SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
SECURITY IS EVERYONE’S RESPONSIBILITY




                                        Group Security

                                        ATM Card Skimming and PIN
                                        capturing Awareness Guide




                                        Prepared by Simon Grubisic-
                                        Protective Security Advisor




                                                                      1
What is ATM Card Skimming
                 and PIN Capturing?



    ATM Card Skimming is a method used by criminals to capture data

    from the magnetic stripe on the back of an ATM card.
    The devices used are smaller than a deck of cards and are often

    fastened in close proximity to or over the top of an ATM’s factory-
    installed card reader.
    Pin Capturing refers to a method of strategically attaching cameras

    and various other imaging devices to ATMs; in order to fraudulently
    capture the ATM user’s PIN.
Where to spot a card skimming or
pin capturing device on an ATM?

              Region 1. Light diffuser area


              Region 2. Speaker area


              Region 3. ATM side fascia


              Region 4. Card reader entry slot


              Region 5. ATM keyboard area
What do skimming devices
                    look like?
Can you tell if this ATM machine has a skimming device
fitted to the card reader?




                                                         …
What do skimming devices
                      look like?
Spot the difference…Can you tell now?

                                  • Top photo shows an unadulterated ATM
                                  fascia. The flashing lead through entry
                                  indicator is easily observed.
                                     Note: Most skim devices when fitted will
                                  obscure the flashing entry indicator this
                                  should be a vital clue as to any suspect
                                  tampering.

                                    Spot the difference in the next photo.

                                  • A skim device has been placed in or near
                                  the card reader slot. Although the device has
                                  been given the appearance of being a
                                  standard part of the terminal it is in fact and
                                  additional fitted piece & clearly is different
                                  from the above photo.
                                     Note: No flashing lead through light can be
                                  seen.
                                     The shape of the bezel is clearly different.
What do skimming devices
                         look like?
Here we have another example of the skimming device being piggy-backed
onto the card reader
What do skimming devices
                          look like?
Here we have another example of a skimming device installed within this
piece of ATM fascia. This was a replacement unit found on an ATM.
What do skimming devices
                          look like?
Another example of a skimming device installed on the card reader of this
ATM. Hard to tell its there isn’t it?




                                                                 …
What do skimming devices
                              look like?
Take a closer look..
What do skimming devices
                       look like?
Removal of a skimming device from card reader slot, the device was
fitted over the card reader throat.
What do PIN capturing devices
                     look like?
Can you tell if this ATM fascia piece (located above the screen) has a
  PIN capturing device installed within- You cannot really tell can you?




                                                                  …
What do PIN capturing devices
                       look like?
Lets remove the ATM fascia piece for a closer look.
What do PIN capturing devices
                    look like?
Here you can clearly see the PIN capturing device installed on the
inner side of the fascia piece.
What do PIN capturing devices
                        look like?
Another example of a PIN capturing device installed on the inner side of the
light diffuser fascia piece (above the ATM screen). Can you see the camera?
What do PIN capturing devices
                         look like?
Lets have a look on the inner side. A mobile phone camera was used as a PIN
capturing device, with the information being transmitted via a wireless device.
What do PIN capturing devices
                      look like?

Here we have an additional fascia piece fitted to the speaker area directly
  above the screen- can you see this additional piece?




                                                                 …
What do PIN capturing devices
                     look like?
How about now?
Removal of fitted device from fascia- the additional part can now be
  clearly seen.
What do PIN capturing devices
                        look like?
Here we have a piece of merchandising placed on the side ATM fascia wall.
Can you spot a PIN capturing device?




                                                                  …
What do PIN capturing devices
                            look like?
Upon closer inspection of the merchandising unit, you can clearly see the
pin hole camera installed on the bottom side, capturing an image of the
keypad and subsequently, the customers PIN
What do PIN capturing devices
                              look like?

The last area of focus is the ATM keyboard fascia. Offenders are known to
place the skimmer plate on top of the existing keyboard.
What do PIN capturing devices
                  look like?
This is an example of what an ATM keyboard skimmer plate can look like.
Facts on ATM skimming
                              attacks


 Criminals tend to attach skimming devices either late at night or
early in the morning, and during periods of low traffic.

 Skimming devices are usually attached for a few hours only.

 Criminals install equipment on at least 2 regions of an ATM to steal
both the ATM card number and the PIN.

 Criminals then sit nearby receiving the information transmitted
wirelessly via the devices (installed on the ATM).
What can you do to mitigate
                the risk of a skimming attack?

    Get to know the appearance of your ATM.


