Thanks for your update on this. I want to bring to your notice the hottest news which talks about how effective is the jitter mechanism used in anti-skimming devices. Hackers today already know how to trick the jitter. Visit the below link for more information on ATM Skimming and Jitters:
http://www.bankinfosecurity.com/articles.php?art_id=2667 Regards T. Amardeep On Mon, Jun 21, 2010 at 11:26 AM, Sandeep Thakur <[email protected]>wrote: > The anti-skimming device has been developed to combat the increasing > number of attacks on ATM units as explained by Amardeep in the last > post. It is a proactive threat management system that not only detects > suspicious activity but reports the threat level to the ATM operator > and financial / banking institution. Investing in the anti skimming > devices will provide you with the most advanced and secure system in > the market today. The features shall include the below: > > > Communication > > Card Reader independent > > Position independent > > RF protection > > Spy camera protection > > No engineer reset > > Metal detection > > Ultra-sonics > > Drilling detection > > Lebanese loop > > NCR (An ATM based company) unveiled such anti-skimming device in early > 2004; teams with Bancafe for biometric ATMs; Visit the below link for > more information: > > http://www.finextra.com/news/fullstory.aspx?newsitemid=12877 > > http://security.networksasia.net/content/ncr-protects-customers-50000th-anti-skimming-software-license-atms > > > Regards > Sandeep Thakur > > > On Jun 15, 7:22 pm, Amar Deep <[email protected]> wrote: > > Hi, > > > > ATM skimmers –or fraud devices that criminals attach to cash machines in > a > > bid to steal and ultimately clone customer bank card data — are marketed > on > > a surprisingly large number of open forums and Web sites. For example,ATM > > barker operates a forum that claims to sell or even rent ATM skimmers. * > > Tradekey.com*, a place where you can find truly anything for sale, also > > Market this devices on the cheap. > > > > The truth is that most of these skimmers openly advertised are little > more > > than scams designed to separate clueless crooks from their ill-gotten > gains. > > Start poking around on some of the more exclusive online fraud forums for > > sellers who have built up a reputation in this business and chances are > > eventually you will hit upon the real deal. > > > > Generally, these custom-made devices are not cheap, and you won’t find > > images of them plastered all over the Web. Take these pictures, for > > instance, which were obtained directly from an ATM skimmer maker in > Russia. > > This custom-made skimmer kit is designed to fit on an *NCR ATM model > 5886*, > > and it is sold on a few criminal forums for about 8,000 Euro — shipping > > included. It consists of two main parts: The upper portion is a carefully > > molded device that fits over the card entry slot and is able to read and > > record the information stored on the card’s magnetic stripe (I apologize > for > > the poor quality of the pictures: According to the exif dta included in > he > > page, they were taken earlier this year with a *Nokia 3250 *phone). > > > > The second component is a PIN capture device that is essentially a dummy > > metal plate with a look-alike PIN entry pad designed to rest direct on > top > > of the actual PIN pad, so that any keypresses will be both sent to the > real > > ATM PIN pad and recorded by the fraudulent PIN pad overlay. > > > > Both the card skimmer and the PIN pad overlay device relay the data > they’ve > > stolen via text message, and each has its own miniature GSM Device that > > relays SMS messages (buyers of these kits are responsible for supplying > > their own SIM CARDS). According to the vendor of this skimmer set, the > > devices are powered by lithium ion batteries, and can run for 3-5 days on > a > > charge, assuming the skimmers transmit on average about 200-300 SMS > messages > > per day. > > > > This skimmer kit even includes an alarm feature so that if it is removed > — > > either by the fraudster or a bank manager or passerby — the devices will > > immediately transmit any of their stored stolen data. > > > > Skimmers can be alarming, but they’re not the only thing that can go > wrong > > at an ATM. It’s a good idea to visit only ATMs that are in well-lit and > > public areas, and to be aware of your surroundings as you approach the > cash > > machine. Also, don’t be shy about covering the PIN pad with your hand so > > that any shoulder-surfers (or hidden cameras) can’t see your code. If > you > > find an ATM skimmer or other fraud device attached to an ATM, report it > to > > the bank. If the bank is closed, it’s probably a good idea to leave the > > device alone and to call the police: There is a good chance that the > thief > > who attached the device is somewhere nearby. > > -- > You received this message because you are subscribed to the Google Groups > "nforceit" group. > To post to this group, send an email to [email protected]. > To unsubscribe from this group, send email to > [email protected]<nforceit%[email protected]> > . > For more options, visit this group at > http://groups.google.com/group/nforceit?hl=en-GB. > > -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
