Card Testing
Definition
Card testing is a fraud attack using automated scripts to validate stolen card numbers via small test transactions before exploiting them for larger fraud.
Card testing (also called carding or card checking) is a fraud attack in which a fraudster uses automated scripts to test a large volume of stolen card numbers against a merchant's checkout, typically with small or zero-value transactions, to identify which cards are live and usable before monetising them at scale. Card testing attacks can process thousands of authorization attempts per hour and impose direct costs on merchants through authorization fees, chargeback fees, and scheme monitoring programme thresholds.
Card testing is mechanically simple but commercially damaging. Fraudsters acquire batches of card numbers from dark web markets (typically from data breaches), then need to determine which are active before attempting larger purchases. Merchants with light fraud controls and low-value checkout flows are the preferred testing ground.
How Card Testing Works
A typical card testing operation:
-
Card acquisition: Fraudster purchases a batch of card numbers from dark web carding markets. Prices range from $5 to $50 per card depending on data completeness (card number only vs full CVV + expiry + billing address).
-
Script setup: Automated tools (bots) are configured to submit transactions through a target merchant’s checkout or payment API. The bot rotates through card numbers, shipping addresses, and IP addresses to evade velocity checks.
-
Test transaction type: Fraudsters prefer low-value transactions ($0.01, $1.00) or donations, or merchants that offer free trials with card verification. Some use authorization-only flows that don’t charge the card. The goal is a successful authorization response — not a purchase.
-
Card sorting: Cards that return successful authorizations are flagged as “live.” Cards that return hard declines (lost/stolen, invalid account) are discarded.
-
Monetisation: Live cards are used for high-value purchases at merchants with weaker controls, sold back to other fraudsters at a premium, or used in ATO attacks.
Impact on Merchants
Direct costs:
- Authorization fees on every attempted transaction, including failed ones
- Chargeback fees if test purchases aren’t caught before dispute
- Processing costs from inflated transaction volumes
Scheme monitoring programme risk: Visa and Mastercard monitor merchants for abnormal authorization rates and chargeback ratios. A card testing attack that drives hundreds of failed authorizations in a short period can push a merchant into monitoring programmes (VAMP, MATCH list) with fines and eventually termination.
Infrastructure costs: High-volume bot traffic can stress checkout infrastructure and API rate limits.
Detection Signals
Card testing attacks produce distinct patterns that fraud detection systems can identify:
- Authorization decline spike: Sudden increase in decline rate, particularly for do-not-honour and invalid card responses
- Velocity anomaly: Multiple distinct card numbers attempted from the same IP, device fingerprint, or shipping address in a short window
- Unusually small transaction amounts: Clustering of $0.01–$1.00 transactions
- Sequential BIN patterns: Cards being tested often come from the same BIN range, producing sequential card number attempts
- New device + new card + low-value: This combination has very high card testing signal
Mitigation
CAPTCHA and bot detection: Effective against naive automated scripts. Sophisticated bot operators use CAPTCHA-solving services, reducing but not eliminating friction.
Velocity rules: Limit authorization attempts per device fingerprint, IP, and shipping address per time window.
Minimum transaction values: Eliminate the free trial or $0.01 transaction use case that makes merchants easy testing targets.
3DS2 on unrecognised sessions: Requiring 3DS challenge for first-transaction guests from unrecognised devices significantly raises the cost of automated testing.
Real-time fraud scoring: ML-based fraud models that detect the behavioral signature of card testing (velocity, pattern, session characteristics) can block attacks within the first few dozen attempts rather than after thousands.
Related terms
Account Takeover (ATO)
Account takeover (ATO) is a fraud attack in which a bad actor gains unauthorised...
BIN
A Bank Identification Number (BIN), also called Issuer Identification Number (II...
Chargeback Ratio
Chargeback ratio is the percentage of a merchant's transactions that result in a...
PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security ...
Velocity Check
A velocity check is a fraud detection control that counts the frequency of a spe...