Valentine’s Day is Tomorrow – Don’t Get Skimmed!

February 13, 2019

Whether you are a retailer or a consumer, it’s important to know the facts about credit card skimmers.  As described by @NACSonlineskimming is the method by which [criminals] obtain customer card data from the magnetic strip to create a counterfeit card to use either online or in stores. With EMV compliance just 18 months away, “the window of opportunity for thieves to get this data is closing.”

Nacsonline article featuring contributors Paige Anderson and Linda Toth, it points out that retailers have many options to protect their business from skimming; however, the one action every retailer can take is changing out the universal locks on their fuel dispensers.

“Making sure those locks are unique is one basic security requirement…it doesn’t cost much and can be done easily,” said Anderson.

If you are reading this and don’t own a convenience store you may think this doesn’t apply to you.  True, skimming may not effect your business but if your use a credit card to purchase fuel, it could have a very negative effect on your bank account.  As consumers we all need to be aware of these criminals and know what to look for.  Seriously, we are all very busy and who has extra hours of time to fight credit card breaches? NOBODY!  Below we have included a link from @Nacs TV that is very informative and shows you exactly what to look for before handing your card over to a gas pump!

 

Don’t be this guy

This guy is having a bad day.

This guy got SKIMMED on

Valentine’s Day!

broken heart love sad

Photo by burak kostak on Pexels.com

 

Read entire NACSonline article here

#NoSkim

insightRS_blkblu

Advertisements

Visa Security Alert Threat Landscape: Pin Pad/POS Skimming

June 3, 2016

Incident Details

Visa Global Payment System Risk is aware of increasing incidents involving suspects placing skimming devices on point-of–sale (POS) terminals for the purpose of collecting payment card information, including PIN numbers. Perpetrators use this information to create counterfeit cards re-encoded with the stolen card information and make unauthorized ATM withdrawals. The primary targets for these recent skimming events are self-checkout terminals in supermarkets. However, any POS terminal may be at risk, including those that are often unattended, such as terminals near deli counters, coffee stands, etc. The perpetrators are mobile and will target multiple stores within a geographic area for a period of time before moving on to a new location. Most entities targeted are using payment devices that have not yet been upgraded to accept EMV cards.

Placement of Skimming Devices

Skimming devices can be placed at any time of the day but placement usually occurs during slower times of business when the perpetrators can go undetected by employees or other customers. The perpetrators will usually work in teams of two or more with one person being a lookout, one person placing the skimming device on the POS terminal and another creating a barrier so that no one can observe the skimming device being placed. Perpetrators have been known to use large items such as packs of paper towels to block the view of POS terminals. In some instances, it was reported that the suspects created a distraction in the store by faking a medical incident or causing commotion that distracted the attention of store personnel away from the POS terminals. The skimming devices will mimic the look of the front of the POS terminal.

Recommended Inspection & Response Actions

1. Prevention Through Device Inventory Management

  • In accordance with PCI DSS Requirement 9.9, ensure implementation of security controls to protect POS devices from tampering and substitution. Examples include:

Maintain a list of devices including the device serial number or other method of unique identification. 

Keep a list of device location either by store or physical location within the store itself (i.e., self-checkout, deli counter, manned checkout). 

Train personnel to be aware of suspicious behavior and to report tampering or substitution of devices.

 Verify the identity of any third-party persons claiming to be repair or maintenance personnel, prior to granting them access to modify or troubleshoot devices.  

2. Physical Inspection of POS Devices

  • Implement security procedures to inspect POS devices at least twice each day and at random times.
  • Physically examine the device. Skimming devices are typically attached with minimal adhesive allowing them to be place and removed with ease, so devices may be detected by giving the front of the POS/PED a good grab-and-pull. Weighing the devices may also identify tampering.
  • Please note some skimming devices are Bluetooth enabled and data can be captured without the device needing to be recovered.
  • When inspecting devices, use backup security personnel to monitor from a distance as suspects may watch compromised terminals and suspects are trained in counter surveillance to avoid detection/arrest.

3. Device Recovery Response

  • If a skimming device is discovered on a POS terminal, do not handle it, as evidence may be damaged.
  • Notify local law enforcement and the FBI or USSS office so they can recover the skimming device.
  • Protect any video surveillance that may be used to identify any perpetrators and confirm timing of when the device was placed on the POS terminal.
  • Initiate incident response procedures and notify your Acquirer so that Visa can assist with the investigation.

 

Information from VISA April 2016

For other questions, please contact Cyber Intelligence & Investigations via email at USFraudControl@visa.com

Additional Resources:

What To Do If Compromised

insightRS_blkblu

 


%d bloggers like this: