SlideShare a Scribd company logo
How we opened a
fake bank account
And didn’t go to prison
Carding market
overview
Let’s do that!
Now what?
• Let’s send them BTC and get our cards! But…
• You can go to prison
• You can loose your money
Instead of that…
How you would have assumed KYC
works
• API for the Driving License and IDs checking
• Collaboration between GOVs (EU, USA, North Korea?)
How KYC actually works
• Liveness check (live capture from the phone, no
photos)
• OCR data extraction
• “No visual tampering”, e.g. playing with
channels
• Proof that the photos were not modified
• Black-lists
• Social media checks
Progressive KYC
• DOB, Address, no actual documents – <£100
• One document (some ID) – <£1,000
• Another document (proof of address) – >£1,000
• Video instead of photo – any suspicions that the
photos are not real
• Live interaction – scrutinize the documents, e.g.
check the hologram
Simulation
How fraudsters bypass KYC
0. Have an agreement in place with the fintech you
are trying to fool
1. Photoshop
2. Getting rid of tampering evidence
3. Fake “plastic” that is suitable for video
4. Fake holograms
5. Stolen addresses, names, IDs – helpful but not
mandatory
1. Photoshop
1. Photoshop
But don’t do that
2. Tampering evidence
3. Liveness check bypass – rooted
phone
3. Liveness check bypass – virtual
camera
4. Photo analysis – EXIF meta-tags
4. Photo analysis - strings
5. Social media, black-lists
Results
Results
It’s extremely easy to bypass
KYC
+ Liveliness check
+ Present modified photos (face, name, details)
+ Visual tampering checks
But don’t do that…
Why fraudsters open current
accs?
• Money laundering
Why fraudsters open current
accs?
Convenience vs security
• DOB, Address, no actual documents – <£100
• One document – <£1,000 <- Should be Level 1
• Another document – >£1,000
• Video instead of photo
• Live interaction
• Endpoint anomaly detection (e.g. Biotech)
• Share data between KYC providers, GOVs, etc
How I opened a fake bank account and didn't go to prison

More Related Content

Similar to How I opened a fake bank account and didn't go to prison

Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101
InnoTech
 
Cyber security - Trend Micro
Cyber security  - Trend MicroCyber security  - Trend Micro
Cyber security - Trend Micro
Auckland Salesforce User Group
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
Callcredit123
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Neo4j
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
Isaac Feliciano
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
fmi_igf
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
Deborah Gonzalez, Esq.
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
HHSome
 
Payments and AML CFT KYC
Payments and AML CFT KYCPayments and AML CFT KYC
Payments and AML CFT KYC
Martin Chan
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
Gabor Szathmari
 
Blockchain overview
Blockchain overviewBlockchain overview
Blockchain overview
Dr.R. Gunavathi Ramasamy
 
Give Me Your Data!
Give Me Your Data!Give Me Your Data!
Give Me Your Data!
Positive Hack Days
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
MaidaShahbaz3
 
7 tips for using behavioural data - 2022.pdf
7 tips for using behavioural data - 2022.pdf7 tips for using behavioural data - 2022.pdf
7 tips for using behavioural data - 2022.pdf
Ray Poynter
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
Accenture the Netherlands
 
Fighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees VegterFighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees Vegter
Neo4j
 
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4jNeo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j
 
moncon - The World's Simplest Paywall
moncon - The World's Simplest Paywallmoncon - The World's Simplest Paywall
moncon - The World's Simplest Paywall
Diego Torres
 

Similar to How I opened a fake bank account and didn't go to prison (20)

Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101
 
Cyber security - Trend Micro
Cyber security  - Trend MicroCyber security  - Trend Micro
Cyber security - Trend Micro
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Payments and AML CFT KYC
Payments and AML CFT KYCPayments and AML CFT KYC
Payments and AML CFT KYC
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Blockchain overview
Blockchain overviewBlockchain overview
Blockchain overview
 
