraudulent Transaction Cases



3.3.2 Case Features: Targeting Weaknesses in Digital Transaction Security

In this attack vector, illicit actors utilize stolen card numbers, expiration dates, and CVV/CVC codes to directly initiate and complete transactions on vulnerable platforms. Such "card-not-present" (CNP) skimming predominantly occurs on e-commerce platforms characterized by weak verification mechanisms, inadequate risk control capabilities, and the absence of 3D Secure (3DS) authentication. Attackers bypass existing security protocols to force through unauthorized payments. The goods acquired by these illicit means are typically virtual, easily resalable, difficult to trace, and instantly deliverable. This includes a range of digital assets such as various gift cards, subscription-based memberships, digital game points, virtual currency recharges, and electronic coupons. These categories are strategically chosen for their high monetization efficiency and strong anonymity, making them primary channels for the underground industry to achieve rapid arbitrage and illicit financial gain.




04 Executive Summary: Unpacking the Global Payment Card Compromise Landscape

 

Our comprehensive analysis of payment intelligence data reveals critical insights into the global payment card leakage phenomenon, characterized by distinct geographical concentrations, pervasive scheme impacts, and specific card type vulnerabilities.

  • Geographic Epicenter: The United States remains the disproportionate hard-hit area, accounting for an alarming 50.9% of observed payment card leaks. This is primarily attributed to its high credit card penetration and the underground industry's strategic preference for "trial-and-error" exploitation within this market.

  • Universal Scheme Compromise: Visa and Mastercard collectively represent 95% of all leaked cards, highlighting their global ubiquity and attacker preference. Critically, approximately 90% of active card-issuing institutions worldwide have seen their cards compromised, underscoring the universal scope of this threat.

  • Debit Card Vulnerability: Debit cards exhibit the highest leakage proportion at 60.03%. This elevated risk stems from their vast issuance volume, comparatively weaker inherent risk controls, and rapid monetization potential for illicit actors.

  • Dynamic Illicit Pricing: The black market valuation of compromised cards directly correlates with their "potential value for card fraud." U.S. cards, despite their volume, command lower prices due to their "mass-market" utility for testing. Conversely, European Union cards fetch higher prices due to stringent security protocols (e.g., PSD2/SCA), demanding more sophisticated bypass techniques. Canadian, Australian, and British cards offer a balance of cost-effectiveness and versatility for the underground economy.

  • Mature Cybercriminal Pipeline: The payment card underground has evolved into a highly mature, integrated ecosystem:

    • Upstream Data Theft: Employs diverse techniques including phishing page deployments, POS/ATM skimming, and synthetic card number construction (e.g., BIN generation).

    • Midstream Verification & Sales: Focuses on "live testing" (activation verification) of cards and their subsequent commercialization through a resilient network of dark web marketplaces and private domain channels, characterized by sophisticated functionality and high operational vitality.

    • Downstream Monetization: Achieved through various illicit methods, primarily gift card arbitrage, proxy purchasing of physical goods, and BIN registration abuse for account creation or service activation.

    • Cross-Border Modus Operandi: Both leaked data and underground transactions exhibit significant cross-border mobility and multi-lingual operational characteristics, demonstrating a truly globalized illicit supply chain.



Proactive Defense

——Leveraging Compromised Data Intelligence


The pervasive nature of payment card breaches necessitates a paradigm shift from reactive mitigation to proactive defense. Enhancing user security awareness, fortifying issuer and payment platform risk controls, and intensifying international law enforcement collaboration are paramount. Above all, continuous technological innovation is crucial to safeguard the integrity of the global payment ecosystem.

 

In this challenging landscape, Threat Hunter's intelligence on compromised data cards provides an indispensable strategic advantage. By continuously monitoring and analyzing over 199,000 card BIN segments—encompassing global mainstream and local card organizations, and associated with tens of thousands of card-issuing banks—we deliver precise, actionable intelligence.

 

This granular intelligence empowers financial institutions and relevant enterprises to:

  • Pinpoint High-Risk Assets: Accurately identify specific card numbers and BIN segments actively exploited by the underground industry, enabling the immediate strengthening of targeted risk control strategies.

  • Enable Proactive Threat Mitigation: Implement early warning systems for potential card fraud risks, facilitating preemptive measures such as enhanced monitoring or temporary freezing of affected cards before large-scale fraudulent activity occurs.

  • Optimize Anti-Fraud Models: Continuously update and refine internal anti-fraud detection algorithms by integrating the latest insights from leaked data characteristics, thereby significantly enhancing the capability to identify and intercept illicit transactions.

  • Inform Strategic Security Decision-Making: Provide real-time, context-rich intelligence that supports more informed and agile security decisions in response to the complex and rapidly evolving threats emanating from the underground economy.

 

Through Threat Hunter's compromised data card intelligence, organizations can transition from a reactive posture to a proactive defense, substantially mitigating payment card fraud risks.


Would you be interested in a deeper dive into how this intelligence can be integrated into existing fraud detection systems? Let's talk. 

Panoramic Analysis of Global Payment Card Leaks and Fraud Ecosystem

Payment card data leaks are no longer isolated incidents — they are the fuel of a global, industrialized underground economy.
In this comprehensive investigation, Threat Hunter analyzes over 199,000 BINs, 17,000+ issuing banks, and hundreds of dark web and Telegram channels to uncover how stolen cards are created, verified, sold, and monetized at scale.

One more step to download this research.

Thank you for the submission.

You will receive a confirmation email shortly.

bottom of page