Taking a Trip to the ATM?
Beware of ‘Skimmers’
How skimming works
The devices planted on ATMs are usually undetectable by users—the makers of this equipment have become very adept at creating them, often from plastic or plaster, so that they blend right into the ATM’s façade. The specific device used is often a realistic-looking card reader placed over the factory-installed card reader. Customers insert their ATM card into the phony reader, and their account info is swiped and stored on a small attached laptop or cell phone or sent wirelessly to the criminals waiting nearby.
In addition, skimming typically involves the use of a hidden camera, installed on or near an ATM, to record customers’ entry of their PINs into the ATM’s keypad. We have also seen instances where, instead of a hidden camera, criminals attach a phony keypad on top of the real keypad … which records every keystroke as customers punch in their PINs.
Skimming devices are installed for short periods of time—usually just a few hours—so they’re often attached to an ATM by nothing more than double-sided tape. They are then removed by the criminals, who download the stolen account information and encode it onto blank cards. The cards are used to make withdrawals from victims’ accounts at other ATMs.
One last note: ATMs aren’t the only target of skimmers—we’ve also seen it at gas pumps and other point-of-sale locations where customers swipe their cards and enter their PIN. This is why running your card as credit is safer.