Computer Crime Research Center


Plastic criminality part3

Date: March 01, 2004
Source: Computer Crime Research Center
By: Dmitri Kramarenko

1. Fraudsters often use devices being attached to ATM get data on cards. Group of swindlers showed up in due time in Moscow. They put special attachment at keyboard looking like original ATM buttons. Card owner withdrew money without any problems, at that forged keyboard stored all pushed buttons, including Pin code. Advice: carefully examine keyboard of unknown ATM before using it.

2. Another device is so called Lebanese loops. These are plastic envelopes size of which is slightly bigger than card's size. It is placed in the ATM slot. Card owner tries to withdraw money, but ATM cannot read data from magnetic strip. It is impossible to get the card back from the slot due to the design of the envelope. At this time the offender comes and tells that it happened to him too last day. He says that it is necessary to enter PIN-code and press Cancel two times to get a card back. The owner of a card does so and certainly ATM returns no card. Then he decides that the card remains in ATM and leaves. The swindler gets a card with the help of improvised means already knowing a PIN-code. He only needs to withdraw money from the card.

3. It is technically complicated, but possible to intercept data which ATM sends to bank in order to make sure of availability of the required sum on customer?s account. On this purpose it is necessary to connect to the corresponding cable without breaking it and to get the necessary data. Required instructions can be easily found and free accessed in the Internet. In this connection it is possible to assert that such way will be used even more often.

4. Malefactors leave nearby a tiny video camera to find out a PIN-code. At this time they are in the nearest automobile with laptop on where they can see all keys entered by the owner of the card.
Advice: inputting pin code cover keyboard with other hand.

5. It is rather expensive, but true. Swindlers put in crowded place their "own ATM". But it is ?out of order" for some reason and it successfully reads all necessary data from a card. Then it turns out that you withdrew all the money yesterday.

6. In due time swindlers from United Arab Emirates inserted special devices into card slots which recorded all data on a card put into ATM. Malefactors only needed to peep a PIN-code.

7. Here is nothing depends on your attentiveness, cautiousness or farsight. It happens that people close to your cards like bank employees are in agreement with swindlers. Such cases are rare but no one is assured from it.

On the territory of CIS countries scales of carders' (criminals engaged in frauds with credit cards) activity are still rather small.

The most spread kind of fraud is when swindlers obtain card data on purpose of further using these data in Internet stores and auctions. There's no need to make a copy of a card, it is simple to spend someone else's money.

Add comment  Email to a Friend

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo