Thursday, December 26, 2024
HomeComputer SecurityATM Skimmer - How to Spot and Avoid Dangerous ATM Insert Skimmer

ATM Skimmer – How to Spot and Avoid Dangerous ATM Insert Skimmer

Published on

SIEM as a Service

Skimmer: The threat on ATM fraud devices known as “insert skimmers,” these thin data theft tools made to be completely hidden inside of a cash’s machine’s card acceptance slot.

What Are Skimmers?
Skimmers are essentially malicious card readers that grab the data of the card’s magnetic stripe attached to the real payment terminals so that they can harvest data from every person that swipes their cards.

For a near look, how stealthy insert skimmers can be, it helps to see videos of these things being installed and removed. Here is the promotional sales video disclosed by two ATM Skimmer providers.

- Advertisement - SIEM as a Service

Traditional ATM skimmers are fraud devices made to be placed over the top of the cash machine’s card acceptance slot, usually secured to the ATM with glue or double-sided tape.

Now financial institution is tweaking their technologies to detect anything placed over the machines. As a result, more fraudsters are selling and using insert skimming devices — which are completely hidden from view once inserted into an ATM.

A sales video produced by yet another miscreant in the cybercrime underground shows an insert skimmer being installed and removed from a motorized card acceptance slot that has been fully removed from an ATM so that the fraud device can be seen even while it is inserted.

In a typical setup, insert skimmers capture payment card data from the magnetic stripe on the backs of cards inserted into a hacked ATM, while a pinhole spy camera hidden above or beside the PIN pad records time-stamped video of cardholders entering their PINs. The data allows thieves to fabricate new cards and use PINs to withdraw cash from victim accounts.

Covering the PIN pad with your hand blocks any hidden camera from capturing your PIN — and hidden cameras are used on the vast majority of the more than three dozen ATM skimming incidents.

atm-1

Also Read: Undetectable ATM “Shimmers” Hacker’s Latest Tool for Steal your Chip Based Card Details from POS Terminal

Check for Tampering

When you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard. If something looks different, such as a different color or material, graphics that aren’t aligned correctly, or anything else that doesn’t look right, don’t use that ATM. The same is true for credit card readers.

There are few steps everyone needs to minimize the skimmer Gang Success
  1. Cover the PIN pad while you enter your PIN
  2. Try to avoid dodgy-looking and standalone cash machines in low-lit areas, if possible.
  3. Stick to ATMs that are physically installed in a bank. Stand-alone ATMs are usually easier for thieves to hack.
  4. Be especially vigilant when withdrawing cash on the weekends; thieves tend to install skimming devices on a weekend — when they know the bank won’t be open again for more than 24 hours.
  5. Keep a close eye on your bank statements, and dispute any unauthorized charges or withdrawals immediately.

If you like this piece of information and like to know to learn more skimmers, check out the series provided by kerbs All About Skimmers. Also, check the Advanced ATM Penetration Testing Methods.

Also Read:

ATMJackpot – New ATM Malware Steal Your Money From ATM using ATM Jackpotting Technique

Smartwatches and Fitness Trackers can Spy Your ATM PIN Number & Unlock Smartphone

In a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000) from 32 ATMs

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability...

USA Launched Cyber Attack on Chinese Technology Firms

The Chinese National Internet Emergency Center (CNIE) has revealed two significant cases of cyber...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and...