ATM skimming. New tools in Darknet.steemCreated with Sketch.

in #skimming6 years ago

For the last decade ATM skimming has remained a popular method of data theft at the international level. In most cases, hackers replaced ATM card scanners with their equipment, which has identical physical characteristics of ATM card scanners.

ATM skimming.
Since the external structure is so similar to the actual equipment, bank users and users of debit cards usually can not distinguish one from another.

ATM skimming.
New instruments are circulating in Darknet. Security issues.
At the same time, as banks began to implement security measures, advising debit cardholders and users to switch from EMV card to EMV cards (Europay + MasterCard + VISA) - the international standard for operations with bank cards with a chip.), And giving advice on identifying malicious software to identify real ATM scanners. As a result, traditional methods of ATM ATM skimming are obsolete and unusable.
Recently, new generation technologies and hacking tools have appeared in darknet. According to security experts, including Chris Hednegi, CEO of SI, for conducting training sessions on cybersecurity. Hackers and web hackers have created improvements that have clarified Hednegie's technologies, which are difficult to prevent even with the introduction of the necessary security systems.
One of the newly introduced technologies is a card that is thinner than an ordinary debit or credit card that can be placed under or inside the card scanners. The card works as an independent card scanner and automatically transmits the debit card data via Bluetooth before the built-in ATM card scanner can detect the card. Through the technology and the advanced scanning system of cards, any ATM user of the bank can become vulnerable to the theft of personal and financial data, which can inevitably lead to additional criminal atrocities, such as direct blackmail, theft of funds and the illegal use of personal debit cards.
More importantly, due to the fact that recently appeared methods of ATM ATM skimming, such as scanning cards, can be made via wireless networks or Bluetooth, hackers can simply walk to the ATM, transfer financial data to their phones or other devices and leave the location. Even with security camera footage, it will appear that hackers have used an ATM or withdraw money from an ATM machine like others, making it difficult for banks to get solid evidence against hackers.
"If you can get it there [ATM] and is not visible or you can not be found, you can go to the device later, turn on the phone, connect to Bluetooth wireless communication, download all the card data, behave as if you are refueling and leave, and they will never know that it was you.She (skimming) connects to the server and downloads all the numbers to a file for them, the data was received, "Hednieghi explained.
In an interview with CNBC, he also demonstrated the easy process of installing Bluetooth card readers on ATMs of the bank and stealing information from debit card users. Hednegi expressed concern about the growing popularity of ATM skimming technologies in the darknet, as hackers sell technology with step-by-step installation instructions. According to Hednegi, the installation process can be carried out by anyone who has basic knowledge in the field of computers, mobile phones and ATMs.
Banks cooperate with ATM manufacturers to come up with new solutions to prevent ATM ATM skimming. Diebold Nixdorf, a manufacturer and designer of ATMs, introduced ATM design that allows debit card users to insert their cards in width, rather than in length. Since the change in direction reverses the way ATM readers read information from the ATM card, Nixdorf explained that a simple change in the card reading process makes most ATM skimming methods ineffective.
Still, through the darkweb, hackers will be able to distribute new ATM skimming methods that adapt to various changes, and the proposal for Nixdorf

Coin Marketplace

STEEM 0.29
TRX 0.13
JST 0.033
BTC 63133.02
ETH 3043.69
USDT 1.00
SBD 3.63