{"id":14699,"date":"2024-03-26T10:25:06","date_gmt":"2024-03-26T06:25:06","guid":{"rendered":"https:\/\/www.cs-cart.com\/blog\/?p=14699"},"modified":"2025-07-04T14:30:14","modified_gmt":"2025-07-04T10:30:14","slug":"understanding-carding-a-comprehensive-guide-for-online-store-owners","status":"publish","type":"post","link":"https:\/\/www.cs-cart.com\/blog\/understanding-carding-a-comprehensive-guide-for-online-store-owners\/","title":{"rendered":"Understanding Carding: A Comprehensive Guide for Online Store Owners"},"content":{"rendered":"\n<p>Carding is a type of credit card fraud that happens when a carder (or credit card thief) uses a stolen card to purchase branded gift cards, buy high-value goods, or charge a prepaid card. It is also called credit card stuffing.&nbsp;Unlike traditional credit card theft, carding doesn\u2019t always require stealing the physical card\u2014just the digital details. In many cases, attackers only need stolen card information obtained through data breaches or sold on the dark web.<\/p>\n\n\n\n<p>Sadly, the US is a major target for carding since it doesn\u2019t employ chip and PIN technology similar to what other countries use to safeguard debit and credit cardholders. In fact, between 2020 and 2021, card fraud increased by over <a href=\"https:\/\/www.statista.com\/statistics\/1394119\/global-card-fraud-losses\/#:~:text=Card%20fraud%20losses%20across%20the,from%20the%20United%20States%20alone.\">10%<\/a> worldwide, with US merchants and card owners alone losing $12 billion. It is expected to cause losses of over $362 billion to global merchants between 2023 and 2028.<\/p>\n\n\n\n<p>In this article, you\u2019ll learn about how carding fraud attacks work, the top carding attack techniques used today, and the measures to take to combat it.<\/p>\n\n\n\n<p>Let\u2019s get started.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_a_carding_attack_works\"><\/span>How a carding attack works<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To understand how carding works, let\u2019s look at how attackers execute a typical carding operation. A carding attack is a major e-commerce security threat usually executed online through a merchant\u2019s <a href=\"https:\/\/www.cs-cart.com\/blog\/what-is-the-best-way-to-process-payments-on-a-marketplace\/\" target=\"_blank\" rel=\"noopener\">payment processor<\/a>. A cybercriminal will hack into the merchant\u2019s online credit card processor and get a list of all debit and credit cards most recently used.&nbsp;Some carders also take advantage of data breaches at major retailers or payment processors to obtain large volumes of stolen card information. Others simply purchase stolen data from a carding shop, where thousands of compromised cards are traded daily.<\/p>\n\n\n\n<p>That\u2019s not to say that\u2019s the only way they can gain access to stolen credit card information (we\u2019ll discuss these other strategies in the next section). Suffice it to say that however they retrieve the credit card data, they use a bot\u2014software made for performing automated tasks over the internet\u2014to determine if the credit card details are valid, often through brute force attacks that test large volumes of stolen card data.&nbsp;<\/p>\n\n\n\n<p>Once a card is proven to be valid, it is used for even more illegal activities. For example, it can be used to buy store-branded gift cards or prepaid cards, which are then used for reselling or cash withdrawal. These unscrupulous individuals can even choose to sell these prepaid gift cards themselves or use them to make fraudulent purchases that are harder to trace. This carding guide will also explain how criminals obtain stolen credit or a debit card information and use it for profit.<\/p>\n\n\n\n<p>Some carders go as far as selling all the verified card details to criminal rings on carding forums and other criminal markets. In fact, in 2022, credit card data on the dark web skyrocketed by a whopping <a href=\"https:\/\/legaljobs.io\/blog\/credit-card-theft-statistics\" target=\"_blank\" rel=\"noopener follow\">135%<\/a>. Besides credit card information, these forums often feature a wide range of other valuable digital assets for sale, many of which can be used for identity theft. Fraudsters may also trade compromised accounts from various services such as PayPal, Uber, and Netflix. Additionally, they frequently deal in stolen loyalty card points, which can be redeemed for goods or services, further broadening the scope of illicit activities in these darknet markets.<\/p>\n\n\n\n<p>Unfortunately, the original card owner mostly remains unaware of the fraudulent charges until all their stolen funds have been used or transferred to another account. At this point, it\u2019s usually too late to recover the money.