Give Me Your Data!
Give Me Your Data!Give Me Your Data!
Give Me Your Data!
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
7 tips for using behavioural data - 2022.pdf
7 tips for using behavioural data - 2022.pdf7 tips for using behavioural data - 2022.pdf
7 tips for using behavioural data - 2022.pdf
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
Fighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees VegterFighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees Vegter
 
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4jNeo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
 
moncon - The World's Simplest Paywall
moncon - The World's Simplest Paywallmoncon - The World's Simplest Paywall
moncon - The World's Simplest Paywall
 

More from Payment Village

Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Payment Village
 
Offensive Payment Security
Offensive Payment SecurityOffensive Payment Security
Offensive Payment Security
Payment Village
 
The white whales of fraud and where to find them
The white whales of fraud and where to find themThe white whales of fraud and where to find them
The white whales of fraud and where to find them
Payment Village
 
Breaking banks or saving them
Breaking banks or saving themBreaking banks or saving them
Breaking banks or saving them
Payment Village
 
Hack in Cash out OWASP London
Hack in Cash out OWASP LondonHack in Cash out OWASP London
Hack in Cash out OWASP London
Payment Village
 
Ради денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминаловРади денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминалов
Payment Village
 
Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.
Payment Village
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big Brother
Payment Village
 
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемыСМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
Payment Village
 

More from Payment Village (9)

Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
Unlocking Any Door In The 21st Century. Immersion In Biometric Security.
 
Offensive Payment Security
Offensive Payment SecurityOffensive Payment Security
Offensive Payment Security
 
The white whales of fraud and where to find them
The white whales of fraud and where to find themThe white whales of fraud and where to find them
The white whales of fraud and where to find them
 
Breaking banks or saving them
Breaking banks or saving themBreaking banks or saving them
Breaking banks or saving them
 
Hack in Cash out OWASP London
Hack in Cash out OWASP LondonHack in Cash out OWASP London
Hack in Cash out OWASP London
 
Ради денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминаловРади денег. Безопасность платежных терминалов
Ради денег. Безопасность платежных терминалов
 
Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.Launch Impossible Current State of Application Control Bypasses on ATMs.
Launch Impossible Current State of Application Control Bypasses on ATMs.
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big Brother
 
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемыСМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
СМС – «золотой» стандарт двухфакторной аутентификации. Актуальные проблемы
 

Recently uploaded

Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Enterprise Wired
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 

Recently uploaded (20)

Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 

How I opened a fake bank account and didn't go to prison

Editor's Notes

  1. There are a few major activities on the dark market related to stolen cards. The most popular one – is selling card details for online purchases. This is a dying market. But still there are hundreds of stores with hundreds of thousands of stolen cards.
  2. Another one – selling white plastic Add target
  3. Back in the day hackers were even able to clone EMV cards due to their imperfect security. But this would have worked only for offline terminals. These days offline terminals and places where they are operating are numbered.
  4. Another slightly less popular type of business – is selling EMPTY current accounts or real physical cards. So we decided to look a bit into how these are working
  5. People offer you photos of the cardowners, their documents, real cards, login, email, password and will deliver these literally anywhere in the world.
  6. Guys from antifraud industry claim that you can go to prison for sending BTC to guys on the DM. For supporting terrorism, porn tycoons. We were also not sure how many of these Ads is a pure scam.
  7. I am representing the blackhat guy Who am I Definitions: aml, kyc PS: everything that has been done is completely legal
  8. Need a screenshot of the dashboard with OCR recognition
  9. So how fraudsters bypass KYC? The answer is very simple – photoshop!
  10. So that was our plan what to do and how to test our theories. about 1.5 years ago I agreed with one fintech company to show weaknesses of their KYC system. First of all, we need some formal agreement with Then you need photoshop
  11. Step 1 – photoshop. Here’s my driving licence
  12. Unfortunately not all my attempts were successful. Sometimes you got blocked.
  13. Some services check metatags and strings, some – don’t do even that.
  14. Example with Samsung/curve
  15. Example with Samsung/curve