You can get smarter about finding credit card skimmers.
With one swipe of a credit card, you've just paid for some gas. You may also have given thieves some very valuable information. That's if you've just fallen victim to a skimmer.
Card skimmers, which steal your credit or debit card data when you swipe at payment and money machines, have been around for nearly a decade, disguised so you don't know you're being duped. The devices have evolved, though, and researchers say they're now at the point where you really, really can't tell the difference.
Plus, they've swept across the United States at an alarming rate. The number of breached ATMs increased sixfold from 2014 to 2015 and rose again in 2016 by 70 percent, according to FICO, an analytics software company. In June of 2017, the Federal Trade Commission put out a public warning, with tips on how you can avoid having your card information stolen.
We're going to tell you how how credit card skimmers work, how hackers steal your money and what you can do to protect yourself.
Hackers have figured out how to create virtual skimmers -- malware that's installed remotely -- which let them steal card information without even touching the ATM, fuel pump or other device.
It's an evolution from the physical skimmers, where thieves had to walk up to a machine to plant their hardware hack. In January 2016, one hacking campaign that used virtual skimmers across multiple ATMs netted thieves .5 million euros, security firm Trend Micro discovered.
Skimmers are getting harder and harder to notice, according to Mark Nunnikhoven, Trend Micro's vice president of cloud security. "If a machine has been compromised with software," he said, "there's no way you're able to tell."
As if you didn't already have enough to worry about when it comes to computer security.
2018 alone has brought a number of threats from all kinds of angles. In May of 2017, ransomware took over PCs around the world, holding them hostage for payment, and that likely won't be the last time. Then on the credit card front, there was that massive Equifax hack, which coughed up sensitive information on nearly half the US population.
When 100 credit card numbers can be sold online for a bundle, it's easy to see the appeal for cybercriminals. Credit card information is feeding an entire illicit ecosystem, with some thieves even opening online schools to teach the hackers of the future.
Hackers can create virtual skimmers by breaking into a bank's network -- for instance, by tricking an executive into providing access, as Nunnikhoven has seen. Instead of compromising physical ATMs one at a time, hackers can steal from multiple ATMs all at once. And there's less risk of getting caught.
A hacking group called Magecart has attacked online stores like NewEgg and Ticketmaster UK to do just that, by inserting skimmers on checkout pages so they can steal your credit card information while you're shopping online.
"ATMs are really just very simple computers that happen to be attached to a box full of cash," Nunnikhoven said. "We have enough problems securing computers that aren't attached to cash."
Banks are working to stay a step ahead of the thieves, with techniques like introducing chips on cards, which are more secure than the magnetic stripes.
Apple has even considered getting rid of credit card numbers all together. With the Apple Card, it creates a new security number every time you make a purchase, instead of a number you have to use every single time that can be stolen.
New rules are helping, too. As of October 2015, any stores still using old swipe terminals became liable when fraud occurs. That got businesses adopting the new tech pretty quickly. But take note: The rule doesn't apply to gas stations until 2020.
Which means thieves who used to target random ATMs in stores are now swarming to gas pumps instead.
There's an app now that can help you find hidden skimmers.
"We're seeing an uptick of skimmers becoming more common at fuel stations," said Angel Grant, director of fraud and risk intelligence at security firm RSA. "We anticipate this to continue to grow."
At gas stations, the skimmers can be installed on card readers in less than 30 seconds, and they'll record all your card data for collection by the bad guys. It's an easy gig: Those pumps are often unattended late at night, and thieves can plug in their skimmers while pretending to get gas.
The skimmer stores the data, and the scammers return to grab the stolen credit or debit card numbers over Bluetooth, without touching the pump again. Gas station owners aren't likely to rush to make changes. It's more expensive to upgrade pumps than ATMs.
On Reddit, it's a thing now to see posts of people finding card skimmers by fidgeting with the card reader on an ATM and sometimes snapping it right off. But there's an alternative: Skimmer Scanner, an app to save you from having to brutalize your local cash machine.
