Friday, March 29, 2024

Wiretapping -An ATM Skimming Attack to Steal Customer Data by Setting Hidden Camera & Whole the ATM Machine

U.S. Secret Service warned the new form of ATM Skimming Attack called “Wiretapping” targeting the financial institutions.

Criminals involved in this attack by creating a small size of the hole in the ATM machine and steal the customer data directly from card reader inside of the ATM Mchine.

Magnets and medical devices are used by criminals after creating the whole in ATM in order to steal the data from the card reader.

Attackers directly drill in front of the ATM machine and generate a large whole and it will be closed after they collect the data by placing the metal plate with instructions on how to use the ATM.

Meanwhile, attackers place the skimmer via the whole inside of the ATM and attached it via magnet with the card reader device.

            card skimmer in place above the ATM’s internal card reader

USB-based Endoscope

An attacker using Endoscope which is used by medical industries by physicians to look inside of the body parts.

In order to ensure that the skimmer is correctly attached to the card reader, Attacker using the same Endoscope to look inside of the ATM by connecting it with the mobile using USB.

According to  Secret Service told to krebsonsecurity, “once the skimmer is in place and the hole patched by a metal plate or plastic decal, the skimmer thieves often will wait a day or so to attach the pinhole camera. “The delay is believed to take place to ensure that vibrations from the drilling didn’t trigger an alarm from anti-skimming technology,” the alert reads.”

Setting Hidden Camera – ATM Skimming Attack

If the drilling and placing the skimmer inside of card reader would be successfully finished then the attacker will be satisfied then he leaves the ATM, otherwise, he will set the hidden camera in front of or above the PIN pad, recording each victim entering his or her PIN in a time-stamped video.

https://youtu.be/JbDdsUh_sTg

According to Kerbs, “it’s getting tougher to spot ATM Skimming Attack devices, many of which are designed to be embedded inside various ATM components. It’s best to focus instead on protecting your own physical security while at the cash machine.”

“If you visit an ATM that looks strange, tampered with, or out of place, try to find another machine. Use only ATMs in public, well-lit areas, and avoid those in secluded spots.”

Most importantly, cover the PIN pad with your hand when entering your PIN: That way, even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well, Krebs said.

You can read Advanced ATM Penetration Testing Methods and also read ATM Black box attacks – ATM Jackpotting.

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles