Resellers may buy 'packs' of dumps from multiple sources. Stolen data may be bundled as a 'Base' or 'First-hand base' if the seller participated in the theft themselves. Resale A management interface from the AlphaBay darknet market Randomly calling hotel room phones asking guests to 'confirm' credit card details is example of a social engineering attack vector. Today, various methodologies include skimmers at ATMs, hacking or web skimming an ecommerce or payment processing site or even intercepting card data within a point of sale network. Carders might attempt a 'distributed guessing attack' to discover valid numbers by submitting numbers across a high number of ecommerce sites simultaneously. Some bank card numbers can be semi-automatically generated based on known sequences via a 'BIN attack'. The earliest known carding methods have also included 'trashing' for financial data, raiding mail boxes and working with insiders.
There are a great many of methods to acquire credit card and associated financial and personal data. Modern carding sites have been described as full-service commercial entities. Activities also encompass exploitation of personal data, and money laundering techniques.
The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Carding is a term describing the trafficking and unauthorized use of credit cards.