Because the majority of these skimmers use Bluetooth for harvesting the stolen data, your phone should be able to detect them easily. Nathan Seidle, the founder of SparkFun, created the Skimmer Scanner app to automatically detect the skimmer's Bluetooth signal, which is most noticeable at gas pumps.
The Boulder-based company worked with local police in Colorado to take a look at a popular skimmer in the region, a module called the HC-05. These modules are typically used for DIY educational projects to provide Bluetooth capabilities on homemade gadgets. But they're also extremely common for credit card skimmers and cost only each.
Apple's new credit card, Apple Card, is tied to your iPhone and uses Apple Pay to keep transactions secure.
"They're obviously mass-produced," Seidle said. "It's so cheap that they can just pepper these things all over the place."
Because these skimmers are a bargain, their Bluetooth names can't be changed -- it's always HC-05. They also have a hard-coded default password: "1234." In other words, their weak spot is the same one that can get you in trouble with lots of the gadgets in your home.
The Skimmer Scanner looks for connections with that name; then attempts to connect with the default password, the same way the thief who planted it would. The app then sends the letter "P" as a command to the Bluetooth device, and if it's a skimmer, it'll send back "M." The system has been able to detect skimmers at distances between 5 and 15 feet.
The Android app is available on the Google Play store for free, and in open-source format on Github.
Researchers said the app is a great step in fighting back, given how common the HC-05 Bluetooth module is, but it's not going to stop all skimmers. Eventually, too, once hackers realize how dumb those Bluetooth modules are, Nunnikhoven said, they'll move onto something that isn't as detectable.
"There's a limited lifetime on apps like Skimmer Scanner," he said. "The attackers are always changing their tactics to avoid getting caught." The app was first released in 2017, and skimmers have moved onto new technology since, but it's still useful for detecting this specific kind of scam.
Update: This story originally published Oct. 1, 2017 and was updated most recently April 4, 2019.B:
