• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

ATM Skimming Attack With Hijacked ATM Security Camera to Steal User’s PIN

5334

The recently discovered ATM skimming attack can hijack the security cameras built in the ATM, thus making it easy for the hijackers to steal a user's PIN.

First reported by Krebs on the scam, here is the story on the attack. The scammers had placed the skimmer over the top of the custom-facing security camera at drive-up bank ATM in Hurst, Texas. The skimmer includes a camera component that is angled towards the ATM cash machine’s PIN pad. This enabled the attackers to record the victims’ PINs.

It is to be noted that the PIN grabber used a metallic, wafer-thin sized skimmer which could be fitted straight into the mouth of the ATM’s card inserting slot. This makes the card skimmer completely invisible from outside, hence it is easy for the scammers to record as many PINs as possible.

“The clever PIN grabber was paired with an 'insert skimmer', a wafer-thin, usually metallic and battery powered skimmer made to be fitted straight into the mouth of the ATM’s card acceptance slot, so that the card skimmer cannot be seen from outside of the compromised ATM,” states Krebs on Security in its report. Lack of simple but necessary cybersecurity measures often leads to attacks of this kind. It is advised to type the PIN number by covering with hand, so it is not caught on camera. If the number is recorded on the spoofed camera, it can be later used by scammers for other fraudulent activities.

Tags:
baseer
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related News in ATM Skimming Attack With Hijacked ATM Security Camera to Steal User’s PIN

Related News in ATM Skimming Attack With Hijacked ATM Security Camera to Steal User’s PIN

CryptoMix Clop Ransomware Variant Targets Not Individual Machines But Whole Networks
CryptoMix Clop Ransomware Variant Targets Not Individual Machines But Whole Networks
Mar 12, 2019
URL Attacks and The Ways to Stay Away from Them!
URL Attacks and The Ways to Stay Away from Them!
Mar 19, 2019
ATM Skimming Attack With Hijacked ATM Security Camera to Steal User’s PIN
ATM Skimming Attack With Hijacked ATM Security Camera to Steal User’s PIN
Mar 13, 2019
Nine Popular WordPress plugins affected with critical SQL injection vulnerabilities
Nine Popular WordPress plugins affected with critical SQL injection vulnerabilities
Sep 7, 2019
Magecart Targets OpenCart Websites Payment Information
Magecart Targets OpenCart Websites Payment Information
May 17, 2019
WordPress 5.1.1 fixes a threatening XSS vulnerability
WordPress 5.1.1 fixes a threatening XSS vulnerability
Mar 22, 2019
Major Security Flaw Found in Cisco Routers
Major Security Flaw Found in Cisco Routers
Oct 2, 2019
New backdoor SLUB uses watering hole attack to target victims
New backdoor SLUB uses watering hole attack to target victims
Mar 13, 2019
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Ryan ?
how to use visual traceroute tool

Am using traceroute command to check for the route. i got this tool while surfing. So pls help me out installation and usage of Visual traceroute tool.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.