[FoRK] pos POS malware ram scraper

rst at ai.mit.edu rst at ai.mit.edu
Thu Jan 16 18:05:50 PST 2014


Gregory Alan Bolcer writes:
 > Well, they'll have to cryogenically pump liquid nitro into the ATM and hope
 > it stays frozen until they can get to the RAM.  Some of those ATM cases are
 > pretty tamper proof.   It's probably easier to just grab the money inside
 > than the data.

One common ATM hardware hack is the magstripe skimmer --- a separate
magstripe reader physically placed in front of the ATM's own, which 
stores the magnetic stripe data from cards passing through for later
retrieval.  The slicker ones are styled to match the ATM case, making
them very difficult to detect.

These don't necessarily capture the PINs --- but you don't need those
to make a purchase at a store POS, just a card of your own with the
stolen data written onto it.

rst


More information about the FoRK mailing list