“【说】，【你】【是】【什】【么】【人】？” 【女】【子】【话】【音】【落】【下】，【一】【股】【沉】【重】【的】【压】【力】【从】【天】【而】【降】，【慕】【容】【萱】【当】【即】【面】【色】【一】【变】，【被】【逼】【得】【向】【后】【退】【去】。 【这】【年】【轻】【女】【子】，【竟】【然】【拥】【有】【着】【皇】【级】【实】【力】，【只】【是】【一】【丝】【气】【机】【释】【放】，【便】【能】【够】【让】【得】【她】【真】【元】【凝】【滞】，【宛】【如】【承】【受】【了】【三】【倍】【重】【压】，【这】【比】【起】【内】【门】【中】【的】【那】【些】【皇】【级】【高】【手】，【不】【知】【道】【更】【强】【悍】【何】【几】？ “【这】【就】【是】【玄】【门】【的】【天】【才】【高】【手】【吗】？”
【琴】【声】【绕】【梁】【三】【生】【绝】，【不】【识】【佳】【人】【今】【安】【在】。 【当】【莫】【小】【鱼】【和】【罗】【斯】【福】【跟】【随】【着】【罗】【山】【来】【到】【后】【山】【他】【们】【的】【临】【时】【住】【处】【的】【时】【候】，【悠】【悠】【扬】【扬】【的】【琴】【声】【从】【小】【楼】【里】【飘】【荡】【了】【出】【来】。 【罗】【斯】【福】【似】【乎】【是】【被】【琴】【声】【吸】【引】，【直】【接】【驻】【足】，【闭】【上】【眼】【睛】【细】【细】【听】【着】，【不】【一】【会】【儿】【表】【情】【竟】【变】【得】【有】【些】【迷】【醉】。 【等】【到】【琴】【声】【渐】【渐】【的】【平】【息】【了】【下】【来】，【罗】【斯】【福】【却】【是】【带】【着】【笑】【意】【回】【头】【看】【了】【看】【罗】【山】。
【百】【里】【戈】【壁】【摊】【上】，【顾】【白】【茫】【茫】【四】【顾】【一】【望】【无】【际】【荒】【漠】，【实】【在】【搞】【不】【懂】【老】【疯】【子】【所】【说】【的】【水】【源】【在】【哪】。 【这】【里】【已】【经】【临】【近】【于】【生】【命】【禁】【区】【的】【最】【深】【处】，【四】【周】【充】【斥】【的】【一】【股】【死】【气】【越】【发】【沉】【重】，【无】【形】【中】【形】【成】【一】【股】【莫】【名】【的】【压】【迫】【感】。 【越】【往】【里】【走】【顾】【白】【越】【发】【难】【受】，【四】【肢】【百】【骸】【都】【受】【到】【剧】【烈】【的】【侵】【食】，【天】【地】【间】【似】【乎】【存】【在】【着】【一】【股】【精】【神】【力】，【不】【断】【的】【压】【制】【着】【此】【方】【天】【地】。 【哪】【怕】18年93期东方心经彩图【本】【书】【现】【在】【【不】【定】【期】【更】【新】】，【不】【好】【意】【思】【呢】。
【洛】【九】【早】【就】【已】【经】【忘】【记】【自】【己】【以】【前】【叫】【什】【么】【名】【字】【了】，【也】【不】【愿】【意】【想】【起】。 【以】【前】【的】【她】，【早】【就】**【的】【时】【候】【就】【已】【经】【死】【了】。 【是】【洛】【水】【心】【给】【了】【她】【新】【的】【生】【命】，【从】【那】【个】【时】【候】【开】【始】，【她】【就】【已】【经】【发】【誓】，【今】【生】【今】【世】【只】【为】【洛】【姑】【娘】，【就】【算】【付】【出】【生】【命】【也】【在】【所】【不】【惜】。 【可】【是】【她】【没】【想】【到】，【生】【命】【中】【会】【出】【现】【一】【个】【殷】【仁】【青】。 【堂】【堂】【北】【殷】【六】【皇】【子】，【高】【高】【在】【上】，【她】【这】【残】【破】
【虽】【然】【云】【锦】【非】【常】【狗】【腿】【地】【跟】【在】**oss【后】【面】，【但】【是】，【她】【心】【里】【还】【是】【希】【望】，【不】【要】【单】【独】【和】【老】【板】【一】【起】【出】【去】【吃】【饭】。 【她】【也】【知】【道】，【老】【板】【在】【公】【司】【的】【魅】【力】【是】【非】【常】【大】【的】。 【而】【她】【作】【为】【一】【个】【单】【身】【未】【婚】【女】【青】【年】，【在】【公】【司】【里】【本】【来】【就】【饱】【受】【争】【议】。 【甚】【至】【有】【人】【开】【始】【给】【她】【介】【绍】【起】【对】【象】【了】。 【倘】【若】【知】【道】【她】【和】**oss【在】【一】【起】，【那】【公】【司】【里】【面】【那】【帮】【迷】【恋】**oss
【过】【了】【良】【久】，【门】【外】【又】【传】【来】【一】【声】【吆】【喝】【声】：“【天】【兵】【阁】【阁】【主】【携】【长】【老】【弟】【子】【到】！” 【随】【着】【声】【音】【的】【传】【来】，【众】【人】【的】【话】【语】【声】【也】【开】【始】【消】【散】，【看】【向】【大】【殿】【门】【口】【处】。 【大】【殿】【门】【口】【不】【远】【处】，【有】【三】【人】【信】【步】【走】【来】，【为】【首】【的】【是】【一】【名】【干】【瘦】【老】【者】，【一】【身】【黑】【袍】，【神】【色】【带】【着】【阴】【冷】【之】【意】。 【此】【人】【便】【是】【边】【城】【的】【除】【却】【四】【大】【家】【族】【外】【的】【顶】【尖】【势】【力】，【天】【兵】【阁】【阁】【主】，【雷】【安】，【其】【性】【格】