SlideShare a Scribd company logo
1 of 24
Download to read offline
SECURITY IS EVERYONE’S RESPONSIBILITY




                                        Group Security

                                        ATM Card Skimming and PIN
                                        capturing Awareness Guide




                                        Prepared by Simon Grubisic-
                                        Protective Security Advisor




                                                                      1
What is ATM Card Skimming
                 and PIN Capturing?



    ATM Card Skimming is a method used by criminals to capture data

    from the magnetic stripe on the back of an ATM card.
    The devices used are smaller than a deck of cards and are often

    fastened in close proximity to or over the top of an ATM’s factory-
    installed card reader.
    Pin Capturing refers to a method of strategically attaching cameras

    and various other imaging devices to ATMs; in order to fraudulently
    capture the ATM user’s PIN.
Where to spot a card skimming or
pin capturing device on an ATM?

              Region 1. Light diffuser area


              Region 2. Speaker area


              Region 3. ATM side fascia


              Region 4. Card reader entry slot


              Region 5. ATM keyboard area
What do skimming devices
                    look like?
Can you tell if this ATM machine has a skimming device
fitted to the card reader?




                                                         …
What do skimming devices
                      look like?
Spot the difference…Can you tell now?

                                  • Top photo shows an unadulterated ATM 
                                  fascia.  The flashing lead through entry 
                                  indicator is easily observed.
                                     Note: Most skim devices when fitted will 
                                  obscure the flashing entry indicator this 
                                  should be a vital clue as to any suspect 
                                  tampering.  

                                    Spot the difference in the next photo.

                                  • A skim device has been placed in or near 
                                  the card reader slot. Although the device has 
                                  been given the appearance of being a 
                                  standard part of the terminal it is in fact and 
                                  additional fitted piece & clearly is different 
                                  from the above photo.  
                                     Note: No flashing lead through light can be 
                                  seen. 
                                     The shape of the bezel is clearly different.
What do skimming devices
                         look like?
Here we have another example of the skimming device being piggy-backed
onto the card reader
What do skimming devices
                          look like?
Here we have another example of a skimming device installed within this
piece of ATM fascia. This was a replacement unit found on an ATM.
What do skimming devices
                          look like?
Another example of a skimming device installed on the card reader of this
ATM. Hard to tell its there isn’t it?




                                                                 …
What do skimming devices
                              look like?
Take a closer look..
What do skimming devices
                       look like?
Removal of a skimming device from card reader slot, the device was
fitted over the card reader throat.
What do PIN capturing devices
                     look like?
Can you tell if this ATM fascia piece (located above the screen) has a
  PIN capturing device installed within- You cannot really tell can you?




                                                                  …
What do PIN capturing devices
                       look like?
Lets remove the ATM fascia piece for a closer look.
What do PIN capturing devices
                    look like?
Here you can clearly see the PIN capturing device installed on the
inner side of the fascia piece.
What do PIN capturing devices
                        look like?
Another example of a PIN capturing device installed on the inner side of the
light diffuser fascia piece (above the ATM screen). Can you see the camera?
What do PIN capturing devices
                         look like?
Lets have a look on the inner side. A mobile phone camera was used as a PIN
capturing device, with the information being transmitted via a wireless device.
What do PIN capturing devices
                     look like?

Here we have an additional fascia piece fitted to the speaker area directly
  above the screen- can you see this additional piece?




                                                                 …
What do PIN capturing devices
                     look like?
How about now? 
Removal of fitted device from fascia­ the additional part can now be 
  clearly seen. 
What do PIN capturing devices
                        look like?
Here we have a piece of merchandising placed on the side ATM fascia wall.
Can you spot a PIN capturing device?




                                                                  …
What do PIN capturing devices
                            look like?
Upon closer inspection of the merchandising unit, you can clearly see the
pin hole camera installed on the bottom side, capturing an image of the
keypad and subsequently, the customers PIN
What do PIN capturing devices
                              look like?

The last area of focus is the ATM keyboard fascia. Offenders are known to
place the skimmer plate on top of the existing keyboard.
What do PIN capturing devices
                  look like?
This is an example of what an ATM keyboard skimmer plate can look like.
Facts on ATM skimming
                              attacks


 Criminals tend to attach skimming devices either late at night or
early in the morning, and during periods of low traffic.

 Skimming devices are usually attached for a few hours only.

 Criminals install equipment on at least 2 regions of an ATM to steal
both the ATM card number and the PIN.

 Criminals then sit nearby receiving the information transmitted
wirelessly via the devices (installed on the ATM).
What can you do to mitigate
                the risk of a skimming attack?

    Get to know the appearance of your ATM.


