SlideShare a Scribd company logo
1 of 24
Download to read offline
SECURITY IS EVERYONE’S RESPONSIBILITY




                                        Group Security

                                        ATM Card Skimming and PIN
                                        capturing Awareness Guide




                                        Prepared by Simon Grubisic-
                                        Protective Security Advisor




                                                                      1
What is ATM Card Skimming
                 and PIN Capturing?



    ATM Card Skimming is a method used by criminals to capture data

    from the magnetic stripe on the back of an ATM card.
    The devices used are smaller than a deck of cards and are often

    fastened in close proximity to or over the top of an ATM’s factory-
    installed card reader.
    Pin Capturing refers to a method of strategically attaching cameras

    and various other imaging devices to ATMs; in order to fraudulently
    capture the ATM user’s PIN.
Where to spot a card skimming or
pin capturing device on an ATM?

              Region 1. Light diffuser area


              Region 2. Speaker area


              Region 3. ATM side fascia


              Region 4. Card reader entry slot


              Region 5. ATM keyboard area
What do skimming devices
                    look like?
Can you tell if this ATM machine has a skimming device
fitted to the card reader?




                                                         …
What do skimming devices
                      look like?
Spot the difference…Can you tell now?

                                  • Top photo shows an unadulterated ATM 
                                  fascia.  The flashing lead through entry 
                                  indicator is easily observed.
                                     Note: Most skim devices when fitted will 
                                  obscure the flashing entry indicator this 
                                  should be a vital clue as to any suspect 
                                  tampering.  

                                    Spot the difference in the next photo.

                                  • A skim device has been placed in or near 
                                  the card reader slot. Although the device has 
                                  been given the appearance of being a 
                                  standard part of the terminal it is in fact and 
                                  additional fitted piece & clearly is different 
                                  from the above photo.  
                                     Note: No flashing lead through light can be 
                                  seen. 
                                     The shape of the bezel is clearly different.
What do skimming devices
                         look like?
Here we have another example of the skimming device being piggy-backed
onto the card reader
What do skimming devices
                          look like?
Here we have another example of a skimming device installed within this
piece of ATM fascia. This was a replacement unit found on an ATM.
What do skimming devices
                          look like?
Another example of a skimming device installed on the card reader of this
ATM. Hard to tell its there isn’t it?




                                                                 …
What do skimming devices
                              look like?
Take a closer look..
What do skimming devices
                       look like?
Removal of a skimming device from card reader slot, the device was
fitted over the card reader throat.
What do PIN capturing devices
                     look like?
Can you tell if this ATM fascia piece (located above the screen) has a
  PIN capturing device installed within- You cannot really tell can you?




                                                                  …
What do PIN capturing devices
                       look like?
Lets remove the ATM fascia piece for a closer look.
What do PIN capturing devices
                    look like?
Here you can clearly see the PIN capturing device installed on the
inner side of the fascia piece.
What do PIN capturing devices
                        look like?
Another example of a PIN capturing device installed on the inner side of the
light diffuser fascia piece (above the ATM screen). Can you see the camera?
What do PIN capturing devices
                         look like?
Lets have a look on the inner side. A mobile phone camera was used as a PIN
capturing device, with the information being transmitted via a wireless device.
What do PIN capturing devices
                     look like?

Here we have an additional fascia piece fitted to the speaker area directly
  above the screen- can you see this additional piece?




                                                                 …
What do PIN capturing devices
                     look like?
How about now? 
Removal of fitted device from fascia­ the additional part can now be 
  clearly seen. 
What do PIN capturing devices
                        look like?
Here we have a piece of merchandising placed on the side ATM fascia wall.
Can you spot a PIN capturing device?




                                                                  …
What do PIN capturing devices
                            look like?
Upon closer inspection of the merchandising unit, you can clearly see the
pin hole camera installed on the bottom side, capturing an image of the
keypad and subsequently, the customers PIN
What do PIN capturing devices
                              look like?

The last area of focus is the ATM keyboard fascia. Offenders are known to
place the skimmer plate on top of the existing keyboard.
What do PIN capturing devices
                  look like?
This is an example of what an ATM keyboard skimmer plate can look like.
Facts on ATM skimming
                              attacks


 Criminals tend to attach skimming devices either late at night or
early in the morning, and during periods of low traffic.

 Skimming devices are usually attached for a few hours only.

 Criminals install equipment on at least 2 regions of an ATM to steal
both the ATM card number and the PIN.

 Criminals then sit nearby receiving the information transmitted
wirelessly via the devices (installed on the ATM).
What can you do to mitigate
                the risk of a skimming attack?

    Get to know the appearance of your ATM.


