Cloaking Models
Technical analysis of multi-site funnels, redirect masking, and bridge networks.
Deconstructing high-risk evasion techniques for risk professionals.
RSD is a specialized educational resource dedicated to understanding Payment Cloaking—the deceptive techniques used by high-risk merchants to bypass underwriting and fraud monitoring systems.
This documentation focuses on the technical mechanics of Merchant Category Obfuscation, Website Spoofing, and Transaction Masking.
Payment Cloaking refers to the set of technologies and operational behaviors employed by merchants to disguise the true nature of their business from Payment Service Providers (PSPs), Acquirers, and Card Schemes.
Unlike traditional fraud (stolen cards), the merchant here is often the "bad actor," attempting to process payments for prohibited or high-risk goods (e.g., pharmaceuticals, adult content, unlicensed gambling) by presenting themselves as a low-risk business (e.g., clothing retail, digital marketing, or tech support).
Core Evasion Techniques:
For acquiring banks and payment processors, undetected Payment Cloaking creates significant systemic risk:
We break down the architecture of evasion:
The "Hub and Spoke" model where multiple high-risk landing pages feed traffic into a single, seemingly clean payment gateway URL via background redirects.
Intermediate "clean" sites that exist solely to justify the existence of a merchant account. These sites often have generic inventory, broken links, or "dummy" checkout flows.
Advanced semantic evasion techniques such as Soft Brand Mismatch, Platform-Inside-Platform, and Reseller Aggregation.
Educational Purpose Only
This project is designed to educate security professionals, risk architects, and compliance teams on defense strategies against payment abuse. The techniques described herein are for detection, analysis, and prevention purposes only. We do not condone, support, or encourage any form of payment fraud, laundering, or illegal commerce.