Download presentation
Presentation is loading. Please wait.
Published byCalvin Ferguson Modified over 8 years ago
1
ATM Fraud
2
Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any fraud will only be reported after the event. June 16Caribbean Electronic Payments LLC2
3
ATM Fraud Cash machine fraud: Criminals commit fraud at cash machines in a number of ways: Skimming Shoulder surfing Card trapping
4
Skimming Skimming: A skimming device is attached to the card entry slot to record the electronic details from the magnetic stripe of the card as it is inserted into the cash machine. A separate, miniature pinhole camera is hidden overlooking the PIN pad to film the cardholder inputting your PIN. This enables the criminal to produce a counterfeit card with real card details on it and to withdraw money at a cash machine, using the PIN.
5
Shoulder Surfing Shoulder surfing: Where criminals look over your shoulder and watch you enter your PIN, Then steal your card using distraction techniques or pick-pocketing. This is often accomplished by appearing to help!
6
Card Trapping Card-trapping: A device, inserted into a cash machine card slot, retains the card inside the cash machine. The criminal then tricks the cardholder into re-entering your PIN while they watch. Being helpful. After the cardholder stops trying and leaves the machine the criminal removes the device, with the card, and withdraws cash.
7
Fraud Outside the Country Fraud abroad: Most of the fraud committed abroad on UK-issued cards is on cards that have been skimmed or compromised in the UK. However, this kind of fraud also occurs as a result of holidaymakers having their cards stolen or compromised while they are away. This is true of most countries.
8
ATM Skimming Skimming device attached to ATM Variety of devices Records Mag Stripe Data Camera installed overlooking PIN Pad to capture PIN data ATM Fraud
9
EPP Card Reader PC Core Fascia Card Path USB Host Comms Control Board Overlay Fascia Insert Drilling Attack – Target Pre Read Head Throat Insert Pre Read Head Tap Read Head Tap Card reader insert Electronics Tap USB Tap – Track Data Trojan/Rootkit – Software Skimmer (Dispense.exe) USB Tap – Primary Account Number External Comms Tap – Intercept all data + Transaction Reversal Fraud External Attacks Internal Attacks Software Attacks Comms Attacks Throat Overlay Shutter Pre-Read HeadRead Head Fake Keyboard – PIN Capture ATM Fraud
10
Overview of Prevention Methods The best prevention methods are: Fraud monitoring of every transactions during the authorisation process And Educating customers to be aware of skimming, shoulder surfing etc: June 16Caribbean Electronic Payments LLC10
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.