&nbsp;<\/p>\n\n\n\n<p>The thing is, carding is not only disadvantageous to the cardholder. It\u2019s also detrimental to the merchant. Any time there\u2019s a disputed purchase, the merchant may be forced to give chargebacks. This means they have to reverse the online purchases or transactions and refund the money to the credit or debit card holder\u2019s account.<\/p>\n\n\n\n<p>The merchant may also face additional financial burden in the form of carding reversal charges as part of their service agreements. They may also lose money from legitimate <a href=\"https:\/\/www.cs-cart.com\/blog\/online-merchandising-how-to-increase-sales-in-an-online-store\/\" target=\"_blank\" rel=\"noopener\">online purchases<\/a> if payment processors decide to block transactions until the issue is resolved. Recovering the products carders purchase is also hard. Then, of course, there\u2019s the reputational damage that\u2019s even harder to repair.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_are_the_top_carding_attack_techniques\"><\/span>What are the top carding attack techniques?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are several carding methods used to steal and validate credit card details online. We\u2019ve briefly touched on how hackers can gain access to payment card data for their carding attacks. In this section, let\u2019s look in detail at other techniques:<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Credit Card Skimming<\/h3>\n\n\n\n<p>Credit card skimming occurs when criminals alter an ATM machine, gas pump, or POS system with a similar-looking piece of equipment. This equipment then records the magnetic strip code, card number, expiration date, and PIN.&nbsp;<\/p>\n\n\n\n<p>The criminals will then use Bluetooth to transfer card information to their own devices, hardly ever coming into contact with the original machine. These attacks often happen at the point of sale, where unsuspecting customers swipe or insert their cards without noticing the skimmer.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"552\" src=\"https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image1-91.png?resize=800%2C552&#038;ssl=1\" alt=\"US Debit Cards Involved in Card Skimming H1 2023\" class=\"wp-image-14700\" srcset=\"https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image1-91.png?resize=1024%2C707&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image1-91.png?resize=300%2C207&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image1-91.png?resize=768%2C530&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image1-91.png?resize=392%2C272&amp;ssl=1 392w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image1-91.png?resize=130%2C90&amp;ssl=1 130w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image1-91.png?w=1404&amp;ssl=1 1404w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/www.fico.com\/blogs\/sites\/blogficodotcom\/files\/styles\/original\/public\/inline-images\/US%20debit%20cards%20involved%20in%20skimming%20H1%202023%20%28002%29.png.webp\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/figcaption><\/figure>\n\n\n\n<p>In the first half of 2023 alone, 120,000 cards and 3,000 unique financial institutions were affected by card skimming attacks. This was a staggering 77% increase in skimming incidents from the previous year.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Social Engineering<\/h3>\n\n\n\n<p>Social engineering refers to the practice of manipulating a person to divulge confidential information\u2013including credit card details\u2014to be used for criminal purposes. The stolen information can also be used to gain access to the victim\u2019s computer system and steal other sensitive data like social security numbers, potentially leading to identity theft.&nbsp;<\/p>\n\n\n\n<p>Phishing, vishing, smishing and pharming are types of social engineering attacks.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/www.efani.com\/blog\/how-to-get-rid-of-phishing-scams\" target=\"_blank\" rel=\"noopener follow\">phishing scam<\/a> happens when cyber criminals send emails to unsuspecting people while purporting to be from known companies. These emails attempt to induce the victim to divulge sensitive information such as bank account info, credit card details, usernames, or passwords.