The U.S. Secret Service has released a warning to financial institutions regarding an increase in ATM wiretapping attacks. According to Krebs on Security ATM wiretapping attacks required physical contact. The attackers drill a cupcake sized hole in the cash machine and use a combination of magnets and medical devices to extract customer data directly from the card reader inside the data. The hole will be covered using a metal faceplate, or with a decal featuring the bank’s logo or boilerplate instructions on how to use the ATM. [caption id="attachment_6937" align="alignnone" width="659"]
A thin metal faceplate is often used to conceal the hole drilled into the front of the ATM. The PIN pad shield pictured here is equipped with a hidden spy camera. Source: Krebs on Security[/caption] The card skimming device inserted through the hole and attached to internal card reader using a magnet. [caption id="attachment_6938" align="alignnone" width="506"]
Thieves often use a magnet to secure their card skimmer in place above the ATM’s internal card reader. Image: U.S. Secret Service. Source: Krebs on Security[/caption] In some case, the attackers also use endoscope devices to install the skimmer devices. By using USB based endoscope connected to the phone and the attackers can see inside of ATM device and make sure the device is placed properly. “The Secret Service says once the skimmer is in place and the hole patched by a metal plate or plastic decal, the skimmer thieves often will wait a day or so to attach the pinhole camera. “The delay is believed to take place to ensure that vibrations from the drilling didn’t trigger an alarm from anti-skimming technology,” the alert reads.”
Attackers wait one or two days after installing the skimmer device to make sure it didn't set off any internal alarms. If success the attacker goes to the final step of the process which installing a hidden camera. A hidden camera will be installed in front of or above the PIN pad which records customer entering the pin in a time-stamped video. In some case, attackers replace the PIN pad with a replica which contains the hidden camera. [caption id="attachment_6940" align="alignnone" width="1047"]
Source : Krebs on Security[/caption] “Overall, it’s getting tougher to spot ATM skimming devices, many of which are designed to be embedded inside various ATM components (e.g., insert skimmers). It’s best to focus instead on protecting your own physical security while at the cash machine. If you visit an ATM that looks strange, tampered with, or out of place, try to find another machine. Use only ATMs in public, well-lit areas, and avoid those in secluded spots.” said in the post published by Krebs on Security. For the latest cyber threats and the latest hacking news please follow us on Facebook, Linkedin and Twitter.
You may be interested in reading:Facebook Admits using 2FA Phone Numbers for Targeted Ads