See in action a sophisticated ATM Skimer

In 2009 one appeared software called “Skimer.” Skimer is essentially malware that gives a hacker full access to an ATM without having to install any physical hardware, such as a card copier. According to a new study by Kaspersky Lab, malware has become much more powerful.Skimer

Kaspersky discovered the latter του Skimer αυτό το μήνα μετά από τη διερεύνηση μη νόμιμων αναλήψεων σε μια τράπεζα. Ενώ η τράπεζα δεν κατάφερε να ανακαλύψει κανένα αποδεικτικό στοιχείο για ότι είχε δεχθεί , η εταιρεία ασφαλείας διαπίστωσε ότι είχε χρησιμοποιηθεί μια νέα έκδοση του Skimer. Η νέα έκδοση ήταν τόσο βελτιωμένη που καθιστούσε δυσκολότερη την ανίχνευση. Επιπλέον το κακόβουλο λογισμικό επέτρεπε στους hackers να αναλάβουν τον πλήρη έλεγχο κάθε ΑΤΜ.

Hackers begin by installing a file called Backdoor.Win32.Skimer. The malware hidden in the ATM code stays on hold until the hacker runs it by inserting a specific card.

Kaspersky explains what happens next:

Skimer's graphical interface appears on the screen only after the card has been exported and if the hacker inserts the correct pin key.

With the help of a menu that appears, the hacker can run 21 different commands, such as distributing money (40 accounts at a time), collecting items from ATM cards, auto-delete malware, malware update the updated malware code embedded in the card chip), etc.
Also, when collecting card details of the bank's customers, the Skimer saves it and the PINs on the chip of the hacker's card.

Traditionally skimmers are simple που μπορούν να υποκλέψουν μια συναλλαγή. Στα ΑΤΜ, μπορούν να καταγράφουν τους αριθμούς της πιστωτικής σας κάρτας, και με τη βοήθεια πρόσθετης τεχνολογίας, όπως φωτογραφικές μηχανές ή επικαλύψεις πληκτρολογίου, μπορούν να υποκλέψουν και κωδικούς PIN. Αν ξέρετε πού να κοιτάξετε, μπορείτε να δείτε αν το ΑΤΜ έχει πειραχτεί, αν και το υλικό που χρησιμοποιούν οι hackers γινεται ολοένα και πιο εξελιγμένο.

Skimer, on the other hand, is a bit more complicated. It can access ATMs either through physical access, such as a traditional card replicator, or via the bank's internal network. Kaspersky warns that Skimer infected ATMs are not easy to distinguish and are hard to spot:

In the majority of cases, criminals choose to wait for data collection to make copies of cards later. With these copies go to a different, uninfected ATM and withdraw money from customers' accounts. In this way, criminals can ensure that infected ATMs will not be discovered soon.

But let's see Skimer in action:

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).