<\/p>\n\n\n\n<p>Vishing and smishing are similar to phishing. Only, <a href=\"https:\/\/keepnetlabs.com\/blog\/what-is-vishing\" rel=\"follow\">vishing<\/a> involves the use of phone calls to gain access to a person\u2019s sensitive information. Smishing, meanwhile, involves the use of SMS. A malicious link is typically included in the SMS. When the unsuspecting <a href=\"https:\/\/nordvpn.com\/blog\/what-is-url-phishing\/\" target=\"_blank\" rel=\"noopener follow\">victim clicks on the link<\/a>, they are directed to a website, which may prompt them to download malicious software. We\u2019ll talk about malware later.<\/p>\n\n\n\n<p>The last one, pharming, involves redirecting website traffic to another fake site, which then prompts the victim to disclose critical information.&nbsp;<\/p>\n\n\n\n<p>Social engineering accounts for a whopping 98% of cyber-attacks. According to the FBI\u2019s Internet Crimes Unit, in 2021, phishing, vishing, smishing and pharming victims amounted to 323972, the most number of cybersecurity victims.<\/p>\n\n\n\n<p>Attackers may also use shoulder surfing\u2014visually observing someone entering their PIN or card details in public\u2014to steal sensitive information without digital tools.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Malware<\/h3>\n\n\n\n<p>Malware refers to intrusive or malicious software created by hackers to damage computer systems or gain unauthorized access to sensitive data, including credit card numbers and login credentials. These breaches often result in unauthorized charges made using stolen card data before victims even notice. Trojan viruses, worms, ransomware, spyware, viruses, and adware are all examples of malware.&nbsp;Malware is not only used for carding\u2014it\u2019s also commonly used in other forms of fraud, such as identity theft and account takeover schemes.<\/p>\n\n\n\n<p>The majority of malware is spread as trojan viruses like .doc files and .exe files, and can be distributed using some form of social engineering. The number of malware attacks is increasing by the year. In fact, in 2022, there were 5.5 billion malware attacks, a 2% rise from the previous year.<\/p>\n\n\n\n<p>As you\u2019ve seen, cybercriminals may employ a combination of the tactics above to gain access to credit card details they\u2019ll use for a carding attack. That\u2019s why for the best protection, cardholders should take the time to understand these strategies and implement cybersecurity best practices to prevent or counter them. For instance, they shouldn\u2019t click on dubious links. They should also take the time to check the authenticity credit protection services of the messages sent to them. Another option is to use <a href=\"https:\/\/www.aura.com\/learn\/credit-protection-services\" target=\"_blank\" rel=\"noopener follow\">credit protection services<\/a> that can alert them of fraudulent activities related to their card. Additionally, staying informed about the <a href=\"https:\/\/www.creolestudios.com\/top-7-best-practices-to-secure-your-web-application\/\" rel=\"follow\">best practices to secure your web application<\/a> can help both businesses and users create safer online environments that reduce the risk of exploitation.<\/p>\n\n\n\n<p>eCommerce businesses like you should do their part as well. They should identify all points of vulnerability in their site hackers may exploit to get a hold of sensitive information, including customers\u2019 credit card details. They may use AI chatbots for hacking purposes to identify these. Once identified, they can make the necessary adjustments or deploy the <a href=\"https:\/\/thectoclub.com\/tools\/best-cloud-security-providers\/\" rel=\"follow\">appropriate cybersecurity solutions<\/a> to ensure their customers don\u2019t fall victim to carding attacks. Weak security can unintentionally aid cybercriminals in running carding operations that target both large platforms and small online stores. When malware is used to harvest payment data, it can quickly lead to widespread fraud and financial losses across multiple platforms.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_are_the_measures_implemented_by_businesses_to_combat_carding_fraud\"><\/span>What are the measures implemented by businesses to combat carding fraud<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As criminals get better at scheming, businesses must implement stronger security measures to protect sensitive customer data and reduce fraud risks. That said, let\u2019s look at a few other measures used by businesses to combat carding fraud, and which you can implement, too.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">1. Address verification service (AVS)<\/h3>\n\n\n\n<p>The AVS system compares the billing address provided at checkout to the one in the card issuer\u2019s records. The result can be one of these three:<\/p>\n\n\n\n<ul>\n<li>Full match<\/li>\n\n\n\n<li>ZIP code match<\/li>\n\n\n\n<li>Address match<\/li>\n\n\n\n<li>No match<\/li>\n<\/ul>\n\n\n\n<p>If the details do not match, the transaction is considered criminal activity and will be declined immediately. Sometimes, the AVS system leaves it to the discretion of the merchant to choose whether or not to decline a partial match.