     Inspect the front of the ATM for unusual or non standard

    appearance. Scratches, marks, adhesive or tape residues could
    be indicators of tampering. The inspection should be part of
    your morning external check and afternoon closing procedure.
    Where possible, inspections should also be conducted during
    trading hours.
    Familiarise yourself with the look and feel of your ATM fascia.

    Particularly pay attention to all of the touch and action points.
    (e.g. keypad, customer card entry slot, lighting diffusers)
What can you do to mitigate
                the risk of a skimming attack?

    Inspect all areas of the fascia. Look at card reader entry slot &

    regions immediately above the consumer display and keyboard
    area for anything unusual.
    Report any unusual appearance immediately through to the

    Group Emergency Hotline on 1800 643 410 and keep watch over
    any suspect device until the Police or CBA Security arrive.




By being vigilant you can play a part in
 reducing the risk of a skim attack!

Más contenido relacionado

La actualidad más candente

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
Atm awareness guide
Atm awareness guideAtm awareness guide
Atm awareness guideJude Dsouza
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmargoncillo
 
Atm Fraud
Atm FraudAtm Fraud
Atm Fraudnath
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atmMukesh Sewada
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)amanjit9306
 
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith RajasekharanAtm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith Rajasekharanabhijith rs
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURERadhika Venkat
 
ATM BANKING SYSTEM
ATM BANKING SYSTEMATM BANKING SYSTEM
ATM BANKING SYSTEMsathish sak
 
ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)Yusuf Khan
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.pptNaveen Sihag
 

La actualidad más candente (19)

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Atm awareness guide
Atm awareness guideAtm awareness guide
Atm awareness guide
 
Atm security
Atm securityAtm security
Atm security
 
Atm security
Atm securityAtm security
Atm security
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm Fraud
Atm FraudAtm Fraud
Atm Fraud
 
ATM
ATMATM
ATM
 
Atm security
Atm securityAtm security
Atm security
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm Research
Atm Research Atm Research
Atm Research
 
Automated taller machine (atm)
Automated taller machine (atm)Automated taller machine (atm)
Automated taller machine (atm)
 
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith RajasekharanAtm-Automated Teller Machines prepared by Abhijith Rajasekharan
Atm-Automated Teller Machines prepared by Abhijith Rajasekharan
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm reconciliation manual
Atm reconciliation manualAtm reconciliation manual
Atm reconciliation manual
 
ATM BANKING SYSTEM
ATM BANKING SYSTEMATM BANKING SYSTEM
ATM BANKING SYSTEM
 
ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)ATM ( Automated Teller Machine)
ATM ( Automated Teller Machine)
 
How do at ms work.ppt
How do at ms work.pptHow do at ms work.ppt
How do at ms work.ppt
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 

Similar a Skimmer Presentation V1 230109 Ppt

Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awarenessMuhammad Basharat
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHShimanto Deb
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingYiannis Hatzopoulos
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...TUESDAY Business Network
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for DummiesSilly Beez
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudJason Sookram
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentationSenorErnestoIV
 

Similar a Skimmer Presentation V1 230109 Ppt (20)

Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awareness
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
ATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESHATM ROBBERY IN BANGLADESH
ATM ROBBERY IN BANGLADESH
 
Counterfeiting Presentation 2009 Handout
Counterfeiting Presentation 2009   Handout Counterfeiting Presentation 2009   Handout
Counterfeiting Presentation 2009 Handout
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
 
NR ATM Frauds.pptx
NR ATM Frauds.pptxNR ATM Frauds.pptx
NR ATM Frauds.pptx
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
Zranitelnost čipových platebních karet jako příklad on-line hrozby - Tomáš Ro...
 
clone sim card
clone sim cardclone sim card
clone sim card
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card Fraud
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentation
 

Último

Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...PRnews2
 
Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Lviv Startup Club
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Nihal Nishadul
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdfSherl Simon
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 

Último (20)

Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
 
Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)Roman Kyslyi: Використання та побудова LLM агентів (UA)
Roman Kyslyi: Використання та побудова LLM агентів (UA)
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024Ivey Leveraging Information Technology MBA 2024
Ivey Leveraging Information Technology MBA 2024
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 

