Key takeaways:
- ATM Skimming attacks are on the rise as compared to 2022.
- Deep insert skimming is the method of choice by fraudsters
- Hyosung Innovue offers protections against ATM Skimming and Shimming.
Hyosung Innovue is aware that ATM skimming attacks are on the rise in 2023.
While non-bank owned ATMs skimming attacks are relatively flat year-over-year, according to FICO, there has been a year-over-year increase in Card skimming of 109% at bank-owned ATMs in the first half of 2023. Furthermore, there is a shift in attack targets from non-Bank ATMs to Bank ATMs, from a traditional 80% non-bank ATM target attacks and 20% banked owned to 33% bank owned ATMs attacks in 2023.
Attacks are also increasing specific geographic areas with Texas, Florida and Colorado seeing 50% increases from 2022. California has experienced a slight decline in the number of ATM attacks but unfortunately continues to lead the other states in total number of attacks.
Deep insert skimming, a device designed to fit deep inside the mouth of the ATM card reader, continues to be the primary skimming attack method of choice. Once positioned deep inside the card reader, the device can lie in situ for days or weeks, secretly capturing data from the magnetic stripe of thousands of payment cards.
Hyosung advises its customers to be aware of possible signs of Deep Insert Skimming, frequently identified by damaged or weakened usability of the reader incurred during the insertion of the skimmer. In addition, skimmer attacks require the acquisition of the card pin, which is most commonly captured via hidden camera on the surrounding ATM fascia with false panels or mocked coverings. These cameras can be discovered during ATM security inspections.
Hyosung offers additional protections against ATM Skimming, Shimming and Deep Insert skimming including protections for both DIP and Motorized Readers.
For additional questions regarding protections that support your ATMs, please contact your Hyosung Sales Manager or Authorized Hyosung Reseller for further details.