Page 47 - Dataquest
P. 47
INTEllIGENT COMPUTING | SECURITY
in the form of card cloning, ATM skimming or PIN aTM Cloning
release etc. It is a process of making a duplicate card using the
data captured from the original card. Fraudsters attach
TEChNIQUES/ TOOlS USEd IN aTM fraUd a skimming device on POS (Point of sale) holder/ ATM
Physical obstruction machine. Whenever a user swipes his/her card, the
The fraudsters insert a folded piece of plastic film into the information from magnetic stripes goes to the skimming
ATM card slot which holds the card and does not allow it to device, which can capture all details such as subscriber
be expelled by the machine. The victim believes his card to name, account details and other security details etc. After
be caught in the machine and doesn’t notice the card slot this, the user is asked to enter the PIN, which is read
has been tampered with. Once an inserted card is struck, a by the fraudster either through camera or manually. The
fraudster pretending as a genuine cardholder will suggest fraudsters use this information to make a duplicate card.
to re-enter his or her security code, at this moment the
fraudster reads that PIN code. When the cardholder leaves Phishing/vishing attack
the cabin in frustration, fraudster takes the card and makes Phishing scams are designed to attract the user to provide
transaction using the captured information. the card number and PIN.
(a) Using Mobile: Attacker pretends himself as bank
aTM Skimming representative and claims victim’s account/ card is being
It is a method used by criminals to capture data from blocked citing security reasons and to avoid it, the user
magnetic stripes on the block of an ATM card. Devices is asked to give the card and bank account details such
used for skimming are smaller than deck of card and as bank account number, card number, CVV, PIN etc.
they are put very close to or over the top of ATM’s Using these details attacker makes an online transaction
card reader. and then user is asked to tell the One-Time Password
(OTP) received on his/her mobile. As soon as the user
reveals the OTP, the transaction is carried out using user’s
banking credentials.
(b) Using E-mail: The user is asked to click on a link
and follow the directions provided. The link however is
a fraudulent one and directs the user to a site set up by
(A) Normal card entry interface (B) Skimming device at card entry
interface (C) Skimming device ‘Piggy Backed’ onto card reader
Figure (A) above shows normal interface in which
flashing card indicator can be easily seen. Most skimming
devices will obscure the flashing card entry indicator.
This detail serves as a vital clue in identifying suspect
tampering. In Figure (B) skimming device is attached to
card entry slot. Figure (C) shows how a skimming device
piggy backed onto card reader and the shape of snout is
different form Figure (A).
keypad Overlays
It is a new technique- designed to go unnoticed and blend
in with the standard ATM keypad. It captures keystroke the attacker and designed to look like the user’s bank’s
(i.e. steals customer PIN) when the customer enters his/ website. The site directs the user to input sensitive
her PIN into the dummy keypad placed over the existing information such as card numbers and PINs. The
ATM keypad. At the same time the ATM card slot overlay information is collected by the thieves/criminals/hackers
facsimiles/records the confidential data from magnetic and used to create fraudulent cards.
strip of ATM cards. Hackers/fraudsters assemble Way forward: Methods to increase security:
information in their computer to clone the ATM card by l Lack of education AND awareness around payment
using blank card stock. security, poor implementation and maintenance of the
| A CyberMedia Publication www.dqindia.com January, 2018 | 47