     Inspect the front of the ATM for unusual or non standard

    appearance. Scratches, marks, adhesive or tape residues could
    be indicators of tampering. The inspection should be part of
    your morning external check and afternoon closing procedure.
    Where possible, inspections should also be conducted during
    trading hours.
    Familiarise yourself with the look and feel of your ATM fascia.

    Particularly pay attention to all of the touch and action points.
    (e.g. keypad, customer card entry slot, lighting diffusers)
What can you do to mitigate
                the risk of a skimming attack?

    Inspect all areas of the fascia. Look at card reader entry slot &

    regions immediately above the consumer display and keyboard
    area for anything unusual.
    Report any unusual appearance immediately through to the

    Group Emergency Hotline on 1800 643 410 and keep watch over
    any suspect device until the Police or CBA Security arrive.




By being vigilant you can play a part in
 reducing the risk of a skim attack!

More Related Content

What's hot

Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awarenessMuhammad Basharat
 
ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)Yusuf Khan
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith RajasekharanAtm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith Rajasekharanabhijith rs
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_securitybillhien
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptHyballs the Rat
 

What's hot (17)

ATM
ATMATM
ATM
 
Atm Research
Atm Research Atm Research
Atm Research
 
Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awareness
 
ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)
 
NR ATM Frauds.pptx
NR ATM Frauds.pptxNR ATM Frauds.pptx
NR ATM Frauds.pptx
 
atm safety precautions.jpg.pptx
atm safety precautions.jpg.pptxatm safety precautions.jpg.pptx
atm safety precautions.jpg.pptx
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith RajasekharanAtm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
 
Best practice for_physical_atm_security
Best practice for_physical_atm_securityBest practice for_physical_atm_security
Best practice for_physical_atm_security
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Atm security
Atm securityAtm security
Atm security
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 Ppt
 
Atm reconciliation manual
Atm reconciliation manualAtm reconciliation manual
Atm reconciliation manual
 
Atm security
Atm securityAtm security
Atm security
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm security
Atm securityAtm security
Atm security
 

Viewers also liked

Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument Priyanka Jagtap
 
Commercial Bkg
Commercial BkgCommercial Bkg
Commercial Bkgdeepakalld
 
Forms and Functions of Modern Banking
Forms and Functions of Modern BankingForms and Functions of Modern Banking
Forms and Functions of Modern BankingBrian Coil
 

Viewers also liked (8)

Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument Negotiable instrument act 1881 & Types of Negotiable Instrument
Negotiable instrument act 1881 & Types of Negotiable Instrument
 
Commercial Bkg
Commercial BkgCommercial Bkg
Commercial Bkg
 
Modern banking
Modern bankingModern banking
Modern banking
 
Garnishee order
Garnishee orderGarnishee order
Garnishee order
 
Bill of Exchange
Bill of ExchangeBill of Exchange
Bill of Exchange
 
Bank Overdraft
Bank OverdraftBank Overdraft
Bank Overdraft
 
Forms and Functions of Modern Banking
Forms and Functions of Modern BankingForms and Functions of Modern Banking
Forms and Functions of Modern Banking
 
Crossing Of Cheques
Crossing Of ChequesCrossing Of Cheques
Crossing Of Cheques
 

Similar to How ATM card skimming and PIN capturing scams work.

Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptChee Keong Mah
 
ATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer PresentationATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer PresentationDavid Sinclair
 
Como detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajerosComo detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajerosrobzone
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHShimanto Deb
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingYiannis Hatzopoulos
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentationSenorErnestoIV
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!ikrakovsky
 
Secure Branch Design
Secure Branch DesignSecure Branch Design
Secure Branch DesignBrandPartners
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 

Similar to How ATM card skimming and PIN capturing scams work. (20)

Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 Ppt
 
ATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer PresentationATM (Banking) Skimmer Presentation
ATM (Banking) Skimmer Presentation
 
Como detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajerosComo detectar clonadores de tarjetas en los cajeros
Como detectar clonadores de tarjetas en los cajeros
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESH
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
 
Counterfeiting Presentation 2009 Handout
Counterfeiting Presentation 2009   Handout Counterfeiting Presentation 2009   Handout
Counterfeiting Presentation 2009 Handout
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentation
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!
 
Secure Branch Design
Secure Branch DesignSecure Branch Design
Secure Branch Design
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
ATMThefts
ATMTheftsATMThefts
ATMThefts
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

How ATM card skimming and PIN capturing scams work.

