Site icon CCTV, Inverters & Smart Security Solutions

How To Prevent ATM Card Fraud and Skimming

ATM card is one of the benefits technology advancement has brought to the banking industry, but it can be disastrous if it is not being carefully handled because your fund is directly tied to it.

Your financial institution will send you periodic security tips on how you can effectively manage and protect your card from theft or any unauthorized use.

One of the security tips from your bank is never to disclose your card information to anyone.

Your banking details include:

          a. Hardware token is a hardware device that is synchronized with your account. To generate token value, you need to press the small button on it to display value after which the value gets reset in 30 seconds, or as the financial institution has programmed it.          b. Software token has the same value just as hardware token but it is only generated by an app installed on your mobile device. Software token can also be requested over SMS and it will arrive as OTP (one-time-password) which is set to expire by a certain period of time depending on the financial institution.

There are so many fraudulent ways ATM card thieves can play tricks on you but you should never fall for any.

They can go to any length to call your telephone number which you have on file with your financial institution, and pretended to act as your bank. They are simply impostors.

If you are suspicious of their request, quickly hang up on them and call your bank account manager or customer support official telephone for clarification, to be forewarned is to be forearmed.

Impostors have called me several times to ask me to read out my full ATM card number and the validity period to enable them to block suspected fraudulent transactions originating from my account but I declined.

I knew my financial institution would never call me for such information. My bank would have automatically blocked any suspected fraudulent transaction on my account and subsequently sent me a notification by email.

Subsequently, your bank will send you a notification to urgently update your online banking login credentials if they feel your account has been compromised.

To date, I receive numerous phishing emails pretending to originate from my financial institution, I always send them to the spam folder.

Phishing emails are meant to reside in the spam folder because:

 

If you managed to read the phishing email from the spam folder like me, their message is always tailored to “update your account by clicking a link below to prevent it from being suspended” or “click the link below to unblock your account” and many more.

They use many deceptive captions to get you to click and supply your data, after which the credentials are captured and your account compromised.

When using your financial institution’s website, always make sure that the site has a closed padlock. The closed padlock can be referred to as SSL.

What does SSL mean?

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) is the most widely deployed security protocol used today. It is essentially a protocol that provides a secure channel between two machines operating over the Internet or an internal network. In today’s Internet-focused world, the SSL protocol is typically used when a web browser needs to securely connect to a web server over the inherently insecure Internet.

Technically, SSL is a transparent protocol that requires little interaction from the end-user when establishing a secure session. In the case of a browser for instance, users are alerted to the presence of SSL when the browser displays a padlock, or, in the case of Extended Validation SSL, when the address bar displays both a padlock and a green bar. This is the key to the success of SSL – it is an incredibly simple experience for end-users.

As opposed to unsecured HTTP URLs which begin with “http://” and use port 80 by default, secure HTTPS URLs begin with “https://” and use port 443 by default.

HTTP is insecure and is subject to eavesdropping attacks which can let attackers gain access to online accounts and sensitive information if critical information like credit card details and account logins is transmitted and picked up. Ensuring data is either sent or posted through the browser using HTTPS is ensuring that such information is encrypted and secure.

In practice, how is SSL used in today’s modern e-commerce enabled / online workflow and service society?

Financial institutions have always embarked on periodic campaigns that you should disregard any email instructing you to update your account by supplying your details.

Another strategy to get people scammed is through BVN. The CBN has always engaged in sensitizing bank customers on the need to be vigilant and disregard unsolicited emails and text messages asking you to supply your information, in order to get your account re-activated or from getting suspended.

Another danger you need to watch out for is ATM skimming and how ATM skimmers operate.

What is ATM skimming all about?

ATM skimming is identity theft for prepaid, debit, and credit cards. This is when criminals place a hidden electronic device on the face of the ATM machine card slot to capture information of the card and record the pin when it is inserted unknown to the card owner.