     Inspect the front of the ATM for unusual or non standard

    appearance. Scratches, marks, adhesive or tape residues could
    be indicators of tampering. The inspection should be part of
    your morning external check and afternoon closing procedure.
    Where possible, inspections should also be conducted during
    trading hours.
    Familiarise yourself with the look and feel of your ATM fascia.

    Particularly pay attention to all of the touch and action points.
    (e.g. keypad, customer card entry slot, lighting diffusers)
What can you do to mitigate
                the risk of a skimming attack?

    Inspect all areas of the fascia. Look at card reader entry slot &

    regions immediately above the consumer display and keyboard
    area for anything unusual.
    Report any unusual appearance immediately through to the

    Group Emergency Hotline on 1800 643 410 and keep watch over
    any suspect device until the Police or CBA Security arrive.




By being vigilant you can play a part in
 reducing the risk of a skim attack!

More Related Content

What's hot

Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awarenessMuhammad Basharat
 
ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)Yusuf Khan
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith RajasekharanAtm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith Rajasekharanabhijith rs
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_securitybillhien
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptHyballs the Rat
 

What's hot (17)

ATM
ATMATM
ATM
 
Atm Research
Atm Research Atm Research
Atm Research
 
Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awareness
 
ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)
 
NR ATM Frauds.pptx
NR ATM Frauds.pptxNR ATM Frauds.pptx
NR ATM Frauds.pptx
 
atm safety precautions.jpg.pptx
atm safety precautions.jpg.pptxatm safety precautions.jpg.pptx
atm safety precautions.jpg.pptx
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith RajasekharanAtm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_security
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Atm security
Atm securityAtm security
Atm security
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 Ppt
 
Atm reconciliation manual
Atm reconciliation manualAtm reconciliation manual
Atm reconciliation manual
 
Atm security
Atm securityAtm security
Atm security
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm security
Atm securityAtm security
Atm security
 

Viewers also liked

Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument Priyanka Jagtap
 
Commercial Bkg
Commercial BkgCommercial Bkg
Commercial Bkgdeepakalld
 
Forms and Functions of Modern Banking
Forms and Functions of Modern BankingForms and Functions of Modern Banking
Forms and Functions of Modern BankingBrian Coil
 

Viewers also liked (8)

Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument
 
Commercial Bkg
Commercial BkgCommercial Bkg
Commercial Bkg
 
Modern banking
Modern bankingModern banking
Modern banking
 
Garnishee order
Garnishee orderGarnishee order
Garnishee order
 
Bill of Exchange
Bill of ExchangeBill of Exchange
Bill of Exchange
 
Bank Overdraft
Bank OverdraftBank Overdraft
Bank Overdraft
 
Forms and Functions of Modern Banking
Forms and Functions of Modern BankingForms and Functions of Modern Banking
Forms and Functions of Modern Banking
 
Crossing Of Cheques
Crossing Of ChequesCrossing Of Cheques
Crossing Of Cheques
 

Similar to How ATM card skimming and PIN capturing scams work.

ATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer PresentationATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer PresentationDavid Sinclair
 
Como detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajerosComo detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajerosrobzone
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptChee Keong Mah
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHShimanto Deb
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingYiannis Hatzopoulos
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentationSenorErnestoIV
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Biometric_Fingerprint_ATM_for_More_Secur.pdf
Biometric_Fingerprint_ATM_for_More_Secur.pdfBiometric_Fingerprint_ATM_for_More_Secur.pdf
Biometric_Fingerprint_ATM_for_More_Secur.pdfKanchanRaut13
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!ikrakovsky
 
Secure Branch Design
Secure Branch DesignSecure Branch Design
Secure Branch DesignBrandPartners
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 

Similar to How ATM card skimming and PIN capturing scams work. (20)

ATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer PresentationATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer Presentation
 
Como detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajerosComo detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajeros
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 Ppt
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESH
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
 
Counterfeiting Presentation 2009 Handout
Counterfeiting Presentation 2009   Handout Counterfeiting Presentation 2009   Handout
Counterfeiting Presentation 2009 Handout
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentation
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Biometric_Fingerprint_ATM_for_More_Secur.pdf
Biometric_Fingerprint_ATM_for_More_Secur.pdfBiometric_Fingerprint_ATM_for_More_Secur.pdf
Biometric_Fingerprint_ATM_for_More_Secur.pdf
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!
 
Secure Branch Design
Secure Branch DesignSecure Branch Design
Secure Branch Design
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 

Recently uploaded

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 

Recently uploaded (20)

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 

How ATM card skimming and PIN capturing scams work.

