![]() |
Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
True. From brute force to some very sophisticated (readers attached to the front of real ATMs), to not so sophisticated (cameras mounted to record PIN #) ways to get ATM card info. But, the "Hollywood Hackers" have all those beat. From adjusting the balance in ones account (how much do you need for that island you want to buy). To inserting cards attached to a handhelds (remember in T2 for you Atari fans). But no one in the real world has come close to the "Hollywood Hackers". The delivery shutes are designed to limit the thickness of the stack of bills. Banks also limit the dollar amount of transactions in a 24 hour time period. Digital combinations on safes with a one time use. Remember there are only two companies in the US that produce ATMs. ----- Original Message ----- From: "Jerry Feldman" <gaf at blu.org> To: <discuss at blu.org> Sent: Monday, September 22, 2003 4:24 PM Subject: Re: Windows to Power ATM's in 2005 > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 22 Sep 2003 16:08:36 -0400 > Seth Gordon <sethg at ropine.com> wrote: > > > On Mon, 2003-09-22 at 14:28, Timothy M. Lyons wrote: > > > > > > As to hacking ATM's being a moot point, all I can say is with > > > patience, dedication, motivation, and resources, _any_ network or > > > device can be hacked. It's just a matter of finding the chink in the > > > armor. > > > > A few creative thieves have put up kiosks in shopping malls that look > > like ATMs; the machines read off the mag-strips of whatever cards are > > swiped through, take the PINs, and then tell the customer "service > > temporarily unavailable" or whatever. The thieves used this > > information to duplicate the cards and use them to withdraw money from > > real ATMs. > > > > Some ATMs have also been broken into with brute force -- by using a > > truck and a trailer hitch to pry off the front of the machine and then > > take the cash inside. > > > > With high-quality color scanners and ink-jet printers, forging > > cashiers' checks is a booming and lucrative business. > > > > Compared with all these techniques, what kind of > > return-on-criminal-investment can you get by attempting to hack an > > ATM? > > > And related to this some very sophisticated thieves use real ATMs and > attach their hardware. Unsuspecting people swipe their cards and enter > their pin numbers not knowing that the thieves are recording it. > > > - -- > Jerry Feldman <gaf at blu.org> > Boston Linux and Unix user group > http://www.blu.org PGP key id:C5061EA9 > PGP Key fingerprint:053C 73EC 3AC1 5C44 3E14 9245 FB00 3ED5 C506 1EA9 > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux) > > iD8DBQE/b1qX+wA+1cUGHqkRAm7SAJ9AVNRrfQHOaDmMcqynL6iCTF4cjwCfeCfs > 8lgZvz3sGGy6TNt82T3mryk= > =fCgR > -----END PGP SIGNATURE----- > _______________________________________________ > Discuss mailing list > Discuss at blu.org > http://www.blu.org/mailman/listinfo/discuss >
![]() |
|
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |