Apr 01, 2026 • Recorded Future
Industrialization of the Fraud Ecosystem Blog
Payment fraud has evolved into an industrialized ecosystem with professionalized services enabling large-scale attacks. Magecart e-skimmer operations,...
Executive Summary
Payment fraud has evolved into an industrialized ecosystem with professionalized services enabling large-scale attacks. Magecart e-skimmer operations, particularly the 'Sniffer by Fleras' kit responsible for 26% of infections, and the 'AcceptCar' MaaS offering demonstrate how threat actors can now execute sophisticated fraud without technical expertise. Over 10,500 Magecart infections compromised approximately 23 million transactions in 2025, while 3,600+ scam merchant accounts operated across 40 countries. Telegram-based card testing services validated 27 million card records. The standardization inherent in these industrialized operations creates detectable patterns, offering financial institutions opportunities to detect threats upstream before fraud manifests as financial losses. Transaction monitoring alone is insufficient; organizations must implement pre-monetization detection capabilities to counter these evolved fraud pathways.
Summary
Payment fraud has industrialized, and that's a defensive advantage. Learn how standardized attack infrastructure creates detectable patterns that financial institutions can act on before losses occur.
Published Analysis
Payment fraud has evolved into an industrialized ecosystem with professionalized services enabling large-scale attacks. Magecart e-skimmer operations, particularly the 'Sniffer by Fleras' kit responsible for 26% of infections, and the 'AcceptCar' MaaS offering demonstrate how threat actors can now execute sophisticated fraud without technical expertise. Over 10,500 Magecart infections compromised approximately 23 million transactions in 2025, while 3,600+ scam merchant accounts operated across 40 countries. Telegram-based card testing services validated 27 million card records. The standardization inherent in these industrialized operations creates detectable patterns, offering financial institutions opportunities to detect threats upstream before fraud manifests as financial losses. Transaction monitoring alone is insufficient; organizations must implement pre-monetization detection capabilities to counter these evolved fraud pathways. Payment fraud has industrialized, and that's a defensive advantage. Learn how standardized attack infrastructure creates detectable patterns that financial institutions can act on before losses occur. Payment fraud no longer operates as a collection of discrete schemes run by individual threat actors. It is increasingly sustained by an industrial support ecosystem: purpose-built infrastructure, packaged toolkits, and professionalized services that allow threat actors to maximize fraud output while minimizing the skill and effort required to execute attacks. According to Recorded Future's Annual Payment Fraud Intelligence Report: 2025 , this industrialization was driven by technical advances and increasingly professionalized support services. The Magecart e-skimmer supply chain is the clearest example. Full-stack e-skimmer kits and Malware-as-a-Service (MaaS) offerings have made large-scale compromise of ecommerce websites accessible to less technically capable threat actors. The "Sniffer by Fleras" kit, responsible for 26% of all e-skimmer infections observed in 2025, includes a web-based portal for generating malicious scripts and a management server for stolen data. The result was more than 10,500 unique Magecart infections active at some point during the year, likely compromising more than 23 million transactions. Additionally, the "AcceptCar" e-skimmer, discovered in H2 2025, illustrates how far the service model has matured. Operators handle installation and operation on compromised e-commerce sites; in return, threat actors pay 50% of proceeds from card data sales or 70% of raw data intake. Using services like AcceptCar, fraud threat actors can participate in large-scale compromise operations without owning or managing any underlying infrastructure. Figure 1: Line graph showing Magecart e-skimmer infections in 2025, by different groups, kits, and techniques. (Source: Recorded Future) Purchase scam operations reflect a similar dynamic. Recorded Future Payment Fraud Intelligence identified more than 3,600 scam merchant accounts in 2025, up 2.5x from 2024, spanning at least 40 countries and 230 acquirers. Recurring patterns in merchant registration data indicate that scam operators have standardized their merchant acquisition workflows, standing up fraudulent payment infrastructure at scale through repeatable, low-friction processes. Card testing operates on the same service-economy logic. Telegram-based card testing services validated at least 27 million card records in 2025 through public-facing card generation and testing channels that any threat actor can access. Among dark web checker services, over 1,350 legitimate merchant accounts were abused for card testing, with 94% not observed prior to 2025, suggesting systematic rotation to stay ahead of detection. Figure 2: Graphic illustrating the purchase scam attack chain. (Source: Recorded Future) The Ecosystem Is Concentrated Upstream Notably, each of these industrialized attack vectors sits upstream of the fraudulent transaction . E-skimmer infections and scam merchants compromise card data during online purchases. Card testing validates that stolen data before it’s monetized. Fraud outcomes are visible, but the pathways that enable them are often not. Annual Payment Fraud Intelligence Report: 2025 "Fraud outcomes are visible, but the pathways that enable them are often not." This industrialized scale across these attack vectors requires standardization, and standardization produces detectable patterns. When 26% of e-skimmer infections trace back to a single kit, when scam operators reuse merchant registration patterns across hundreds of acquirers, when card testers rotate through predictable BIN attack workflows, the convergence that makes fraud scalable also makes it mappable. As that standardization deepens, a single indicator of compromise reaches further across the threat landscape. That standardization creates something concrete: a window. Magecart infections are active and identifiable before stolen card data...
Linked Entities
- AcceptCar
- Sniffer by Fleras