Wednesday, May 14, 2025
HomeSecurity NewsFree Android App that helps you to Detect Credit Card Skimmers at...

Free Android App that helps you to Detect Credit Card Skimmers at Fuel Pump

Published on

SIEM as a Service

Follow Us on Google News

Skimmer Scanner Android App Published by Nathan Seidle CEO of sparkfun, it is open source and available to download from Google Play Store for Android users.

Skimmers are essentially malicious card readers that grab the data of the card’s magnetic stripe attached to the real payment terminals so that they can harvest data from every person that swipes their cards.

How does Skimmer Scanner work?

Skimmers are cheap and becoming more common now, basically, it launches a man in the middle attack and listens all the serial traffic passed between credit card readers and save it to external disks.

- Advertisement - Google News

Later the attackers came to the compromised Fuel pump and connect with Bluetooth and all the information transferred over the air.

Also Read ATM Insert Skimmer | Near look | How to Spot and Avoid

Skimmer Scanner detects common Bluetooth based credit card skimmers that used in Gas Stations, then app used to scan for default password of 1234. Once the connection established letter P will be sent and if the response is M then there is a skimmer with (5 to 15 feet).

Seidle published the app in Google Play and the open source available from GitHub.

Here you can see the Stealthy skimmer being installed and removed, sales video disclosed by ATM Skimmer providers.

Check for Tampering

When you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard.

If something looks different, such as a different color or material, graphics that aren’t aligned correctly, or anything else that doesn’t look right, don’t use that ATM. The same is true for credit card readers.

There are few steps everyone needs to minimize the skimmer Gang Success

  • Cover the PIN pad while you enter your PIN.
  • Try to avoid dodgy-looking and standalone cash machines in low-lit areas, if possible.
  • Stick to ATMs that are physically installed in a bank. Stand-alone ATMs are usually easier for thieves to hack.
  • Be especially vigilant when withdrawing cash on the weekends; thieves tend to install
  • skimming devices on a weekend — when they know the bank won’t be open again for more than 24 hours.
  • Keep a close eye on your bank statements, and dispute any unauthorized charges or withdrawals immediately.
  • If you like this piece of information and like to know learn more skimmers, check out the series provided by kerbs All About Skimmers.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access

Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows...

Earth Ammit Hackers Deploy New Tools to Target Military Drones

The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking...

New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks

Critical zero-day vulnerability in Microsoft’s Scripting Engine (CVE-2025-30397) has been confirmed to enable remote...

Critical Microsoft Office Vulnerabilities Enable Malicious Code Execution

Microsoft has addressed three critical security flaws in its Office suite, including two vulnerabilities...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...