[FoRK] pos POS malware ram scraper

Stephen Williams sdw at lig.net
Thu Jan 16 17:25:21 PST 2014

Hi-res video camera watching the card slot + keypad?  Catch numbers on 
the card most of the time, plus the pin.


What about attacking the data link?  I'm sure there was a pretty good 
period of time where it was not very secure.  Now, it would be criminal 
(almost) for that to be the case, but considering who is involved, I 
wouldn't be too surprised:


Lock keys can be stolen and duplicated.  Anything physical can be 
defeated in at least some circumstances.  Ruses of all kinds regularly work.


It is easy to steal a little.  It should not be easy to scale up.


On 1/16/14, 5:11 PM, Gregory Alan Bolcer wrote:
> Well, they'll have to cryogenically pump liquid nitro into the ATM and hope
> it stays frozen until they can get to the RAM.  Some of those ATM cases are
> pretty tamper proof.   It's probably easier to just grab the money inside
> than the data.
> Greg
> On Thu, Jan 16, 2014 at 5:03 PM, Joseph S Barrera III <joe at barrera.org>wrote:
>> On 01/16/2014 12:28 PM, Stephen Williams wrote:
>>> You're an idiot if you run Windows, especially to create a pos POS.
>> How about if you run Windows XP in your ATM?
>> http://www.businessweek.com/articles/2014-01-16/atms-face-
>> deadline-to-upgrade-from-windows-xp
>> _______________________________________________
>> FoRK mailing list
>> http://xent.com/mailman/listinfo/fork

More information about the FoRK mailing list