March 20, 2012

Atm Crime, Atm Fraud summary

Atm Crime: Attacks against Atms may be classified as either Atm bodily attacks or Atm fraud.

Atm bodily Attacks:
Atm bodily attacks are usually perpetrated with the intention of gaining access to the cash or other indispensable media within the Atm safe or Atm security enclosure.  Some of the most coarse methods consist of Ram Raid, Explosive charge (gas and non-gas) and Cutting (e.g. Rotary saw, blow torch, thermal lance, solitaire drill). The success of Atm bodily attacks is often measured by what division of the cash is stolen and the speed by which the charge is completed.

Atm Fraud
There are many dissimilar categories of Atm fraud. In general Atm fraud can consist of any deliberate 'criminal' technique which involves the use of an Atm to gather something of value to the perpetrator. The most coarse types of Atm fraud include  Card Theft (e.g. Lebanese Loop) , Pin Compromise (e.g. Shoulder Surfing), Card Skimming, Cash Trapping, Transaction Reversal and Deposit Fraud.




Atm Fraud in more detail:

Card Theft
Card theft is where the perpetrator physically obtains the consumer's card at or in the vicinity of an Atm. The most coarse formula of card theft is Card Trapping. The most popular formula of trapping a card at the Atm is known as Lebanese Loop. A Lebanese Loop is designed to be entered within the card entry slot of the Atm card reader in such a way as it does not prevent the buyer from entering their card, but it does prevent the Atm card reader from ejecting or returning the card to the consumer. The perpetrator can subsequently take off the trapped card once the buyer has departed from the Atm with the reliance that the Atm has captured or swallowed their card. Another variant of card trapping is known as the Algerian V trap. Other methods of card theft consist of card swapping where the consumer's card is exchanged for a card of similar appearance. This distraction formula is often executed at the time that the consumer's card is being returned or ejected to the buyer following a transaction at the Atm.

Pin Compromise
Pin compromise methods range from the very technically sophisticated to the relatively easy technique known as shoulder surfing. Shoulder surfing involves the perpetrator standing close sufficient to the buyer to contemplate the numbers entered on the key pad. A more sophisticated formula of notice or guard involves the use of a little camera which can either forward the image of the Pin being entered or store the recording within the device. With the growth in the number of mobile phones with video capture capabilities, such phones are adapted to compromise Pins. Keyboard overlays are devices which are designed to look very like the genuine Atm key pad and are fixed on top of the genuine key pad. The Keyboard Overlay will record the numbers entered on the key pad but also permit the genuine keyboard to accept the Pin being entered. Similarly to the use of cameras, the keyboard overlay may forward the facts to a remote receiver or store the facts locally. Sophisticated Atm Infrastructure Hacking, Architecture Hacking, Network Hacking, public Engineering, Phishing and assorted other methods are also used to compromise Pin codes.

Card Skimming
Card skimming involves making a copy of the facts encoded on the magnetic stripe of the card. There are assorted dissimilar types of skimming gadget designed to be used in dissimilar environments, from hand held devices straight through door access skimmers to little card entry slot skimmers. Hand held skimming devices are more ordinarily connected with card skimming in restaurants and other sell establishments. When used in the Atm environment the perpetrator will either use distraction techniques to temporarily gather and copy the consumer's card or sometimes pick the pocket of the consumer. Some Atms are installed in a controlled environment whereby the buyer is required to swipe a card at the door of the Atm location to gain access. Skimming devices may be attached to or used as a change for a genuine door access device.Atm card entry slot skimmers have assorted shapes and sizes and also vary in sophistication.  When installed correctly they allow general operation of the Atm in that the consumer's card is entered and returned correctly, any way the magnetic stripe is copied by the skimming device. One of the most effective Atm skimming devices is known as the Sofia skimmer. The skills of the perpetrators in modifying the packaging of skimming devices makes them very difficult for the untrained observer to detect.

Cash Trapping
Cash trapping is the term used to delineate attacks where the consumer's cash is trapped and prevented from being presented or delivered to the consumer. The variety of trapping devices is significant, fluctuating from those which want insertion within the Atm's cash dispenser straight through false fronts to well engineered electro-mechanical devices which simulate the removal of the cash by the consumer.

Transaction Reversal
Transaction reversal techniques involve very skilled manipulation of the Atm during a transaction with the succeed that the host computer believes that the buyer did not receive their cash and thus re-credits or reverses the transaction. Other variants of transaction reversal involve either collusion with man within the Atm network or detailed knowledge of the rules governing transaction processing.

Deposit Fraud
Deposit fraud covers a variety of criminal techniques from making false deposits, trapping deposits straight through skilful manipulation of the deposit accepting device. False Deposit fraud includes exploiting processing rules to draw on funds before they have been verified and officially cleared for crediting to an account. Similar to cash trapping, Deposit Trapping allows the perpetrator to gather the indispensable media prior to it being secured within the deposit terminals safe or security enclosure. very skilled perpetrators of deposit fraud may use techniques by which the deposit terminal believes it has received and successfully validated a deposit when in fact it has not.

Atm Crime, Atm Fraud summary

Netgear Modem Router Low Pressure Sensors