In a little over a decade, ATM skimmers have gone from urban myth to a wildly complex, ever-evolving suite of technologies that has the potential to be the worst nightmare of anyone with a bank account. Here’s a look at how quickly skimmers have evolved — and why they’re increasingly impossible to spot.
What is skimming?
In its most basic form, skimming is really just a way to intercept an otherwise legitimate financial transaction. Whether it’s a rig hooked up to an ATM, a cash register, or even something as low-tech as photocopying receipts, the thief uses their mechanism of choice to swipe your card’s data, as you go about your business totally unaware.
To gain full, total access to all your hard-earned funds, thieves-to-be need to secure your PIN, too. That usually means rigging up a camera overhead to capture your keystrokes or, if they’re particularly conniving, laying a device over the keypad itself. In other words — skimming can be sneaky as hell.
How has it changed?
Tracing skimming back to its origins is difficult, if for no other reason that it was years before their existence was confirmed. There have been traces and whispers of skimmers, though, for well over a decade.
In December of 2002, a CBS report confirmed the existence of what had been widely believed to be a fairy tale: tiny devices called skimmers that could “record the names, account numbers and other identifying information from the magnetic stripes to be downloaded onto a personal computer later.” A personal computer!
At that time, even lawyers still believed that skimmers were more fiction than fact. When a prosecutor who specialised in frauds, Howard Wise, got scammed himself, he was shocked that the technology existed explaining that, “At that time, frankly, I thought skimmers were an urban myth.”
Of course, that blissful ignorance didn’t last for long. Barely a year later, in 2003, customers using an ATM at an New York City deli lost upwards of $US200,000 in one day thanks to a single skimming device. For most of the decade, the closest look anyone had gotten at an actual skimmer was in the occasional cautionary chain email.
That changed in 2008, when the Naples Police Department received a call about the following (sad) attempt at camouflaging a skimmer.
This rudimentary device consisted of a card reader you could buy from any number of reputable online retailers, jammed over the ATM’s actual reader. Then, the thief stuck a “micro camera” under a plastic sheet to capture the victims’ keypad strokes.
So while we did have proof that, yes, these cases really were happening, it wasn’t until 2009 that skimming really started to take off — both in number of cases and in the quality of the skimmers themselves.
Compared to what we often deal with today, the first batch of discovered skimmers were downright primitive. The one you see below is little more than a battery, flash memory card, and mini USB port.
It was discovered in 2009 by a Consumerist reader who, thanks to some MD 20/20-fuelled paranoia and an objectively awful masking tape job, sensed something fishy as he was getting money out of an ATM. He yanked on the card reader and — lo and behold — the appendage dropped right into his hands.
Later that same month, another skimmer was discovered, one that prevented the actual ATM from successfully reading the card at all and made use of a false mirror that contained a camera to capture victims’ keypad strokes.
In the early days, finding covert ways to send stolen PINs and security codes back to the scammers was the key to a successful skim, as these photos from Mikko Hypponen, Chief Research Officer at F-Secure, show:
While some of the early models might have occasionally rendered the actual ATMs useless, it didn’t take long for skimmers to start working with the machines they were leeching off instead of against them.
As you can see above, cameras were certainly helpful in gathering PINs, but they’re not easy to slip onto machines on the sly. To work around that, crooks started using keypad overlays, which fit just on top of the original keypad and make note of which numbers are pushed for which transactions.
As the tech evolved, implementing the scam became even easier. Eventually, you you could outsource the tech know-how entirely. Sites began selling whole skimming kits that could be colour-coded according to the type of machine you were planning to rip off. They could be yours for around $US1500.
But that’s just a starter model. One top-of-the-line device that Brian Krebs wrote about in 2010 went for anywhere between $US7,000 and $US8,000:
Not all skimmers are so pricey: Many are prefabricated, relatively simple devices that fraudsters attach to an ATM and then collect at some later point to retrieve the stolen data. The trouble with these devices is that the fraudster has to return to the compromised ATM to grab the device and the stolen data stored on it.
