Video: A Card Skimmer Was Installed in 3 Seconds

Not so long ago we wrote about tricks the fraudsters use for credit card frauds or identity thefts (and then, of course, for stealing money). But it is one thing to read, and quite another – to see. Thanks to the video record, recently put on the Internet by the Miami police, we can estimate the high “professionalism” of the crooks installing a card skimmer on the POS terminal.

The video was recorded in a store at the petrol station. The fraudsters worked in tandem. While one was distracting a seller, another installed an ATM skimmer on a payment terminal at a cash register. His speed is particularly striking as it took him only 3 seconds!

The skimming was not successful only by sheer luck. A pad on the terminal was placed a bit askew, an employee noticed it and called the police.

We would like to remind that the credit card skimming is a way to steal money placing a special pad on the ATM or a POS terminal. Usually, it is a copy of the ATM keypad fixed on a top of the original one. When a credit card is inserted into the ATM or POS-terminal with a skimmer, the skimmer records the credit card data. The owner of the card doesn’t notice anything. For him, the transaction is carried out in a regular mode.

After that, the fraudsters withdraw the credit card data. They take a skimmer away or use a remote reader. Further developments can move in two main scenarios. The fraudsters either use the compromised bank card data to pay for Internet purchases or make a copy of this card and withdraw money from the victim’s account using the ATM.

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Author: Anna

If you have any questions about two-factor authentication and Protectimus products, ask Anna, and you will get an expert answer. She knows everything about one-time passwords, OTP tokens, 2FA applications, OATH algorithms, how two-factor authentication works, and what it protects against. Anna will explain the difference between TOTP, HOTP, and OCRA, help you choose a token for Azure MFA, and tell you how to set up two-factor authentication for Windows or Active Directory. Over the years with Protectimus, Anna has become an expert in cybersecurity and knows all about the Protectimus 2FA solution, so she will advise on any issue. Please, ask your questions in the comments.

Share This Post On

2 Comments

  1. It’s difficult to find educated people for this subject, however, you sound like you know what you’re talking about!
    Thanks

    Post a Reply
  2. Appreciate it for helping out, wonderful information.

    Post a Reply

Leave a Reply to Stephen Cancel reply

Your email address will not be published.

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from Protectimus blog.

You have successfully subscribed!

Share This