Page 47 - Dataquest
P. 47

INTEllIGENT COMPUTING | SECURITY







          in  the  form  of  card  cloning,  ATM  skimming  or  PIN    aTM Cloning
          release etc.                                    It  is  a  process  of  making  a  duplicate  card  using  the
                                                          data captured from the original card. Fraudsters attach
          TEChNIQUES/ TOOlS USEd IN aTM fraUd             a  skimming  device  on  POS  (Point  of  sale)  holder/  ATM
          Physical obstruction                            machine.  Whenever  a  user  swipes  his/her  card,  the
          The fraudsters insert a folded piece of plastic film into the   information from magnetic stripes goes to the skimming
          ATM card slot which holds the card and does not allow it to   device, which can capture all details such as subscriber
          be expelled by the machine. The victim believes his card to   name, account details and other security details etc. After
          be caught in the machine and doesn’t notice the card slot   this,  the  user  is  asked  to  enter  the  PIN,  which  is  read
          has been tampered with. Once an inserted card is struck, a   by the fraudster either through camera or manually. The
          fraudster pretending as a genuine cardholder will suggest   fraudsters use this information to make a duplicate card.
          to  re-enter  his  or  her  security  code,  at  this  moment  the
          fraudster reads that PIN code. When the cardholder leaves   Phishing/vishing attack
          the cabin in frustration, fraudster takes the card and makes   Phishing scams are designed to attract the user to provide
          transaction using the captured information.     the card number and PIN.
                                                           (a)  Using  Mobile:  Attacker  pretends  himself  as  bank
          aTM Skimming                                    representative and claims victim’s account/ card is being
          It is a method used by criminals to capture data from   blocked citing security reasons and to avoid it, the user
          magnetic stripes on the block of an ATM card. Devices   is asked to give the card and bank account details such
          used  for  skimming  are  smaller  than  deck  of  card  and   as  bank  account  number,  card  number,  CVV,  PIN  etc.
          they  are  put  very  close  to  or  over  the  top  of  ATM’s    Using these details attacker makes an online transaction
          card reader.                                    and  then  user  is  asked  to  tell  the  One-Time  Password
                                                          (OTP)  received  on  his/her  mobile.  As  soon  as  the  user
                                                          reveals the OTP, the transaction is carried out using user’s
                                                          banking credentials.
                                                           (b) Using E-mail: The user is asked to click on a link
                                                          and  follow  the  directions  provided.  The  link  however  is
                                                          a fraudulent one and directs the user to a site set up by

          (A) Normal card entry interface (B) Skimming device at card entry
          interface (C) Skimming device ‘Piggy Backed’ onto card reader
             Figure  (A)  above  shows  normal  interface  in  which
          flashing card indicator can be easily seen. Most skimming
          devices  will  obscure  the  flashing  card  entry  indicator.
          This  detail  serves  as  a  vital  clue  in  identifying  suspect
          tampering. In Figure (B) skimming device is attached to
          card entry slot. Figure (C) shows how a skimming device
          piggy backed onto card reader and the shape of snout is
          different form Figure (A).

          keypad Overlays
          It is a new technique- designed to go unnoticed and blend
          in with the standard ATM keypad. It captures keystroke   the attacker and designed to look like the user’s bank’s
          (i.e. steals customer PIN) when the customer enters his/  website.  The  site  directs  the  user  to  input  sensitive
          her PIN into the dummy keypad placed over the existing   information  such  as  card  numbers  and  PINs.  The
          ATM keypad. At the same time the ATM card slot overlay   information is collected by the thieves/criminals/hackers
          facsimiles/records  the  confidential  data  from  magnetic   and used to create fraudulent cards.
          strip  of  ATM  cards.  Hackers/fraudsters  assemble   Way forward: Methods to increase security:
          information in their computer to clone the ATM card by   l  Lack  of  education  AND  awareness  around  payment
          using blank card stock.                         security,  poor  implementation  and  maintenance  of  the

                                   |  A CyberMedia Publication   www.dqindia.com          January, 2018   |  47
   42   43   44   45   46   47   48   49   50   51   52