Friday, January 31, 2025
HomeCyber Security NewsSkim Reaper - Device that Detects Wide Range of Skimmers Stealing Payment...

Skim Reaper – Device that Detects Wide Range of Skimmers Stealing Payment Card Data

Published on

SIEM as a Service

Follow Us on Google News

The Credit and debit cards dominate the major payment landscape, attackers often acquired card data by placing skimmers in legitimate payment terminals. It is difficult to find the skimmer attached.

Researchers from the University of Florida developed Skim Reaper that detects physical properties and necessary constraints for a wide range of skimmers that steal card data.

The Skim Reaper development was developed with the support of the New York Police Department’s (NYPD) Financial Crimes Task Force. NYPD collected skimmer devices around 16 months between 2016-Jul-14 to 2017-Nov-11 and sent the devices to researchers for Skim Reaper development.

Here is the promotional sales video disclosed by two ATM Skimmer providers.

Skim Reaper Usage

The Skim Reaper is a portable payment card-shaped device that relies on intrinsic properties of the magnetic stripe to read additional payment card heads in payment terminals.

Also Read Free Android App that helps you to Detect Credit Card Skimmers at Fuel Pump

In order to find the skimmer the Skim Reaper needs to be inserted in the card slot and that reads the number of payments heads connected with the payment terminals if it is more that one, then there is a skimmer.

The entire Skim Reaper device, consisting of the microcontroller system (left) and the measurement card (right). The card is inserted into a card acceptor, where the number of reading heads is measured by the microcontroller.

Skimmers

Skimmers are essentially malicious card readers that grab the data of the card’s magnetic stripe attached to the real payment terminals so that they can harvest data from every person that swipes their cards.

External Skimmers

These skimmers have no access to internal target machine’s and these skimmers can be deployed in seconds and it difficult to identify.

Internal Skimmers

They are the physical taps installed inside a payment terminal. They intercept the communications
path between the card reader and other components.

10 Real Skimmers From NYPD

Researchers tested the Skim Reaper against the popular real skimmers provided by NYPD and it successfully detected the skimmers. It also detects the deep-insert skimmer by examining its metal body, actually, this skimmer doesn’t have an additional read head.

“Skim Reaper successfully detects every overlay and deep-insert skimmer we have obtained, and as we have shown, making these undetectable relies on overcoming current limitations in reading magnetic stripes, confirming our hypothesis”.

When you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard.

If something looks different, such as a different color or material, graphics that aren’t aligned correctly, or anything else that doesn’t look right, don’t use that ATM.

Researchers published a whitepaper on the topic “Fear the Reaper: Characterization and Fast Detection of Card Skimmers” and it is you can download it from here.

Also Read

Advanced ATM Penetration Testing Methods

Undetectable ATM “Shimmers” Hacker’s Latest Tool for Steal your Chip Based Card Details from POS Terminal

ATM Skimmer – How to Spot and Avoid Dangerous ATM Insert Skimmer

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...