Cook Solutions Group

ATM Fraud Deterrents

Skimming | Hook & Chain | Products & Services

There has been a recent uptick in ATM attacks across the United States, particularly in multiple Western states. In many of these attacks, criminals have utilized never before seen ATM skimming devices.

We have reviewed recent case videos and it shows they are installed in seconds, then the attackers come back and have a way to quickly pull data off the skimmers by inserting something connecting to a small port, leaving the skimmer in place. Like any skimming attack, a multi layered approach to protection is always encouraged. Suspicious Activity Notification (SAN) can help both alert and prevent.

In addition to our deterrent and detection solutions, our technicians are trained to search for devices while servicing machines. Best practice is for branch staff to do regular inspections as well. Additional manufacturer products are available as well as visual observations. We can provide suggestions on what to look for on your machines to recognize slight changes that could be caused by criminal attacks.

Var.

The Cook Solutions Group National Coverage Value Added Reseller (VAR) and Certified Subcontractors network brings the innovative and transformational solutions of Cook Solutions Group to vendors and Financial Institutions across the country. Our Remote View ATM/ITM managed services technology is an easy add on solution for our National Coverage Value Added Reseller's to implement to their ATM, ITM, and video customers.  The core of the Remote View product lines is our Cook Command Center.  Cook Command Center is a secure centralized web interface enabling you to view your equipment anytime, anywhere, on ANY device. View current status and request service for your entire fleet through our dashboard. Maximize uptime, protection, and compliance.  CSG also provides a full line of Professional Services such as ITM server hosting and our own video management system, PIKO Video Surveillance.  

NEW DEEP INSERT SKIMMING ATM ATTACK:

The skimming technique is using a Deep Insert Skimmer in Tamper Resistant DIP Card Readers, but an additional attack step is performed that sabotages the internal workings of the Tamper Resistant DIP Card Reader. After this sabotage is performed, the skimmer can then operate inside the reader. Sabotaged readers show no signs of outward damage to the ATM user. Similarly, because the skimmer is placed inside the reader, these devices are almost impossible to spot by the typical ATM user.

‍PREVENTION:

Cook Solutions Group is the only solution provider in the world that has developed SAN (Suspicious Activity Notification) using AI and integrating video with ATM transactions to identify criminals. Suspicious Activity Notification is a CSG Next Generation application utilizing RemoteView to gather and analyze normal ATM transactions when a person is detected in front of the ATM.  If the person is in front of the ATM for a custom amount of time SAN will analyze the ATM transaction and with our IF This Then That methodology we can notify our internal NOC or our customers to review the incident.  We have had great success finding and removing Skimmers with our SAN solution.

Var.

The Cook Solutions Group National Coverage Value Added Reseller (VAR) and Certified Subcontractors network brings the innovative and transformational solutions of Cook Solutions Group to vendors and Financial Institutions across the country. Our Remote View ATM/ITM managed services technology is an easy add on solution for our National Coverage Value Added Reseller's to implement to their ATM, ITM, and video customers.  The core of the Remote View product lines is our Cook Command Center.  Cook Command Center is a secure centralized web interface enabling you to view your equipment anytime, anywhere, on ANY device. View current status and request service for your entire fleet through our dashboard. Maximize uptime, protection, and compliance.  CSG also provides a full line of Professional Services such as ITM server hosting and our own video management system, PIKO Video Surveillance.  

