Those who make, buy and use stolen credit cards have workdays like the rest of us. See what the daily grind is for the crooks who would profit from your card data
The editorial content below is based solely on the objective assessment of our writers and is not driven by advertising dollars. However, we may receive compensation when you click on links to products from our partners. Learn more about our advertising policy.
The content on this page is accurate as of the posting date; however, some of the offers mentioned may have expired. Please see the bank’s website for the most current version of card offers; and please review our list of best credit cards, or use our CardMatch™ tool to find cards matched to your needs.
|THE BUSINESS OF CREDIT CARD FRAUD|
|No longer the realm of solo malcontents, card fraud has grown into a sophisticated industry with multiple layers of criminals stealing, transmitting and profiting from stolen consumer data.|
Credit card crooks — those who make, buy and then use stolen credit cards or credit card numbers — have workdays just like the rest of us. Those with day jobs squeeze their illegal, profitable sideline in during the morning, at lunch or after work. Others work at this enterprise full time.
These crooks are at the bottom level of a criminal enterprise that begins with high-level malware writers creating code to hack credit card databases at retailers and financial institutions. It ends with boots on the ground or online using your card or card number to make purchases. (For job descriptions of the eight types of players, see “Know your credit card fraudster.”)
Here’s a glimpse into a day in the life of a common credit card crook.
If you’re planning to make fake credit cards, it’s time to get started. You already have an imprint machine, magnetic card writer and blank credit card stock — all purchased legally for about $1,000. You make as many cards as you’ll need later today, imprinting the new cards with the numbers you purchased.
Or, you may be imprinting hotel keys you have on hand or putting a new magnetic stripe onto old credit cards. When you use such a refurbished card, you’ll hope the merchant doesn’t ask to see the card after you swipe it — because the card number on the refurbished magnetic stripe doesn’t match what’s imprinted on the credit card.
If you opted to skip making new cards and just use the hacked card numbers online, your peak shopping time is noon to 1 p.m., maybe your lunch break from your day job. The average card-not-present fraudster spends $900 in five days.
If you have new fake cards, you’re ready to test them at an unsupervised location such as a vending machine or gas station. You make a small purchase to verify that the card actually works.
If the card checks out, it’s time to shop. Your goal is to buy jewelry, electronics or other high-end items you can easily sell. You may drive down the interstate, hitting every Apple store along the way. Or perhaps you’ll zero in on grocery stores and buy gift cards to resell.
The peak time for using fraudulent cards is 4-5 p.m. The average fraudster using an actual card spends about $450 in seven days — it’s not as lucrative as card-not-present crime but it’s easier if you don’t want to hassle with fake shipping addresses and proxy servers.
You start selling the jewelry, electronics, gift cards and other items you bought.
Time for bed — you want to start early tomorrow to get a jump on your competition.