  • 1. SECURITY IS EVERYONE’S RESPONSIBILITY Group Security ATM Card Skimming and PIN capturing Awareness Guide Prepared by Simon Grubisic- Protective Security Advisor 1
  • 2. What is ATM Card Skimming and PIN Capturing? ATM Card Skimming is a method used by criminals to capture data  from the magnetic stripe on the back of an ATM card. The devices used are smaller than a deck of cards and are often  fastened in close proximity to or over the top of an ATM’s factory- installed card reader. Pin Capturing refers to a method of strategically attaching cameras  and various other imaging devices to ATMs; in order to fraudulently capture the ATM user’s PIN.
  • 3. Where to spot a card skimming or pin capturing device on an ATM? Region 1. Light diffuser area Region 2. Speaker area Region 3. ATM side fascia Region 4. Card reader entry slot Region 5. ATM keyboard area
  • 4. What do skimming devices look like? Can you tell if this ATM machine has a skimming device fitted to the card reader? …
  • 5. What do skimming devices look like? Spot the difference…Can you tell now? • Top photo shows an unadulterated ATM  fascia.  The flashing lead through entry  indicator is easily observed. Note: Most skim devices when fitted will  obscure the flashing entry indicator this  should be a vital clue as to any suspect  tampering.   Spot the difference in the next photo. • A skim device has been placed in or near  the card reader slot. Although the device has  been given the appearance of being a  standard part of the terminal it is in fact and  additional fitted piece & clearly is different  from the above photo.   Note: No flashing lead through light can be  seen.  The shape of the bezel is clearly different.
  • 6. What do skimming devices look like? Here we have another example of the skimming device being piggy-backed onto the card reader
  • 7. What do skimming devices look like? Here we have another example of a skimming device installed within this piece of ATM fascia. This was a replacement unit found on an ATM.
  • 8. What do skimming devices look like? Another example of a skimming device installed on the card reader of this ATM. Hard to tell its there isn’t it? …
  • 9. What do skimming devices look like? Take a closer look..
  • 10. What do skimming devices look like? Removal of a skimming device from card reader slot, the device was fitted over the card reader throat.
  • 11. What do PIN capturing devices look like? Can you tell if this ATM fascia piece (located above the screen) has a PIN capturing device installed within- You cannot really tell can you? …
  • 12. What do PIN capturing devices look like? Lets remove the ATM fascia piece for a closer look.
  • 13. What do PIN capturing devices look like? Here you can clearly see the PIN capturing device installed on the inner side of the fascia piece.
  • 14. What do PIN capturing devices look like? Another example of a PIN capturing device installed on the inner side of the light diffuser fascia piece (above the ATM screen). Can you see the camera?
  • 15. What do PIN capturing devices look like? Lets have a look on the inner side. A mobile phone camera was used as a PIN capturing device, with the information being transmitted via a wireless device.
  • 16. What do PIN capturing devices look like? Here we have an additional fascia piece fitted to the speaker area directly above the screen- can you see this additional piece? …
  • 17. What do PIN capturing devices look like? How about now?  Removal of fitted device from fascia­ the additional part can now be  clearly seen. 
  • 18. What do PIN capturing devices look like? Here we have a piece of merchandising placed on the side ATM fascia wall. Can you spot a PIN capturing device? …
  • 19. What do PIN capturing devices look like? Upon closer inspection of the merchandising unit, you can clearly see the pin hole camera installed on the bottom side, capturing an image of the keypad and subsequently, the customers PIN
  • 20. What do PIN capturing devices look like? The last area of focus is the ATM keyboard fascia. Offenders are known to place the skimmer plate on top of the existing keyboard.
  • 21. What do PIN capturing devices look like? This is an example of what an ATM keyboard skimmer plate can look like.
  • 22. Facts on ATM skimming attacks  Criminals tend to attach skimming devices either late at night or early in the morning, and during periods of low traffic.  Skimming devices are usually attached for a few hours only.  Criminals install equipment on at least 2 regions of an ATM to steal both the ATM card number and the PIN.  Criminals then sit nearby receiving the information transmitted wirelessly via the devices (installed on the ATM).
  • 23. What can you do to mitigate the risk of a skimming attack? Get to know the appearance of your ATM.  Inspect the front of the ATM for unusual or non standard  appearance. Scratches, marks, adhesive or tape residues could be indicators of tampering. The inspection should be part of your morning external check and afternoon closing procedure. Where possible, inspections should also be conducted during trading hours. Familiarise yourself with the look and feel of your ATM fascia.  Particularly pay attention to all of the touch and action points. (e.g. keypad, customer card entry slot, lighting diffusers)
  • 24. What can you do to mitigate the risk of a skimming attack? Inspect all areas of the fascia. Look at card reader entry slot &  regions immediately above the consumer display and keyboard area for anything unusual. Report any unusual appearance immediately through to the  Group Emergency Hotline on 1800 643 410 and keep watch over any suspect device until the Police or CBA Security arrive. By being vigilant you can play a part in reducing the risk of a skim attack!