Skimming made easier with hacked portable card payment machines

Share this article:
Hacked portable POS devices are now making it easier for crooks to steal card numbers.
Hacked portable POS devices are now making it easier for crooks to steal card numbers.

For years electronic skimming devices have been stealing credit and debit card information with varied success, but the researchers at global cyber security company Group-IB have noticed an increasing amount of modified point-of-sale (POS) devices circulating in underground markets.

It is possible that other models may be in use, but Group-IB focused on one in particular: the VeriFone VX670.

VeriFone's wireless point-of-sale (POS) machine has been completing portable business transactions for nearly 10 years, but now at least one cyber crook is selling a modified version of the device that will capture card numbers and send the data to scammers via cable or wireless connection. It is easy to use and pretty seamless, too.

Andrey Komarov, CTO and head of international projects with Group-IB, told SCMagazine.com on Tuesday that one reason the modified device is attractive to skimmers is that it can send data through general packet radio service (GPRS), Bluetooth, or Wi-Fi, so all a user has to do is sit nearby and collect card data as it is processed.

Other reasons these devices are popular is their ability to store a lot of information, read track 1 and track 2 of a card's magnetic strip, detect PIN codes, and alter what is printed on a receipt, according to Komarov.

“It is hard to detect on the bank side,” he said. “[The banks] need to analyze the possible location of the fraud. It is hard because you need to analyze the merchants where the card was used and interview the victim.” At that point the crook would have likely recovered the device, Komarov added.

Komarov said he first heard of the devices being used in Moscow restaurants where $30,000 was being taken every month. Since then he has seen it pop up across the globe in retail locations and hotels.

“The key area is resort locations,” Komarov said, pointing to Asian countries, such as Thailand, where he said card security is not as high a priority.

The modified VeriFone device can be purchased for $3,000 on various underground websites, Komarov said, but “it is also possible to rent it [for] $2,000,” plus an additional 20 percent of the material theft.

The device's creator is suspected of having “Russian-speaking roots,” Komarov said, referencing a Sberbank card that was used in a vendor video to demonstrate the modified VeriFone device. Sberbank is the largest bank in Russia and Eastern Europe.

“Tampered devices are well-known since 2007,” Komarov said, explaining this type of campaign may be a game changer because $5,000 to $10,000 ATM skimmers are becoming increasingly harder to hide and POS malware is difficult to install due to a lack of vulnerable machines and the need of insider help.

Financial services corporation Visa offers tips to businesses on how to protect against tampering of POS devices, including conducting frequent investigations for simple abnormalities, such as missing screws, extra holes or excess wiring.

From a customer perspective, Komarov suggested people use an EMV card – which contains a microprocessor chip that prevents card information from being accessed by unauthorized parties – and said that cardholders should only use approved POS devices that contain a hologram.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.