Dark Web & Fraud Dictionary — Common Terms Explained

Online criminal forums employ specialized terminology that can be difficult for outsiders to understand. This type of specialized language is known as a cant or cryptolect, a private vocabulary used by a subgroup to obscure their conversations from outsiders.

This document focuses specifically on the cant used in contemporary cybercrime communities. The terminology found in underground Telegram channels and dark web forums evolves continuously. The terms documented here are drawn from multiple sources, including industry terminology and fraud tutorials found within these communities.

This reference will be updated periodically as the language continues to evolve.

Payment Card Data & Types

  • CC / CCN – Credit Card or full credit card number without the CVV.
  • CVV (Card Verification Value) – A 3-4 digit security code found on the back of cards used to verify transactions.
  • Bins – Bank identification numbers, the first 6-8 digits of a card identifying the issuing bank and card type.
  • Dump – Raw magnetic stripe data containing card details in track1/track2 format. Used to create physical cloned cards.
  • Linkable – Cards easily added to digital payment apps like CashApp, Apple Pay, or Google Pay.
  • Fresh – New unused cards or methods with no fraud history.
  • Dead – Card or method that no longer works.
  • Limit – Maximum amount that can be charged.
  • Balance – Amount of money available on a card.

Card Cloning & Physical Fraud

  • Cloning – Copying card data onto blank cards to create physical duplicates. Requires dumps, an MSR (Magnetic Stripe Reader), and proper encoding settings.
  • MSR (Magnetic Stripe Reader) – A device that reads and writes card data to magnetic stripes. Used by fraud actors to create physical cloned cards from dumps.
  • EMV – Chip card technology making cloning harder.
  • Dipping – Repeatedly inserting a cloned card into a terminal to force magstripe reading instead of the chip.
  • Skimmer – Device stealing card data at ATMs or POS.
  • POS (Point of Sale) – Device for in-store transactions.

Card Testing & Validation

  • Checker – Tool testing if cards are valid and active.
  • Auth (Authorization code) – Proves a transaction was approved.
  • Auth Check – Small test charge to verify a card works.
  • AVS (Address Verification System) – Matches billing address to card records for security.

Payment Security Systems

  • 3DS (3D Secure) – Authentication protocol adding an extra security layer for online card payments.
  • VBV (Verified by Visa) – Visa's version of 3DS, often used generically for 3D Secure.
  • MCSC (Mastercard Secure Code) – Mastercard's online authentication system.
  • AMEX SafeKey – American Express's verification system for online purchases.

Personal Identity Information

  • Fullz – Complete identity information package including name, address, Social Security Number (SSN), date of birth, and other personal details required to verify identities.
  • SSN (Social Security Number) – Key U.S. identity data for verification.
  • DOB (Date of Birth) – Used for identity verification.
  • MMN (Mother's Maiden Name) – Common security question.
  • PIN – Needed for debit transactions and ATM withdrawals.

Account Credentials & Access

  • Logs – Stolen login credentials and session data from hacked accounts.
  • Cookies – Stolen session data enabling access without passwords.
  • Bank Drop – Bank accounts opened with fake or stolen identities.

Identity Verification & Evasion

  • KYC (Know Your Customer) – Verification requiring ID and sometimes selfies.
  • Antidetect – Browser software spoofing fingerprints to appear as different users, avoiding detection.
  • Burner – Temporary disposable phone number or email.
  • SIM Swapping – Gaining control of phone numbers for 2FA bypass.

Money Movement & Banking Systems

  • ACH (Automated Clearing House) – U.S. bank transfer system, exploited for fraud.
  • Wire – Bank-to-bank transfers with higher scrutiny.
  • SWIFT – International transfer network.
  • EMT (Electronic Money Transfer) – Instant transfer systems targeted by fraud.
  • Zelle – Instant transfer platform popular in fraud schemes.

Money Laundering & Cash out

  • Cash out – Converting stolen funds into clean cash through gift cards, Bitcoin, etc.
  • Loader – Fraudster specializing in loading stolen funds into accounts.
  • Receiver (Money Mule) – Person forwarding stolen funds for a commission.
  • Reship – Service forwarding packages to add a layer of anonymity.

Social Engineering Techniques

  • SE (Social Engineering) – Manipulating people to reveal information or grant access.
  • Phishing – Fake websites/emails to steal credentials.
  • Letter – Fake email template mimicking legitimate companies.

Common Scam Types

  • Romance Scams – Fake online relationships to extract money.
  • Tech Support Scams – Pretending to fix computer issues for payment or access.
  • Advance Fee Fraud – Upfront payment scams (419, lottery, inheritance).
  • Yahoo Boys – Nigerian-origin cybercriminals specializing in romance/BEC scams.

Anonymity & Network Tools

  • VPN (Virtual Private Network) – Hides IP address, basic anonymity.
  • Residential Proxies – Proxies using real home IPs for authenticity.
  • Socks Proxies – Secure proxy type for fraud operations.
  • WebRTC Leak – Browser vulnerability exposing real IP.
  • RDP (Remote Desktop Protocol) – Remote access tool used for fraud operations.

Malicious Infrastructure

  • Botnet – Network of compromised computers for credential theft.
  • Mailer / PHP Mailer – Tools for mass spam campaigns.
  • SMTP – Email transmission protocol used in spam.
  • Cpanel – Hosting panel used for phishing sites.

Detection Evasion

  • OpSec – Practices to avoid detection (e.g., using encrypted messaging, PGP).
  • PGP (Pretty Good Privacy) – Encryption for secure comms.
  • Blacklist – List of blocked IPs/domains.
  • Warmup – Gradually increasing email sends to avoid spam flags.
  • Spamtrap – Fake emails to catch spammers.
  • Spam – Mass sending unsolicited messages for fraud.

Cryptocurrency

  • BTC (Bitcoin) – Most common dark web currency.
  • XMR (Monero) – Preferred privacy coin, harder to trace.

Dark Web Marketplace Terms

  • Vendor – Seller on dark web markets.
  • Escrow – Third-party holding funds for trades.
  • Exit Scam – Market/vendor disappearing with funds.

General Operational Terms

  • Method – Specific technique for successful fraud.
  • Sauce – A working fraud method.
  • Burn – When a method stops working.