Sunday, April 14, 2024

Wiretapping -An ATM Skimming Attack to Steal Customer Data by Setting Hidden Camera & Whole the ATM Machine

U.S. Secret Service warned the new form of ATM Skimming Attack called “Wiretapping” targeting the financial institutions.

Criminals involved in this attack by creating a small size of the hole in the ATM machine and steal the customer data directly from card reader inside of the ATM Mchine.

Magnets and medical devices are used by criminals after creating the whole in ATM in order to steal the data from the card reader.

Attackers directly drill in front of the ATM machine and generate a large whole and it will be closed after they collect the data by placing the metal plate with instructions on how to use the ATM.

Meanwhile, attackers place the skimmer via the whole inside of the ATM and attached it via magnet with the card reader device.

            card skimmer in place above the ATM’s internal card reader

USB-based Endoscope

An attacker using Endoscope which is used by medical industries by physicians to look inside of the body parts.

In order to ensure that the skimmer is correctly attached to the card reader, Attacker using the same Endoscope to look inside of the ATM by connecting it with the mobile using USB.

According to  Secret Service told to krebsonsecurity, “once the skimmer is in place and the hole patched by a metal plate or plastic decal, the skimmer thieves often will wait a day or so to attach the pinhole camera. “The delay is believed to take place to ensure that vibrations from the drilling didn’t trigger an alarm from anti-skimming technology,” the alert reads.”

Setting Hidden Camera – ATM Skimming Attack

If the drilling and placing the skimmer inside of card reader would be successfully finished then the attacker will be satisfied then he leaves the ATM, otherwise, he will set the hidden camera in front of or above the PIN pad, recording each victim entering his or her PIN in a time-stamped video.

According to Kerbs, “it’s getting tougher to spot ATM Skimming Attack devices, many of which are designed to be embedded inside various ATM components. It’s best to focus instead on protecting your own physical security while at the cash machine.”

“If you visit an ATM that looks strange, tampered with, or out of place, try to find another machine. Use only ATMs in public, well-lit areas, and avoid those in secluded spots.”

Most importantly, cover the PIN pad with your hand when entering your PIN: That way, even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well, Krebs said.

You can read Advanced ATM Penetration Testing Methods and also read ATM Black box attacks – ATM Jackpotting.


Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles