Skimming devices (external & visible)
|
|
|
|
|
Skimming devices (inserted into card reader, invisible from front)
|
|
|
|
|
Skimming devices (inlay skimming devices in card entry throat, mostly invisible from front)
|
|
|
|
|
PIN observation (camera)
|
|
|
|
|
PIN observation (fake keyboard)
|
|
|
|
|
PIN observation (shoulder surfing)
|
|
|
|
|
Door access skimming devices (e.g. lobby door)
|
|
|
|
|
Eavesdropping (attaching to card reader electronics or read heads)
|
|
|
|
|
ATM malware (for card data)
|
|
|
|
|
Network packet sniffing (at ATM location)
|
|
|
|
|
Network compromise (remote from ATM)
|
|
|
|
|
Shimming (between chip card & reader contacts)
|
|
|
|
|
Card trapping (e.g. Lebanese loops)
|
|
|
|
|
Cash trapping internal (e.g. cash claws)
|
|
|
|
|
Cash trapping external (in front of cash slot)
|
|
|
|
|
Transaction reversal fraud (e.g. dispenser manipulation)
|
|
|
|
|
Jackpotting dispenser using ATM malware
|
|
|
|
|
Jackpotting dispenser using black boxes
|
|
|
|
|
Network compromise (other than for card data)
|
|
|
|
|
Deposit of fake cheques (fake checks)
|
|
|
|
|
Deposit of counterfeit cash
|
|
|
|
|
Deposit of stained, degraded stolen bank notes
|
|
|
|
|
Trapping and theft of deposits
|
|
|
|
|
Sophisticated compromise of deposit machines
|
|
|
|
|