ATM Skimmer – How to Spot and Avoid Dangerous ATM Insert Skimmer

Skimmer: The threat on ATM fraud devices known as “insert skimmers,” these thin data theft tools made to be completely hidden inside of a cash’s machine’s card acceptance slot.

What Are Skimmers?
Skimmers are essentially malicious card readers that grab the data of the card’s magnetic stripe attached to the real payment terminals so that they can harvest data from every person that swipes their cards.

For a near look, how stealthy insert skimmers can be, it helps to see videos of these things being installed and removed. Here is the promotional sales video disclosed by two ATM Skimmer providers.

Traditional ATM skimmers are fraud devices made to be placed over the top of the cash machine’s card acceptance slot, usually secured to the ATM with glue or double-sided tape.

Now financial institution is tweaking their technologies to detect anything placed over the machines. As a result, more fraudsters are selling and using insert skimming devices — which are completely hidden from view once inserted into an ATM.

A sales video produced by yet another miscreant in the cybercrime underground shows an insert skimmer being installed and removed from a motorized card acceptance slot that has been fully removed from an ATM so that the fraud device can be seen even while it is inserted.

In a typical setup, insert skimmers capture payment card data from the magnetic stripe on the backs of cards inserted into a hacked ATM, while a pinhole spy camera hidden above or beside the PIN pad records time-stamped video of cardholders entering their PINs. The data allows thieves to fabricate new cards and use PINs to withdraw cash from victim accounts.

Covering the PIN pad with your hand blocks any hidden camera from capturing your PIN — and hidden cameras are used on the vast majority of the more than three dozen ATM skimming incidents.

Also Read: Undetectable ATM “Shimmers” Hacker’s Latest Tool for Steal your Chip Based Card Details from POS Terminal

Check for Tampering

When you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard. If something looks different, such as a different color or material, graphics that aren’t aligned correctly, or anything else that doesn’t look right, don’t use that ATM. The same is true for credit card readers.

There are few steps everyone needs to minimize the skimmer Gang Success
  1. Cover the PIN pad while you enter your PIN
  2. Try to avoid dodgy-looking and standalone cash machines in low-lit areas, if possible.
  3. Stick to ATMs that are physically installed in a bank. Stand-alone ATMs are usually easier for thieves to hack.
  4. Be especially vigilant when withdrawing cash on the weekends; thieves tend to install skimming devices on a weekend — when they know the bank won’t be open again for more than 24 hours.
  5. Keep a close eye on your bank statements, and dispute any unauthorized charges or withdrawals immediately.

If you like this piece of information and like to know to learn more skimmers, check out the series provided by kerbs All About Skimmers. Also, check the Advanced ATM Penetration Testing Methods.

Also Read:

ATMJackpot – New ATM Malware Steal Your Money From ATM using ATM Jackpotting Technique

Smartwatches and Fitness Trackers can Spy Your ATM PIN Number & Unlock Smartphone

In a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000) from 32 ATMs

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

9 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

9 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

12 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

15 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

16 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

17 hours ago