Skimmer Presentation V1 230109 Ppt

  • 1. SECURITY IS EVERYONE’S RESPONSIBILITY Group Security ATM Card Skimming and PIN capturing Awareness Guide Prepared by Simon Grubisic- Protective Security Advisor 1
  • 2. What is ATM Card Skimming and PIN Capturing? ATM Card Skimming is a method used by criminals to capture data  from the magnetic stripe on the back of an ATM card. The devices used are smaller than a deck of cards and are often  fastened in close proximity to or over the top of an ATM’s factory- installed card reader. Pin Capturing refers to a method of strategically attaching cameras  and various other imaging devices to ATMs; in order to fraudulently capture the ATM user’s PIN.
  • 3. Where to spot a card skimming or pin capturing device on an ATM? Region 1. Light diffuser area Region 2. Speaker area Region 3. ATM side fascia Region 4. Card reader entry slot Region 5. ATM keyboard area
  • 4. What do skimming devices look like? Can you tell if this ATM machine has a skimming device fitted to the card reader? …
  • 5. What do skimming devices look like? Spot the difference…Can you tell now? • Top photo shows an unadulterated ATM fascia. The flashing lead through entry indicator is easily observed. Note: Most skim devices when fitted will obscure the flashing entry indicator this should be a vital clue as to any suspect tampering. Spot the difference in the next photo. • A skim device has been placed in or near the card reader slot. Although the device has been given the appearance of being a standard part of the terminal it is in fact and additional fitted piece & clearly is different from the above photo. Note: No flashing lead through light can be seen. The shape of the bezel is clearly different.
  • 6. What do skimming devices look like? Here we have another example of the skimming device being piggy-backed onto the card reader
  • 7. What do skimming devices look like? Here we have another example of a skimming device installed within this piece of ATM fascia. This was a replacement unit found on an ATM.
  • 8. What do skimming devices look like? Another example of a skimming device installed on the card reader of this ATM. Hard to tell its there isn’t it? …
  • 9. What do skimming devices look like? Take a closer look..
  • 10. What do skimming devices look like? Removal of a skimming device from card reader slot, the device was fitted over the card reader throat.
  • 11. What do PIN capturing devices look like? Can you tell if this ATM fascia piece (located above the screen) has a PIN capturing device installed within- You cannot really tell can you? …
  • 12. What do PIN capturing devices look like? Lets remove the ATM fascia piece for a closer look.
  • 13. What do PIN capturing devices look like? Here you can clearly see the PIN capturing device installed on the inner side of the fascia piece.
  • 14. What do PIN capturing devices look like? Another example of a PIN capturing device installed on the inner side of the light diffuser fascia piece (above the ATM screen). Can you see the camera?
  • 15. What do PIN capturing devices look like? Lets have a look on the inner side. A mobile phone camera was used as a PIN capturing device, with the information being transmitted via a wireless device.
  • 16. What do PIN capturing devices look like? Here we have an additional fascia piece fitted to the speaker area directly above the screen- can you see this additional piece? …
  • 17. What do PIN capturing devices look like? How about now? Removal of fitted device from fascia- the additional part can now be clearly seen.
  • 18. What do PIN capturing devices look like? Here we have a piece of merchandising placed on the side ATM fascia wall. Can you spot a PIN capturing device? …
  • 19. What do PIN capturing devices look like? Upon closer inspection of the merchandising unit, you can clearly see the pin hole camera installed on the bottom side, capturing an image of the keypad and subsequently, the customers PIN
  • 20. What do PIN capturing devices look like? The last area of focus is the ATM keyboard fascia. Offenders are known to place the skimmer plate on top of the existing keyboard.
  • 21. What do PIN capturing devices look like? This is an example of what an ATM keyboard skimmer plate can look like.
  • 22. Facts on ATM skimming attacks  Criminals tend to attach skimming devices either late at night or early in the morning, and during periods of low traffic.  Skimming devices are usually attached for a few hours only.  Criminals install equipment on at least 2 regions of an ATM to steal both the ATM card number and the PIN.  Criminals then sit nearby receiving the information transmitted wirelessly via the devices (installed on the ATM).
  • 23. What can you do to mitigate the risk of a skimming attack? Get to know the appearance of your ATM.  Inspect the front of the ATM for unusual or non standard  appearance. Scratches, marks, adhesive or tape residues could be indicators of tampering. The inspection should be part of your morning external check and afternoon closing procedure. Where possible, inspections should also be conducted during trading hours. Familiarise yourself with the look and feel of your ATM fascia.  Particularly pay attention to all of the touch and action points. (e.g. keypad, customer card entry slot, lighting diffusers)
  • 24. What can you do to mitigate the risk of a skimming attack? Inspect all areas of the fascia. Look at card reader entry slot &  regions immediately above the consumer display and keyboard area for anything unusual. Report any unusual appearance immediately through to the  Group Emergency Hotline on 1800 643 410 and keep watch over any suspect device until the Police or CBA Security arrive. By being vigilant you can play a part in reducing the risk of a skim attack!