{"id":8862,"date":"2017-08-22T10:18:00","date_gmt":"2017-08-22T18:18:00","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/22\/news-2635\/"},"modified":"2017-08-22T10:18:00","modified_gmt":"2017-08-22T18:18:00","slug":"news-2635","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/08\/22\/news-2635\/","title":{"rendered":"Dumping Data from Deep-Insert Skimmers"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 22 Aug 2017 14:19:02 +0000<\/strong><\/p>\n<p>I recently heard from a police detective who was seeking help identifying some strange devices found on two Romanian men caught maxing out stolen credit cards at local retailers. Further inspection revealed the devices to be semi-flexible data transfer wands that thieves can use to extract stolen ATM card data from &#8220;<a href=\"https:\/\/krebsonsecurity.com\/2016\/05\/crooks-go-deep-with-deep-insert-skimmers\/\" target=\"_blank\">deep-insert skimmers<\/a>,&#8221; wafer-thin fraud devices made to be hidden inside of the card acceptance slot on a cash machine.<\/p>\n<p>The investigator agreed to share the photos if I kept his identity out of this story. He told KrebsOnSecurity that the two men\u00a0were thought to be part of a crime gang active in the northeast United States, and that the almost 4-inch orange plastic wands allow thieves to download data from a deep insert skimmer. Depending on how the deep-insert skimmer is built, thieves may be able to use the wands to retrieve card data without having to remove the skimmer from the throat of the ATM.<\/p>\n<p>Deep insert skimmers are different from <a href=\"https:\/\/krebsonsecurity.com\/2016\/06\/atm-insert-skimmers-in-action\/\" target=\"_blank\">typical insert skimmers<\/a>\u00a0in that they are placed in various positions within the card reader transport, behind the shutter of a motorized card reader and completely hidden from the consumer at the front of the ATM.<\/p>\n<p>Here&#8217;s a look at these insert skimmer wands (for want of a better term):<\/p>\n<div id=\"attachment_40350\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-40350\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimcord-580x452.png\" alt=\"These plastic wands allow thieves to extract stolen card data stored by insert skimmers. \" width=\"580\" height=\"452\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimcord-580x452.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimcord-768x599.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimcord-940x733.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimcord.png 1261w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">These plastic wands allow thieves to extract stolen card data stored by insert skimmers.<\/p>\n<\/div>\n<p>This is what the wand (left) looks like when inserted into a deep-insert skimmer (right):<\/p>\n<div id=\"attachment_40351\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-40351\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimpluggedin-580x238.png\" alt=\"A data transfer wand inserted into a deep-insert skimmer.\" width=\"580\" height=\"238\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimpluggedin-580x238.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimpluggedin-768x316.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimpluggedin-940x386.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimpluggedin.png 1521w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">A data transfer wand inserted into a deep-insert skimmer.<\/p>\n<\/div>\n<p><span id=\"more-40346\"><\/span>The following image shows three data transfer wands and three insert skimmers seized from compromised ATMs:<\/p>\n<div id=\"attachment_40352\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-40352\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskim-withcord-580x471.png\" alt=\"Insert skimmers (top) and data transfer wands.\" width=\"580\" height=\"471\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskim-withcord-580x471.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskim-withcord-768x624.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskim-withcord-940x764.png 940w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskim-withcord.png 1021w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/p>\n<p class=\"wp-caption-text\">Insert skimmers (top) and data transfer wands.<\/p>\n<\/div>\n<p><strong>Charlie Harrow<\/strong>, solutions manager for ATM maker <strong>NCR Corp.