ATM fraud is on the rise - Interpol

Carding Forum

Professional
Messages
1,326
Reputation
3
Reaction score
488
Points
83
ATM machines have always been a popular target for criminals looking to get money quickly. ATM fraud encompasses not only the robbery of people who have just withdrawn cash from the card, but also a variety of skimming mechanisms, as well as the most daring approaches, such as removing an entire device using industrial equipment. Interpol, with the participation of international payment systems, published the results of a recent study of ATM fraud.

Skimming is by far the most popular type of ATM fraud. It aims to intercept user information, which can then be used to create fake duplicate cards. Skimming involves the installation of illegal devices at various points of the ATM interface, which are used to record card information and PIN codes that are entered by users. On the basis of this information, fake cards are created, which are used to withdraw cash or make online purchases. EMV technology (equipping cards with a chip) allows you to fight this type of fraud.

A recent investigation, backed by Interpol, arrested a group of criminals who installed a special fee at ATMs through a card slot. Once installed, the board distributed malware to the ATM system. Outwardly, the device continued to function perfectly. However, at this time, the virus was quietly collecting customer card data and their PIN-codes. To some extent, this criminal activity resembles skimming, since it is aimed at intercepting information on the cards.

Recently, however, criminals have gone even further and began to withdraw cash from ATMs without the need to collect data on cards. Interpol recorded several cases in Latin America, when criminals illegally installed a disk with a special malware Ploutus on ATMs. Once the ATM is restarted, the malware allows fraudsters to withdraw cash from the ATM at any time.

In 2014, banks in several countries in Europe, Asia, the Middle East and North America encountered another malware called Tyupkin (or Padpin) attacking their ATM machines. As with Ploutus, the only purpose of the virus was to withdraw large amounts of funds. However, Tyupkin also allows attackers to use the ATM keyboard to send commands to the malicious program. Today Tyupkin also supports the anti-virus function of the ATM system and the self-destruct function.

At first glance, malware like Tyupkin or Ploutus appears to be the perfect vehicle for scammers to get their money. However, they have an obvious disadvantage for criminals - physical access to ATMs is required to install these viruses. First, the scammers install the software on the ATM and then return to the crime scene to activate the program and withdraw cash. Very often, when performing these manipulations, the criminals were recorded on CCTV cameras.

Interpol believes that the rise in ATM attacks and the variety of new fraudulent methods are related to the development of criminal groups. They are developing more and more sophisticated cybercrime methods, improving their skills and organizing their criminal activities. Unfortunately, the security of ATMs around the world is not developing and improving so rapidly.

Interpol also notes that very often the scammers who attack ATMs are not the same persons who use the stolen information. The resulting data is sold to other criminal groups that create fake cards.
 
Top