Avoiding ATM "Skimmer" ThreatsAvoiding ATM "Skimmer" Threats
A security expert has posted photos of a device that could cost your small business dearly if you fall prey to it: an ATM "skimmer."
January 21, 2010
A security expert has posted photos of a device that could cost your small business dearly if you fall prey to it: an ATM "skimmer."Brian Krebs' latest blog post includes photos and a detailed description of an ATM skimmer that was found attached to a machine in Woodland Hills, CA. The skimmer fits over the card intake slot of a legitimate ATM, reading a victims' debit or credit card information as they insert their cards.
The device pictured in Krebs' post even includes a motion-activated pinhole camera aimed at the ATM's control pad to record a victim's PIN.
I strongly suggest checking out Krebs' full blog post for additional pictures. Being able to recognize a skimmer could save your company thousands of dollars and a world of trouble.
A skilled thief can build an ATM skimmer out of parts scavenged from MP3 players and other easily available components. A well-built skimmer will fit smoothly -- but usually not seamlessly -- over the mouth of the machine's card reader.
Thieves realize that a reader gives them an effective, and relatively safe, way to gather card data and PINs from their victims. When the scam works, they can retrieve the device at their convenience; when it doesn't, they simply spend a few dollars to build another skimmer and try again elsewhere.
Krebs offers some sound, common-sense advice on how to avoid this scam. "Practice basic ATM street smarts and you should have little to fear from these skimmers: If you see something that doesnï¿¼t look right ï¿¼ such as a odd protrusion or off-color component on an ATM ï¿¼ consider going to another machine. Also, stay away from ATMs that are not located in publicly visible and well-lit areas."
Needless to say, ATMs attached to physical bank branches -- especially during regular business hours -- are probably less vulnerable to skimmer attacks. The next time you visit an ATM during off hours or at a stand-alone location (including drive-up ATMs), don't let convenience outweigh the need to protect your small business against these increasingly common attacks.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
5 Reasons To Move your PKI Deployment to the Cloud