<\/strong>, said he has not physically examined the devices pictured above, but that they appear to have a USB interface on one end (the end that plugs into whatever device the crooks use to download stolen card data from the deep-insert skimmer) and a <a href=\"https:\/\/www.google.com\/search?q=low+profile+header&amp;tbm=isch&amp;imgil=Nnag6vp2oZfMfM%253A%253BG6Xily3WcB-l-M%253Bhttp%25253A%25252F%25252Fwww.fischerelektronik.de%25252Fen%25252Flatest-news%25252Fpress-releases%25252Freleases%25252Fdouble-row-precision-male-and-female-headers-low-profile%25252F&amp;source=iu&amp;pf=m&amp;fir=Nnag6vp2oZfMfM%253A%252CG6Xily3WcB-l-M%252C_&amp;usg=__Ht4HBdq_LjKNXOX_DQ85u_vJgj0%3D&amp;biw=1222&amp;bih=763&amp;dpr=1.25&amp;ved=0ahUKEwjntPCb9urVAhXK7IMKHS2ZAYAQyjcIZQ&amp;ei=bi6cWefFGMrZjwStsoaACA#imgrc=Nnag6vp2oZfMfM:\" target=\"_blank\">low profile header<\/a> on the other.<\/p>\n<p>&#8220;USB connectors are too big generally to put on a skimmer, especially the newer deep insert skimmers,&#8221; Harrow said. &#8220;Those devices have very low profile connections such that the overall device thickness is kept to a minimum.&#8221;<\/p>\n<p>Once you know about all the ways that skimmer thieves are coming up with to fleece banks and consumers, it\u2019s difficult not to go through life seeing every ATM as potentially compromised. I&#8217;m constantly banging and pulling on the poor machines and half expecting half hoping parts to come unglued. I\u2019m always disappointed, but it hasn\u2019t stopped me all the same.<\/p>\n<p>Truthfully, you probably have a better chance of getting physically mugged after withdrawing cash than you do encountering a skimmer in real life. So keep your wits about you when you\u2019re at the ATM, and avoid dodgy-looking and standalone cash machines in low-lit areas, if possible. When possible, stick to ATMs that are physically installed at a bank. And be especially vigilant when withdrawing cash on the weekends; thieves tend to install skimming devices on Saturdays after business hours \u2014 when they know the bank won\u2019t be open again for more than 24 hours.<\/p>\n<p>Lastly but most importantly, covering the PIN pad with your hand defeats one key component of most skimmer scams: The spy camera that thieves typically hide somewhere on or near the compromised ATM to capture customers entering their PINs.<\/p>\n<p>Shockingly, few people bother to take this simple, effective step, as detailed in\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2012\/09\/a-handy-way-to-foil-atm-skimmer-scams\/\" target=\"_blank\">this skimmer tale from 2012<\/a>, wherein I obtained hours worth of video seized from two ATM skimming operations and saw customer after customer walk up, insert their cards and punch in their digits \u2014 all in the clear.<\/p>\n<p>For more on how these insert skimmers work, check out\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2016\/05\/crooks-go-deep-with-deep-insert-skimmers\/\" target=\"_blank\">Crooks Go Deep With \u2018Deep Insert\u2019 Skimmers<\/a>. If you\u2019re here because, like me, you find skimmers of all kinds fascinating, please see my series\u00a0<a href=\"http:\/\/krebsonsecurity.com\/all-about-skimmers\/\" target=\"_blank\">All About Skimmers<\/a>.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/08\/dumping-data-from-deep-insert-skimmers\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/insertskimcord-580x452.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 22 Aug 2017 14:19:02 +0000<\/strong><\/p>\n<p>I recently heard from a police detective who was seeking help identifying some strange devices found on two Romanian men caught maxing out stolen credit cards at local retailers. Further inspection revealed the devices to be semi-flexible data transfer wands that thieves can use to extract stolen ATM card data from &#8220;deep-insert skimmers,&#8221; wafer-thin fraud devices made to be hidden inside of the card acceptance slot on a cash machine.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[13951,13952,11118,10644],"class_list":["post-8862","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-charlie-harrow","tag-deep-insert-skimmer","tag-ncr-corp","tag-other"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8862"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8862\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}