Download presentation
Presentation is loading. Please wait.
1
Inserted Shimming Device
2
Shimming Devices Captures Chip data – data then converted to mag-stripe data
3
ATM Cash/Card Trapping/Forking
4
Malware Attacks on ATMs
Malware takes control of the ATM PC to: Control communication between PC and cash dispenser. Or captured stored card data contained on drive of ATM PC
5
Jackpotting Show Video
6
Malware Circuit Board Injection Attack Macau (Chinese Territory)
Malware Injection into ATM to capture/store card data and PIN
7
Criminals will not surrender…
Criminals will not surrender….They will just adapt to the circumstances!
8
ATM Skimming Intelligence Network
Initiated in April 2009 Currently members (Law Enforcement, Financial Institutions ATM manufacters) Has assisted in identifying P.O.C.s and known suspects to ATM Skimming incidents. Provides intelligence info, training, and preventative measures to financial institutions and law enforcement. To Join the ATM Skimming Intelligence Network, please contact Det. Mark Solomon at Please provide Agency information and contact person to verify employment
9
Questions????? Detective Mark Solomon Greenwich Police Department
CT Financial Crimes Task Force ATM Skimming Intelligence Network Coordinator IAFCI CT Chapter President (203) (cell) Short Bio on self Grabber (automated phone systems) 9
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.