&nbsp;<\/p>\n\n\n\n<p>Unfortunately, AVS only works in the US, Canada, Australia, New Zealand, and the UK.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">2. Card verification value (CVV) checks<\/h3>\n\n\n\n<p>CVV is a three or four-digit code written on the back of a credit or debit card, close to the signature strip.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"404\" src=\"https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image3-71.png?resize=800%2C404&#038;ssl=1\" alt=\"CVV \/ Magnetic Strip\" class=\"wp-image-14701\" srcset=\"https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image3-71.png?resize=1024%2C517&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image3-71.png?resize=300%2C151&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image3-71.png?resize=768%2C387&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image3-71.png?resize=1536%2C775&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image3-71.png?w=1562&amp;ssl=1 1562w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/www.paisabazaar.com\/wp-content\/uploads\/2022\/11\/What-is-CVV-Number-in-Debit-Card-1.jpg\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/figcaption><\/figure>\n\n\n\n<p>You can request this unique code upon checkout to verify that the shopper who wishes to make a purchase is in physical possession of the card. This will make it impossible for carders to use credit card numbers retrieved from criminal marketplaces or the Dark Web for fraudulent activities.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Geolocation tracking<\/h3>\n\n\n\n<p>Geolocation tracking leverages GPS technology to identify the user\u2019s location or IP address and compare it to the one that\u2019s normally used and was initially registered by the cardholder. Some advanced geolocation tracking systems can check for device type, transaction history, and even time of day to detect unusual patterns that may indicate fraud.&nbsp;<\/p>\n\n\n\n<p>Geotrackers can also identify users who are accessing a site using proxy IPs. The&nbsp;<a href=\"https:\/\/www.scraperapi.com\/blog\/best-10-free-proxies-and-free-proxy-lists-for-web-scraping\/\" target=\"_blank\" rel=\"follow noopener\">best free proxy providers<\/a>&nbsp;help users show they\u2019re accessing a site from one location when they\u2019re actually in an entirely different one.&nbsp;<\/p>\n\n\n\n<p>While it\u2019s possible the real cardholder could simply be traveling, a geolocation mismatch shouldn\u2019t be overlooked. You should conduct more tests\u2013maybe ask questions only the legitimate cardholder would know\u2014to ensure the card details are in the right hands.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">4. CAPTCHA<\/h3>\n\n\n\n<p>CAPTCHA is an online security test used to ward off bots by trying to verify that the website user is a human. CAPTCHA is short for Completely Automated Public Turing test to tell Computers and Humans Apart. It uses a challenge-response framework.&nbsp;<\/p>\n\n\n\n<p>For instance, a CAPTCHA can display several similar images and ask the user to select those with a bicycle, fire hydrant, motorcycle, or other objects. Below is an example of a CAPTCHA test.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"446\" height=\"647\" src=\"https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image2-87.png?resize=446%2C647&#038;ssl=1\" alt=\"Google Captcha with the fire hydrants \" class=\"wp-image-14702\" srcset=\"https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image2-87.png?w=446&amp;ssl=1 446w, https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/image2-87.png?resize=207%2C300&amp;ssl=1 207w\" sizes=\"(max-width: 446px) 100vw, 446px\" \/><\/figure>\n\n\n\n<p>While humans can find this easy, bots find it extremely challenging and almost impossible. It\u2019s an effective way to prevent password decryption by AI bots and <a href=\"https:\/\/www.cs-cart.com\/blog\/8-steps-to-protect-your-e-commerce-store\/\" target=\"_blank\" rel=\"noopener\">protect your e-commerce store<\/a>. CAPTCHA helps block bots that criminals often use in automated financial fraud attempts, such as testing stolen credit card numbers.<\/p>\n\n\n\n<p>To implement CAPTCHA on your site, all you need to do is register your site on the Google reCAPTCHA website.