Skimmers intercept data via UTP cables from ATMs

Spread the love

According to security researcher Brian Krebs, ATM manufacturer NCR warns that criminals use external devices to intercept payment transactions at ATMs. These devices would be placed between the network cables.

Traditionally, criminals often use external devices that skim card data at the card slot of an ATM, Krebs said. However, the new way works differently, because the network cable of the ATM is tapped directly.

This method would be used in conjunction with a camera or device that can capture keystrokes. For example, criminals can read the pin code, which, according to ATM manufacturer NCR, is then sent wirelessly to the interception device on the cable.

Krebs therefore warns against standalone ATMs, which are vulnerable to these types of techniques. The article does not discuss how exactly the criminals intercept the data and whether it is encrypted. The exact functioning of the devices shown in the photos is also unknown.

NCR claims to be the world’s largest supplier of ATMs. There are 810,000 vending machines of the brand in operation worldwide.

Close-up of the devices in the first photo

You might also like