Categories: Cyber Security News

Skim Reaper – Device that Detects Wide Range of Skimmers Stealing Payment Card Data

The Credit and debit cards dominate the major payment landscape, attackers often acquired card data by placing skimmers in legitimate payment terminals. It is difficult to find the skimmer attached.

Researchers from the University of Florida developed Skim Reaper that detects physical properties and necessary constraints for a wide range of skimmers that steal card data.

The Skim Reaper development was developed with the support of the New York Police Department’s (NYPD) Financial Crimes Task Force. NYPD collected skimmer devices around 16 months between 2016-Jul-14 to 2017-Nov-11 and sent the devices to researchers for Skim Reaper development.

Here is the promotional sales video disclosed by two ATM Skimmer providers.

Skim Reaper Usage

The Skim Reaper is a portable payment card-shaped device that relies on intrinsic properties of the magnetic stripe to read additional payment card heads in payment terminals.

Also Read Free Android App that helps you to Detect Credit Card Skimmers at Fuel Pump

In order to find the skimmer the Skim Reaper needs to be inserted in the card slot and that reads the number of payments heads connected with the payment terminals if it is more that one, then there is a skimmer.

The entire Skim Reaper device, consisting of the microcontroller system (left) and the measurement card (right). The card is inserted into a card acceptor, where the number of reading heads is measured by the microcontroller.

Skimmers

Skimmers are essentially malicious card readers that grab the data of the card’s magnetic stripe attached to the real payment terminals so that they can harvest data from every person that swipes their cards.

External Skimmers

These skimmers have no access to internal target machine’s and these skimmers can be deployed in seconds and it difficult to identify.

Internal Skimmers

They are the physical taps installed inside a payment terminal. They intercept the communications
path between the card reader and other components.

10 Real Skimmers From NYPD

Researchers tested the Skim Reaper against the popular real skimmers provided by NYPD and it successfully detected the skimmers. It also detects the deep-insert skimmer by examining its metal body, actually, this skimmer doesn’t have an additional read head.

“Skim Reaper successfully detects every overlay and deep-insert skimmer we have obtained, and as we have shown, making these undetectable relies on overcoming current limitations in reading magnetic stripes, confirming our hypothesis”.

When you approach an ATM, check for some obvious signs of tampering at the top of the ATM, near the speakers, the side of the screen, the card reader itself, and the keyboard.

If something looks different, such as a different color or material, graphics that aren’t aligned correctly, or anything else that doesn’t look right, don’t use that ATM.

Researchers published a whitepaper on the topic “Fear the Reaper: Characterization and Fast Detection of Card Skimmers” and it is you can download it from here.

Also Read

Advanced ATM Penetration Testing Methods

Undetectable ATM “Shimmers” Hacker’s Latest Tool for Steal your Chip Based Card Details from POS Terminal

ATM Skimmer – How to Spot and Avoid Dangerous ATM Insert Skimmer

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

3 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago