Saturday, February 8, 2025
HomeCyber AttackWiretapping -An ATM Skimming Attack to Steal Customer Data by Setting Hidden...

Wiretapping -An ATM Skimming Attack to Steal Customer Data by Setting Hidden Camera & Whole the ATM Machine

Published on

SIEM as a Service

Follow Us on Google News

U.S. Secret Service warned the new form of ATM Skimming Attack called “Wiretapping” targeting the financial institutions.

Criminals involved in this attack by creating a small size of the hole in the ATM machine and steal the customer data directly from card reader inside of the ATM Mchine.

Magnets and medical devices are used by criminals after creating the whole in ATM in order to steal the data from the card reader.

Attackers directly drill in front of the ATM machine and generate a large whole and it will be closed after they collect the data by placing the metal plate with instructions on how to use the ATM.

Meanwhile, attackers place the skimmer via the whole inside of the ATM and attached it via magnet with the card reader device.

            card skimmer in place above the ATM’s internal card reader

USB-based Endoscope

An attacker using Endoscope which is used by medical industries by physicians to look inside of the body parts.

In order to ensure that the skimmer is correctly attached to the card reader, Attacker using the same Endoscope to look inside of the ATM by connecting it with the mobile using USB.

According to  Secret Service told to krebsonsecurity, “once the skimmer is in place and the hole patched by a metal plate or plastic decal, the skimmer thieves often will wait a day or so to attach the pinhole camera. “The delay is believed to take place to ensure that vibrations from the drilling didn’t trigger an alarm from anti-skimming technology,” the alert reads.”

Setting Hidden Camera – ATM Skimming Attack

If the drilling and placing the skimmer inside of card reader would be successfully finished then the attacker will be satisfied then he leaves the ATM, otherwise, he will set the hidden camera in front of or above the PIN pad, recording each victim entering his or her PIN in a time-stamped video.

https://youtu.be/JbDdsUh_sTg

According to Kerbs, “it’s getting tougher to spot ATM Skimming Attack devices, many of which are designed to be embedded inside various ATM components. It’s best to focus instead on protecting your own physical security while at the cash machine.”

“If you visit an ATM that looks strange, tampered with, or out of place, try to find another machine. Use only ATMs in public, well-lit areas, and avoid those in secluded spots.”

Most importantly, cover the PIN pad with your hand when entering your PIN: That way, even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well, Krebs said.

You can read Advanced ATM Penetration Testing Methods and also read ATM Black box attacks – ATM Jackpotting.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...