In contrast, wireless skimmers like the one pictured below allow the thief to receive the stolen card data from anywhere in the world, provided he or she has a working cell phone signal.
The actual card skimmer in this seller’s model is quite small, and yet includes both a magnetic strip reader and a tiny radio that sends the collected data (known as “dumps” in fraud circles) in an encrypted format to a device built into the PIN pad.
Advanced skimmers like the one above featured a PIN-pad overlay that essentially had cell-phone guts built into the device. This module would bundle both the stolen card data and the typed-in PIN, finally sending the whole package right back to the thief’s cell phone in a series of two to four text messages. That’s a much safer bet than having to return to the scene of the crime to retrieve the info.
Eventually, ATM manufacturers began working anti-skimming tech into their machines. At first, this just meant fitting translucent, circular casings over the card reader. Casing that, unsurprisingly, it didn’t take long for thieves to replicate.
As you can see in the photo above, the only difference is a small piece of plastic that you’d have to be actively seeking out to even notice. Meanshile, the rise in 3D-printing firms meant it was even easier to custom-build overlaying skimmers to criminals’ exact specifications.
Home 3D printers weren’t practical yet; these were outsourced to third-party vendors, some of whom got wise. When 3D printing firm i.materialise got a suspicious order, its engineers looked deeper into what they were being asked to print, realised it was a fraud device, and denied the order.
Spotting these nefarious devices only became more and more difficult. From the front, the skimmer you see below is almost perfect. The only giveaway? A tiny, tiny pinhole on the right hand side of the device (see the close-up), through which a small camera can capture PIN as skimming victims type them in.
Eventually skimmers got so small you couldn’t see them even if you tried. According to the European ATM Security Team, the latest ATM skimmers in July of 2012 were in fact paper-thin card reading devices, which are physically inserted inside the card slots in cash machines. In other words, you literally can’t even see they’re there.
It wasn’t just ATMs, though. Even point-of-sale devices were being retrofitted with skimmers and sold to criminal wannabes. The video below shows a Verifone POS device printing out a fake transaction receipt.
That way, temporary employees could switch out their usual device with the phony one and, once they left, they’d have all the decrypted card data and PINs they could get their hands on. The sellers pitch, as discovered by Brian Krebs: “POS is ‘fake’ and stores D+P [card data and PIN], prints out approved receipt or can be setup for connection error. Software to decrypt the data is provided. It keeps d+p inside memory for manual retrieval via USB cable.”
Then, it was the gas pump’s turn. In 2013, a series of scams in Oklahoma saw thieves take home $US400,000 from a chain of Murphy’s gas stations before they were eventually caught. The thieves used a card skimmer and fake PIN pad overlay to obtain the necessary information.
What’s more, these skimmers used Bluetooth-enabled devices that sucked power from the pumps themselves. That means they could run indefinitely, and allow remote access to the data they collected; once it was installed, the thieves would never need touch the skimmer again.
While most skimmers were getting small beyond belief, others took the opposite approach. The “skimmer” below is actually an entire fake ATM cover that was stacked on top of an already existing machine in Brazil.
The elaborate device appears to be powered by a disassembled laptop, screen and all.
Something that large obviously isn’t quite as viable as a smaller, more discreet option, which is what you’re most likely to fall victim to today, like the razor-thin ATM skimmer uncovered just earlier this week.
Here, all it took was a watch battery, a tiny storage device, and what we assume was little more than a few minute spent messing around with the ATM itself. As you can see from the video below of scammers installing and removing skimmers, it doesn’t take much time at all.
Fortunately, manufacturers are working on ways to stop these fiends before they can get their claws into your data. But as we’ve seen, it doesn’t take long for crooks to adapt to the same tech meant to fend them off.
So what can you do to stop this from happening to you? Always, always cover the keypad when entering your PIN; the majority of setups use a camera to capture the final puzzle piece. And while the a whole new set of problems.
So if anything on any credit or ATM card-reader looks suspicious to you, better to be safe and pass it up. You never know what crazy camouflage they will cook up next.