ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.

Slides:



Advertisements
Similar presentations
Security Awareness The Dangers of using ATM How to Protect yourself?
Advertisements

AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
GCSE ICT By the end of this session, you will be able to: Explain main features of ATM machines Identify features of credit cards, debit cards, smart cards.
Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
ATM SCAM  At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM Security Requirements & Specification Decomposition Team B: Martijn Christiaan Vasilis Benjamin.
What will happen to ATM ATM Fraud Fake Cards Using the law Card Clips Fake Dispensers The Hijack Violent Crimes Against Customer.
Credit Card Fraud The Scale of the Problem Michael Moore Regional Security & Fraud Investigation Manager 14 – 17 Nov 2005 Security & Safety – Middle East.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
ICT at Work Banking and Finance.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Debit cards Shumate – 5th Period.
Direct Attacks on Computational Devices
Debit Card Plastic card that looks like a credit card
What are the questions really asking?
Chapter 10  ATM 1 Automatic Teller Machines. Chapter 10  ATM 2 Automatic Teller Machines  “…one of the most influential technological innovations of.
ATM : A.T.M Done by Shakila Sattar. What is an A.T.M.? Automated teller machine Or Automatic teller machine.
3.4 Electronic Monetary Processing. Overview Demonstrate and apply knowledge and understanding of: − EFT and identify the advantages and disadvantages.
An average pin. The chip.. Main function The chip and pin system is a safe way to make payment with a credit/debit card in the UK and Ireland.
Checking Account Debit Card Safety Tips card-safety-10-tips.htm October.
Why Comply with PCI Security Standards?
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Electronic ATM Fraud. ATM Fraud is where you goto an ATM and you insert your card into a skimmer which is placed in the card slot and it will take all.
UK Fraud Perspective The National Fraud Intelligence Bureau (NFIB) Wendy Aldridge Intelligence Analyst National Fraud Intelligence Bureau
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
A bar enabling to register the PIN (placed above the ATM keyboard) A skimming bar with an opening for the anti-skimming extension of Ceska Sporitelna (attached.
Credit Card vs. Debit Card. Debit Cards Also called “check cards” –Works just like writing a check Deducts money from your checking account.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Cyber Crimes.
Use Cases 2 ENGR ♯10 Peter Andreae
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Agenda EMV – What Is It? EMV In The UK EMV Is Coming To The US
Getnationwide.com Let’s Talk about EMV Danielle Rourke.
USE CASE Bayu Adhi Tama, MTI Faculty of Computer Science, University of Sriwijaya Slides are adapted from Petrus Mursanto
ICT and Banks Banks use mainframe computers to maintain customer accounts. They store a record of each customer’s withdrawals and deposits. Each bank mainframe.
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
The rising standards of EU Mobile Payments October 2015 Jeremy King, International Director.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
1 Requirements Engineering From System Goals to UML Models to Software Specifications Axel Van Lamsweerde.
Midsouth User Group Annual Conference
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
ATM WITH AN EYE. An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients.
Electronic Banking 7.3. EFT  Electronic Funds Transfer Banks ability to move money from one account to another by computer  Advantages to Banks (Cost.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
Online Decision Process
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
CNP, Malware & Physical Attacks; The Future of Fraud in an EMV World.
2016 FRAUD.
CNP, Malware & Physical Attacks; The Future of Fraud in an EMV World.
EMV.
ATM WITH AN EYE Suresh kumar.
SECURITY FEATURES OF ATM
Object-Oriented Static Modeling of the Banking System - I
Problems – Technical Requirements
How An ATM Work's Prepaid by, kakani Dinesh.
POS Fraud.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Forensic analysis of magnetic stripe skimmer devices
Uses of Telecommunications & ICT
Presentation transcript:

ATM Fraud

Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any fraud will only be reported after the event. June 16Caribbean Electronic Payments LLC2

ATM Fraud Cash machine fraud: Criminals commit fraud at cash machines in a number of ways: Skimming Shoulder surfing Card trapping

Skimming Skimming: A skimming device is attached to the card entry slot to record the electronic details from the magnetic stripe of the card as it is inserted into the cash machine. A separate, miniature pinhole camera is hidden overlooking the PIN pad to film the cardholder inputting your PIN. This enables the criminal to produce a counterfeit card with real card details on it and to withdraw money at a cash machine, using the PIN.

Shoulder Surfing Shoulder surfing: Where criminals look over your shoulder and watch you enter your PIN, Then steal your card using distraction techniques or pick-pocketing. This is often accomplished by appearing to help!

Card Trapping Card-trapping: A device, inserted into a cash machine card slot, retains the card inside the cash machine. The criminal then tricks the cardholder into re-entering your PIN while they watch. Being helpful. After the cardholder stops trying and leaves the machine the criminal removes the device, with the card, and withdraws cash.

Fraud Outside the Country Fraud abroad: Most of the fraud committed abroad on UK-issued cards is on cards that have been skimmed or compromised in the UK. However, this kind of fraud also occurs as a result of holidaymakers having their cards stolen or compromised while they are away. This is true of most countries.

ATM Skimming Skimming device attached to ATM Variety of devices Records Mag Stripe Data Camera installed overlooking PIN Pad to capture PIN data ATM Fraud

EPP Card Reader PC Core Fascia Card Path USB Host Comms Control Board Overlay Fascia Insert Drilling Attack – Target Pre Read Head Throat Insert Pre Read Head Tap Read Head Tap Card reader insert Electronics Tap USB Tap – Track Data Trojan/Rootkit – Software Skimmer (Dispense.exe) USB Tap – Primary Account Number External Comms Tap – Intercept all data + Transaction Reversal Fraud External Attacks Internal Attacks Software Attacks Comms Attacks Throat Overlay Shutter Pre-Read HeadRead Head Fake Keyboard – PIN Capture ATM Fraud

Overview of Prevention Methods The best prevention methods are: Fraud monitoring of every transactions during the authorisation process And Educating customers to be aware of skimming, shoulder surfing etc: June 16Caribbean Electronic Payments LLC10