[FoRK] pos POS malware ram scraper
sdw at lig.net
Thu Jan 16 17:25:21 PST 2014
Hi-res video camera watching the card slot + keypad? Catch numbers on
the card most of the time, plus the pin.
What about attacking the data link? I'm sure there was a pretty good
period of time where it was not very secure. Now, it would be criminal
(almost) for that to be the case, but considering who is involved, I
wouldn't be too surprised:
Lock keys can be stolen and duplicated. Anything physical can be
defeated in at least some circumstances. Ruses of all kinds regularly work.
It is easy to steal a little. It should not be easy to scale up.
On 1/16/14, 5:11 PM, Gregory Alan Bolcer wrote:
> Well, they'll have to cryogenically pump liquid nitro into the ATM and hope
> it stays frozen until they can get to the RAM. Some of those ATM cases are
> pretty tamper proof. It's probably easier to just grab the money inside
> than the data.
> On Thu, Jan 16, 2014 at 5:03 PM, Joseph S Barrera III <joe at barrera.org>wrote:
>> On 01/16/2014 12:28 PM, Stephen Williams wrote:
>>> You're an idiot if you run Windows, especially to create a pos POS.
>> How about if you run Windows XP in your ATM?
>> FoRK mailing list
More information about the FoRK