  • 1. SECURITY IS EVERYONE’S RESPONSIBILITY Group Security ATM Card Skimming and PIN capturing Awareness Guide Prepared by Simon Grubisic- Protective Security Advisor 1
  • 2. What is ATM Card Skimming and PIN Capturing? ATM Card Skimming is a method used by criminals to capture data  from the magnetic stripe on the back of an ATM card. The devices used are smaller than a deck of cards and are often  fastened in close proximity to or over the top of an ATM’s factory- installed card reader. Pin Capturing refers to a method of strategically attaching cameras  and various other imaging devices to ATMs; in order to fraudulently capture the ATM user’s PIN.
  • 3. Where to spot a card skimming or pin capturing device on an ATM? Region 1. Light diffuser area Region 2. Speaker area Region 3. ATM side fascia Region 4. Card reader entry slot Region 5. ATM keyboard area
  • 4. What do skimming devices look like? Can you tell if this ATM machine has a skimming device fitted to the card reader? …
  • 5. What do skimming devices look like? Spot the difference…Can you tell now? • Top photo shows an unadulterated ATM  fascia.  The flashing lead through entry  indicator is easily observed. Note: Most skim devices when fitted will  obscure the flashing entry indicator this  should be a vital clue as to any suspect  tampering.   Spot the difference in the next photo. • A skim device has been placed in or near  the card reader slot. Although the device has  been given the appearance of being a  standard part of the terminal it is in fact and  additional fitted piece & clearly is different  from the above photo.   Note: No flashing lead through light can be  seen.  The shape of the bezel is clearly different.
  • 6. What do skimming devices look like? Here we have another example of the skimming device being piggy-backed onto the card reader
  • 7. What do skimming devices look like? Here we have another example of a skimming device installed within this piece of ATM fascia. This was a replacement unit found on an ATM.
  • 8. What do skimming devices look like? Another example of a skimming device installed on the card reader of this ATM. Hard to tell its there isn’t it? …
  • 9. What do skimming devices look like? Take a closer look..
  • 10. What do skimming devices look like? Removal of a skimming device from card reader slot, the device was fitted over the card reader throat.
  • 11. What do PIN capturing devices look like? Can you tell if this ATM fascia piece (located above the screen) has a PIN capturing device installed within- You cannot really tell can you? …
  • 12. What do PIN capturing devices look like? Lets remove the ATM fascia piece for a closer look.
  • 13. What do PIN capturing devices look like? Here you can clearly see the PIN capturing device installed on the inner side of the fascia piece.
  • 14. What do PIN capturing devices look like? Another example of a PIN capturing device installed on the inner side of the light diffuser fascia piece (above the ATM screen). Can you see the camera?
  • 15. What do PIN capturing devices look like? Lets have a look on the inner side. A mobile phone camera was used as a PIN capturing device, with the information being transmitted via a wireless device.
  • 16. What do PIN capturing devices look like? Here we have an additional fascia piece fitted to the speaker area directly above the screen- can you see this additional piece? …
  • 17. What do PIN capturing devices look like? How about now?  Removal of fitted device from fascia­ the additional part can now be  clearly seen. 
  • 18. What do PIN capturing devices look like? Here we have a piece of merchandising placed on the side ATM fascia wall. Can you spot a PIN capturing device? …
  • 19. What do PIN capturing devices look like? Upon closer inspection of the merchandising unit, you can clearly see the pin hole camera installed on the bottom side, capturing an image of the keypad and subsequently, the customers PIN
  • 20. What do PIN capturing devices look like? The last area of focus is the ATM keyboard fascia. Offenders are known to place the skimmer plate on top of the existing keyboard.
  • 21. What do PIN capturing devices look like? This is an example of what an ATM keyboard skimmer plate can look like.
  • 22. Facts on ATM skimming attacks  Criminals tend to attach skimming devices either late at night or early in the morning, and during periods of low traffic.  Skimming devices are usually attached for a few hours only.  Criminals install equipment on at least 2 regions of an ATM to steal both the ATM card number and the PIN.  Criminals then sit nearby receiving the information transmitted wirelessly via the devices (installed on the ATM).
  • 23. What can you do to mitigate the risk of a skimming attack? Get to know the appearance of your ATM.  Inspect the front of the ATM for unusual or non standard  appearance. Scratches, marks, adhesive or tape residues could be indicators of tampering. The inspection should be part of your morning external check and afternoon closing procedure. Where possible, inspections should also be conducted during trading hours. Familiarise yourself with the look and feel of your ATM fascia.  Particularly pay attention to all of the touch and action points. (e.g. keypad, customer card entry slot, lighting diffusers)
  • 24. What can you do to mitigate the risk of a skimming attack? Inspect all areas of the fascia. Look at card reader entry slot &  regions immediately above the consumer display and keyboard area for anything unusual. Report any unusual appearance immediately through to the  Group Emergency Hotline on 1800 643 410 and keep watch over any suspect device until the Police or CBA Security arrive. By being vigilant you can play a part in reducing the risk of a skim attack!