eCommerce Fraud Knowledge Guide

Card Testing

  1. Articles
  2. eCommerce Fraud
  3. Card Testing
  4. Common Card Testing Tactics
Card Testing

Knowledge Guide Chapters

  1. What is Card Testing?
  2. Common Card Testing Tactics
  3. Card Testing Statistics & Financial Impact
  4. Card Testing Examples
  5. How to Identify Card Testing
  6. How to Prevent Card Testing

Common Card Testing TacticsHow Fraudsters Conduct Card Testing Scams Using Your Checkout System

Shelley Palmer | August 26, 2025 | 2 min read
Common Card Testing Tactics

Card Testing Tactics: The Fraudster’s Playbook

Although card testing might seem like brute force, it’s usually a calculated and often automated assault.

Fraudsters don’t manually type in stolen credit card numbers one by one. Instead, they deploy sophisticated bots and scripts to do the dirty work, which run through hundreds or thousands of stolen credentials in the time it takes you to click a few buttons. In this article, we’ll take a closer look at how card testing works and explore the tactics scammers use to fly under the radar.

Card Testing

Criminals validate stolen credit card information by making small, inconspicuous purchases. Once they confirm the card details are valid, they may proceed to make larger unauthorized transactions. This tactic helps fraudsters avoid detection until they have successfully exploited the stolen card.

How Does Card Testing Work?

The scammer may attempt purchases with several new accounts at once to evade detection, circumvent bans, and test multiple card numbers simultaneously. They’ll cycle through IP addresses to hide their geolocation information, or try to mimic legitimate buyer behavior.

The process will usually go something like this:

Scammer Acquires Card Data

Step #1 | Scammer Acquires Card Data

The process starts with the fraudster obtaining a large volume of credit card numbers. This can be done first-hand through a data breach or a phishing scam, or they can be purchased on the dark web from other hackers.

Scammer Sets Up Script to Automate Card Testing

Step #2 | Scammer Sets Up Script to Automate Card Testing

Once in possession of the stolen card numbers, the actual testing begins. Because the fraudster presumably has hundreds of thousands of stolen cards to test, they’ll usually deploy bots or write scripts to automate away the tedious process of filling out checkout forms.

Script Attempts Small-Dollar Transactions

Step #3 | Script Attempts Small-Dollar Transactions

In each of these tests, the fraudster will attempt to make small-dollar purchases, usually under $5. Sometimes, the scammer will even make purchases that are under $1; really trying to stretch the allowable card balance for any active card numbers found. The purpose of these small transactions is to determine if the card is active, and has not yet been canceled or flagged as stolen.

What Do Scammers Do Next?

If the small charges go through, the fraudster knows that the credit card number is active and valid. They can then use this information to make larger purchases. 

Alternately, some card testers may opt to resell individual credit card numbers on the dark web. Numbers that have been verified and are active can sell for a much higher price point. In some cases, the fraudsters may even use the information to create counterfeit credit cards and use them for in-person purchases.

Next Chapter

Card Testing Statistics & Financial Impact

We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form