ATM skimming is popular in the western world. ATM card skimming has been widely reported to have happened at gas stations. Few were also reported in stores that were perpetrated by corrupt employees.

ATM skimming is not trendy in Nigeria just yet but awareness must be raised to let you know how it works and how you can further prevent yourself from being a victim.

I was fortunate to be in one popular bank performing a transaction the other day when a customer rushed in and walked straight to the CIS and started making a scene. He complained how he got a debit alert of seventy-thousand naira (NGN70,000) amount which he never performed.

The troubled customer further explained the debit alert stated that the transaction was performed in Benin City of Edo State, Nigeria whilst he was in Lagos state at the exact time of the transaction.

The first thing that came to my mind was either he has been a victim of ATM skimming or someone deliberately stole and cloned his card.

ATM skimming exists in many versions.

  1. Your card information can be captured on a compromised ATM alongside your pin code.
  2. Your card information can also be captured by a corrupt employee if you use a PoS machine. How does this work? The corrupt employee secretly swipes your card against their card reader device after which the card information is replicated to a blank card.

How does ATM Skimming Work?

Skimmers use hidden electronics to steal the personal information stored on your card and record your PIN number to access all that hard-earned cash in your account.

Skimming requires two separate components to work.

The first component is the skimmer itself which captures the card information. The skimmer is placed on top of the ATM’s real card slot. When you insert the card, you are accidentally sliding it through the replica reader. This way, the replica reader scans and stores all the available information on the card via the magnetic strip.

Nevertheless, the skimmer needs your PIN code to be able to gain full access to your bank account, they simply insert a pinhole camera towards the ATM PIN pad to capture your input.

This captured PIN is then matched with the information on the skimmer and the time it was captured. That is how they sort the PINs for the captured cards.

Some ATM skimming schemes employ fake keypads as an alternative to cameras to capture PIN numbers. Just like the card skimmers fit over the ATM’s true card slot, skimming keypads are designed to mimic the keypad’s design and fit over it like a glove.

The skimmer has two options of retrieving the captured details, he can either control the device remotely through a mobile network or come physically to remove the device and download the details onto his computer.

These captured details are then written or copied to blank ATM cards through a match stripe writer, this process is called ATM card cloning which means the skimmer now has your physical card with your password in his possession.

Although, CBN has addressed this issue and has long given directives to all banks in Nigeria to install ATM anti-skimmer on their respective ATM machines. The anti-skimmer is mostly the green plastic you see on the card slot.

Tips To Help You Prevent ATM Card Fraud and Skimming

Advanced card thieves may use a thermal imaging device such as a thermal vision camera to view the sequence of your PIN combination.

ATM Credit Card Holder is known to be a good RFID blocker. This cardholder is made with high-quality stainless steel which is a good deterrent to block RFID signals that card thieves may want to use to steal your card information without your knowledge.

You can order the ATM Credit Card Holder and protect your cards from attack.

Card thieves have gone one step ahead in their hacking, you need to be on top of your game.

This process only involves the card thieve to install a credit card reader app on their smartphone. And with the help of NFC (Near Field Communication) technology, this process does not even need physical contact to steal your card identity.

 

Final Advice

Despite the emergence of EMV chip technology, credit and debit cards are still susceptible to card fraud and identity theft due to the magnetic strip used in them.

Internet is not a safe place, you need to be cautious when you are using your card. Debit card only has less security. And because it is directly tied to your bank account, it is better you don’t use it for online transactions, shopping, or paying via POS.

You can easily apply for a utility card from your bank. This way, if the hacker eventually has access to the card, you can only lose the fund in the card and not the fund in your bank account.

A utility card can help you to have peace of mind, you can easily manage your utility card by only transferring the needed fund to the card unlike a debit card, which has all your fund in it.

If you found this article helpful, please consider sharing it amongst your friends and family to help them understand more about how to better handle their cards.

Feel free to interact by using the comment box below.

Exit mobile version