Wednesday, January 22, 2025
HomeCyber AttackWiretapping -An ATM Skimming Attack to Steal Customer Data by Setting Hidden...

Wiretapping -An ATM Skimming Attack to Steal Customer Data by Setting Hidden Camera & Whole the ATM Machine

Published on

SIEM as a Service

Follow Us on Google News

U.S. Secret Service warned the new form of ATM Skimming Attack called “Wiretapping” targeting the financial institutions.

Criminals involved in this attack by creating a small size of the hole in the ATM machine and steal the customer data directly from card reader inside of the ATM Mchine.

Magnets and medical devices are used by criminals after creating the whole in ATM in order to steal the data from the card reader.

Attackers directly drill in front of the ATM machine and generate a large whole and it will be closed after they collect the data by placing the metal plate with instructions on how to use the ATM.

Meanwhile, attackers place the skimmer via the whole inside of the ATM and attached it via magnet with the card reader device.

            card skimmer in place above the ATM’s internal card reader

USB-based Endoscope

An attacker using Endoscope which is used by medical industries by physicians to look inside of the body parts.

In order to ensure that the skimmer is correctly attached to the card reader, Attacker using the same Endoscope to look inside of the ATM by connecting it with the mobile using USB.

According to  Secret Service told to krebsonsecurity, “once the skimmer is in place and the hole patched by a metal plate or plastic decal, the skimmer thieves often will wait a day or so to attach the pinhole camera. “The delay is believed to take place to ensure that vibrations from the drilling didn’t trigger an alarm from anti-skimming technology,” the alert reads.”

Setting Hidden Camera – ATM Skimming Attack

If the drilling and placing the skimmer inside of card reader would be successfully finished then the attacker will be satisfied then he leaves the ATM, otherwise, he will set the hidden camera in front of or above the PIN pad, recording each victim entering his or her PIN in a time-stamped video.

https://youtu.be/JbDdsUh_sTg

According to Kerbs, “it’s getting tougher to spot ATM Skimming Attack devices, many of which are designed to be embedded inside various ATM components. It’s best to focus instead on protecting your own physical security while at the cash machine.”

“If you visit an ATM that looks strange, tampered with, or out of place, try to find another machine. Use only ATMs in public, well-lit areas, and avoid those in secluded spots.”

Most importantly, cover the PIN pad with your hand when entering your PIN: That way, even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well, Krebs said.

You can read Advanced ATM Penetration Testing Methods and also read ATM Black box attacks – ATM Jackpotting.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

The Growing Role of AI-Powered SAST in the Developer Toolkit

In today’s app dev world, where new apps and millions of lines of code...

Ex-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

A former CIA analyst, Asif William Rahman, has pleaded guilty to charges of retaining...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...

Criminal IP and OnTheHub Partner to Deliver Advanced Cybersecurity Solutions for Education

AI SPERA, a leading Cyber Threat Intelligence (CTI) provider, has collaborated with OnTheHub, a...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

The Growing Role of AI-Powered SAST in the Developer Toolkit

In today’s app dev world, where new apps and millions of lines of code...

Ex-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

A former CIA analyst, Asif William Rahman, has pleaded guilty to charges of retaining...

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...