Other ATM attacks:

  1. Skimming: Criminals attach a device to the card reader of an ATM to capture card information. People often pair this with a hidden camera to record PINs.
  2. Cash Trapping: A device is inserted into the cash dispensing slot to trap cash. The criminal retrieves the trapped cash later.
  3. Jackpotting: Attackers gain access to the ATM's computer system, allowing them to dispense large amounts of cash rapidly.
  4. Hook N' Chain & Ram Raid: Criminals use a vehicle to forcefully steal money from an ATM by pulling it out with a chain or cable.
  5. Malware Attacks: Criminals infect the ATM's software with malware, allowing them to manipulate its operations and steal money.
  6. Card Trapping: A device is placed in the ATM to trap the user's card. This causes the user to leave. Afterwards, the criminal takes the trapped card.
  7. Cash Boxes Theft: Criminals break into the ATM to steal the cash inside the safe.
  8. Gas Explosions: Criminals pump explosive gas into the ATM and ignite it to access the cash.
  9. USB Traps: Criminals insert a USB device with malware into the ATM to compromise its security.
  10. Social Engineering: Criminals use deception to gain access to the ATM's software or get users to reveal their PINs.

Protecting ATMs from these attacks involves a combination of physical security measures, regular software updates, and vigilance in monitoring for unusual activity.

How do credit card skimmers work?

A credit card skimmer works by illegally capturing and storing the information on a credit card's magnetic stripe. Here's a breakdown of its operation:

  • Installation: Culprits discreetly attach the skimmer device over a legitimate card reader slot, like those found on ATMs, gas pumps, or other point-of-sale terminals. Certain sophisticated skimmers can also be fitted within the device, which makes them even more difficult to identify.
  • Data capture: When an unsuspecting cardholder swipes or inserts their card into the compromised slot, the skimmer reads and stores the card's magnetic strip data. This information comprises the card owner's name, card identification number, date of expiry, and the CVV (a sequence of service codes and ciphered details).
  • Retrieval: The thief later returns to retrieve the skimmer and download the captured card data. Some sophisticated skimmers can transmit the data wirelessly, removing the need for retrieval.
Our Solutions

Recommended ATM | ITM Threat Deterrents

SAN (Suspicious Activity Notification)

Our patent-pending Suspicious Activity Notification  provides a vendor agnostic solution with an added defense that gets to the root of today’s threats and any other suspicious activity. Protect against ATM | ITM jackpot-ting, skimming & cash-outs.

Read More

Smart Camera Analytics

Loitering, vandalism, and fraudulent activity are  detected with camera analytics and algorithms.  Real-time notifications with surveillance footage  can be sent to evaluate the threat and determine if the ATM should be taken out of service.

Read More

Object Detection using Machine Learning

Piko detects objects such as but not limited to people, animals, vehicles, etc. Users have the ability to limit the scope of search via a bound-ing box or using the entire frame for reference.

Read More

Fraud Detection Engine

Collect, Detect, and Remediate. Advanced analytics are used to determine if any suspicious transactions are taking place at the ATM. The ATM can be taken out of service automatically to prevent additional transactions.

Read More

Case Management

Manage, track and share your surveillance video, police reports, images and other docs pertaining to a case from a centralized web interface.

Read More

"Hook n Chain" Identification

Combining vehicle detection, line crossing, and other automated actions provides actionable insights and notifications when the attack happens.

Read More

ATM Barriers

ATM Barriers can actually block and protect the ATM from a physical attack.

Read More

Who We Work With

No items found.
No items found.

Contact us.

Like what you see at CSG? Enter your info and we'll follow up!

Skimming | Hook & Chain | Products & Services

There has been a recent uptick in ATM attacks across the United States, particularly in multiple Western states. In many of these attacks, criminals have utilized never before seen ATM skimming devices.

We have reviewed recent case videos and it shows they are installed in seconds, then the attackers come back and have a way to quickly pull data off the skimmers by inserting something connecting to a small port, leaving the skimmer in place. Like any skimming attack, a multi layered approach to protection is always encouraged. Suspicious Activity Notification (SAN) can help both alert and prevent.

In addition to our deterrent and detection solutions, our technicians are trained to search for devices while servicing machines. Best practice is for branch staff to do regular inspections as well. Additional manufacturer products are available as well as visual observations. We can provide suggestions on what to look for on your machines to recognize slight changes that could be caused by criminal attacks.