Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Windows to Power ATM's in 2005



True.  From brute force to some very sophisticated (readers attached to the
front of real ATMs), to not so sophisticated (cameras mounted to record PIN
#) ways to get ATM card info.  But, the "Hollywood Hackers" have all those
beat.  From adjusting the balance in ones account (how much do you need for
that island you want to buy).  To inserting cards attached to a handhelds
(remember in T2 for you Atari fans).   But no one in the real world has come
close to the "Hollywood Hackers".  The delivery shutes are designed to limit
the thickness of the stack of bills.  Banks also limit the dollar amount of
transactions in a 24 hour time period.  Digital combinations on safes with a
one time use.  Remember there are only two companies in the US that produce
ATMs.


----- Original Message ----- 
From: "Jerry Feldman" <gaf at blu.org>
To: <discuss at blu.org>
Sent: Monday, September 22, 2003 4:24 PM
Subject: Re: Windows to Power ATM's in 2005


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 22 Sep 2003 16:08:36 -0400
> Seth Gordon <sethg at ropine.com> wrote:
>
> > On Mon, 2003-09-22 at 14:28, Timothy M. Lyons wrote:
> > >
> > > As to hacking ATM's being a moot point, all I can say is with
> > > patience, dedication, motivation, and resources, _any_ network or
> > > device can be hacked. It's just a matter of finding the chink in the
> > > armor.
> >
> > A few creative thieves have put up kiosks in shopping malls that look
> > like ATMs; the machines read off the mag-strips of whatever cards are
> > swiped through, take the PINs, and then tell the customer "service
> > temporarily unavailable" or whatever.  The thieves used this
> > information to duplicate the cards and use them to withdraw money from
> > real ATMs.
> >
> > Some ATMs have also been broken into with brute force -- by using a
> > truck and a trailer hitch to pry off the front of the machine and then
> > take the cash inside.
> >
> > With high-quality color scanners and ink-jet printers, forging
> > cashiers' checks is a booming and lucrative business.
> >
> > Compared with all these techniques, what kind of
> > return-on-criminal-investment can you get by attempting to hack an
> > ATM?
> >
> And related to this some very sophisticated thieves use real ATMs and
> attach their hardware. Unsuspecting people swipe their cards and enter
> their pin numbers not knowing that the thieves are recording it.
>
>
> - -- 
> Jerry Feldman <gaf at blu.org>
> Boston Linux and Unix user group
> http://www.blu.org PGP key id:C5061EA9
> PGP Key fingerprint:053C 73EC 3AC1 5C44 3E14 9245 FB00 3ED5 C506 1EA9
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux)
>
> iD8DBQE/b1qX+wA+1cUGHqkRAm7SAJ9AVNRrfQHOaDmMcqynL6iCTF4cjwCfeCfs
> 8lgZvz3sGGy6TNt82T3mryk=
> =fCgR
> -----END PGP SIGNATURE-----
> _______________________________________________
> Discuss mailing list
> Discuss at blu.org
> http://www.blu.org/mailman/listinfo/discuss
>





BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org