ATM Skimmer – How to Spot and Avoid Dangerous ATM Insert Skimmer

Skimmer: The threat on ATM fraud devices known as “insert skimmers,” these thin data theft tools made to be completely hidden inside of a cash’s machine’s card acceptance slot.

What Are Skimmers?
Skimmers are essentially malicious card readers that grab the data of the card’s magnetic stripe attached to the real payment terminals so that they can harvest data from every person that swipes their cards.

For a near look, how stealthy insert skimmers can be, it helps to see videos of these things being installed and removed. Here is the promotional sales video disclosed by two ATM Skimmer providers.

Traditional ATM skimmers are fraud devices made to be placed over the top of the cash machine’s card acceptance slot, usually secured to the ATM with glue or double-sided tape.

Now financial institution is tweaking their technologies to detect anything placed over the machines. As a result, more fraudsters are selling and using insert skimming devices — which are completely hidden from view once inserted into an ATM.

A sales video produced by yet another miscreant in the cybercrime underground shows an insert skimmer being installed and removed from a motorized card acceptance slot that has been fully removed from an ATM so that the fraud device can be seen even while it is inserted.

In a typical setup, insert skimmers capture payment card data from the magnetic stripe on the backs of cards inserted into a hacked ATM, while a pinhole spy camera hidden above or beside the PIN pad records time-stamped video of cardholders entering their PINs. The data allows thieves to fabricate new cards and use PINs to withdraw cash from victim accounts.

Covering the PIN pad with your hand blocks any hidden camera from capturing your PIN — and hidden cameras are used on the vast majority of the more than three dozen ATM skimming incidents.

Also Read: Undetectable ATM “Shimmers” Hacker’s Latest Tool for Steal your Chip Based Card Details from POS Terminal

Check for Tampering

When you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard. If something looks different, such as a different color or material, graphics that aren’t aligned correctly, or anything else that doesn’t look right, don’t use that ATM. The same is true for credit card readers.

There are few steps everyone needs to minimize the skimmer Gang Success
  1. Cover the PIN pad while you enter your PIN
  2. Try to avoid dodgy-looking and standalone cash machines in low-lit areas, if possible.
  3. Stick to ATMs that are physically installed in a bank. Stand-alone ATMs are usually easier for thieves to hack.
  4. Be especially vigilant when withdrawing cash on the weekends; thieves tend to install skimming devices on a weekend — when they know the bank won’t be open again for more than 24 hours.
  5. Keep a close eye on your bank statements, and dispute any unauthorized charges or withdrawals immediately.

If you like this piece of information and like to know to learn more skimmers, check out the series provided by kerbs All About Skimmers. Also, check the Advanced ATM Penetration Testing Methods.

Also Read:

ATMJackpot – New ATM Malware Steal Your Money From ATM using ATM Jackpotting Technique

Smartwatches and Fitness Trackers can Spy Your ATM PIN Number & Unlock Smartphone

In a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000) from 32 ATMs

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…

5 hours ago

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…

6 hours ago

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…

7 hours ago

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…

7 hours ago

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…

7 hours ago

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…

8 hours ago