The police detained skimmers who stole money from bank cards

Tomcat

Professional
Messages
2,656
Reputation
10
Reaction score
647
Points
113
The attackers copied data from 150 cards of Sberbank clients in one day by installing skimming equipment on one of the ATMs in Moscow. At the time of harvesting, the criminals were detained by the police.

The Main Directorate of Economic Security and Anti-Corruption (GUEBiPK) announced the suppression of the activities of an organized group suspected of attempting to steal funds from Sberbank bank cards.

As the police established, two Moldovans installed skimming pads on one of the Moscow ATMs to obtain information contained on the magnetic stripes of cards and PIN codes for them. The next day, the attackers returned to remove the installed equipment, and after dismantling they were caught red-handed by operatives.

A study of skimming devices showed that they managed to read data from 150 cards of Sberbank clients with a total available account balance of more than 1 million rubles.

A criminal case was opened against the detainees for preparing for theft. Now investigators are looking for possible accomplices of the attackers.

Let us recall that bank recently reported an increase in cases of installation of skimming equipment on its self-service devices. Thus, in the first 9 months of 2024, the bank counted more than 1,100 similar incidents against 496 similar incidents for the entire 2023. At the same time, the bank said that it was investing heavily in equipping ATMs with active protection means and transferring customers to cards with a chip.

Investigators are examining a skimmer removed from a bank ATM

Group-IB, a company specializing in the investigation of cybercrimes, notes that there are two main approaches to stealing money from bank cards through skimming. The first is the installation of skimming equipment “at random” in ATMs located in crowded places: at train stations, airports, shopping centers. Here, the attention of the security is more focused on ensuring general security, and there is not so much attention to ATMs, says Group-IB representative Bogdan Vovchenko, adding that it is most reliable to use ATMs located directly in bank branches.

The second approach is a targeted attack on an ATM, says Vovchenko. In this case, attackers are trying to steal salary money from the cards of corporate customers. To do this, most often with the help of an accomplice inside the victim company, skimming equipment is installed on an ATM where employees usually withdraw funds on the day they receive their paychecks.

Sberbank clients were also subjected to a similar attack. Thus, in the spring of 2024, approximately 50 employees of the Elemash sensitive plant in the Moscow region became victims of skimmers on payday . In 2023, 2GIS employees who were clients of VTB24 Bank faced a similar situation.

(c) https://safe.cnews.ru/news/top/politsiya_zaderzhala_skimmerovvorovavshih
 
Top