<\/p>\n\n\n\n<p>Apart from all these measures, the business can also opt to invest in the cybersecurity education of their IT and security teams. Gaining a <a href=\"https:\/\/www.stationx.net\/entry-level-cyber-security-certifications\/\" target=\"_blank\" rel=\"noopener follow\">cybersecurity certification<\/a> can help in responding effectively during any carding fraud incidents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Multifactor Authentication (MFA)<\/strong><\/h3>\n\n\n\n<p>Multifactor authentication adds an extra layer of security by requiring users to verify their identity using more than one method\u2014typically a password plus a temporary code sent via SMS, email, or an authenticator app. This makes it significantly harder for carders to access customer accounts, even if login credentials have been compromised.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_closing\"><\/span>In closing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Web carding fraud is a growing challenge that needs to be addressed. This type of fraud happens when a carder (or credit card thief) gets a hold of a user\u2019s credit card details or buys stolen credit card information on the dark web, uses bots to verify the details are valid, then uses the card for illegal activities.<\/p>\n\n\n\n<p>As an eCommerce business, you need to guard against these attacks. Implement one or more of these measures\u2014Address Verification Services (AVS), Card Verification Value checks (CVV), geolocation tracking, and CAPTCHA. You might also want to consider AVS, but that\u2019s only available in a few countries.<\/p>\n\n\n\n<p>With the right security measures, you won\u2019t only protect your online store. You\u2019ll also keep your customer data safe and, ultimately, build trust and credibility that are crucial to business growth. Since carders often purchase gift cards with stolen data, early detection and fraud prevention tools are essential for online stores.<\/p>\n\n\n\n<div class=\"cs-cart-products-block\">\n<h2><span class=\"ez-toc-section\" id=\"All_CS-Cart_Products_and_Services\"><\/span>All CS-Cart Products and Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><span>\u2605<\/span> CS-Cart Multi-Vendor: <a href=\"https:\/\/www.cs-cart.com\/multi-vendor-personal-demo.html\" target=\"_blank\" rel=\"noopener noreferrer\">free online demo<\/a><\/li>\n<li><span>\u2605<\/span> CS-Cart Store Builder: <a href=\"https:\/\/www.cs-cart.com\/store-builder\/demo\" target=\"_blank\" rel=\"noopener noreferrer\">free online demo<\/a><\/li>\n<li><span>\u2605<\/span> Mobile App: <a href=\"https:\/\/apps.apple.com\/us\/app\/multi-vendor-app-by-cs-cart\/id1304872157\" target=\"_blank\" rel=\"noopener noreferrer\">App Store<\/a>, <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.simtech.multivendor\" target=\"_blank\" rel=\"noopener noreferrer\">Google Play<\/a> <\/li>\n<li><span>\u2605<\/span> Cloud Hosting: <a href=\"https:\/\/www.cs-cart.com\/cloud-hosting\" target=\"_blank\" rel=\"noopener noreferrer\">why it&#8217;s the best for CS-Cart<\/a><\/li>\n<li><span>\u2605<\/span> Customer Care: <a href=\"https:\/\/www.cs-cart.com\/support-service\" target=\"_blank\" rel=\"noopener noreferrer\">why it&#8217;s more than just a tech support<\/a><\/li>\n<li><span>\u2605<\/span> Upgrade subscription: <a href=\"https:\/\/helpdesk.cs-cart.com\/upgrade-subscriptions.html\" target=\"_blank\" rel=\"noopener noreferrer\">select and reactivate<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Carding is a type of credit card fraud that happens when a carder (or credit card thief) uses a stolen<\/p>\n","protected":false},"author":31003,"featured_media":14704,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11,5],"tags":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.cs-cart.com\/blog\/wp-content\/uploads\/carding-fraud.jpg?fit=1792%2C1024&ssl=1","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/posts\/14699"}],"collection":[{"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/users\/31003"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/comments?post=14699"}],"version-history":[{"count":1,"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/posts\/14699\/revisions"}],"predecessor-version":[{"id":19181,"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/posts\/14699\/revisions\/19181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/media\/14704"}],"wp:attachment":[{"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/media?parent=14699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/categories?post=14699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cs-cart.com\/blog\/wp-json\/wp\/v2\/tags?post=14699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}