Man used MP3 player to hack ATMs

Haven't seen it posted here before.

formatting link
"Parsons plugged his MP3 player into the back of free standing cash machines and was able to use it to read data about customers' cards. That data could then be used to 'clone' cards and use them for bogus purchases."

Reply to
Richard Oliver
Loading thread data ...

The astonishing thing AIUI is that the data was not encrypted at all when it was sent from the cash machine down the telephone line.It was just a series of DTMF tones which could easily be converted back to the numbers representing card nos, pins etc.

Reply to
Tumbleweed

So anyone could pick it up at any convenient point in the bt system, such as a joint box or culvert in the pavement? If so then there must be gangs all over the country getting ex BT vans and jackets at this very moment.

Reply to
mrcheerful

Reading the report I have assumed the same - that the guy connected the MP3 into the "handset" socket at the back of the ATM, recorded a whole series of transactions, played them back (getting account numbers and PIN's etc.).

Presumably account balance data when requested etc. I would never have believed such a system would even have been implemented.

Reply to
Richard Oliver

much easier to grab it at the point of origination, but essentially yes. There was a watchdog I think about 'phantom' premium rate phone calls made from peoples phones where it seemed almost certain they were made from junction boxes.

Reply to
Tumbleweed

There was a report in one of the papers which stated that he had a program that turned the tones back into numbers, and that was it. Not even any need for some basic unencryption. IMHO the people who set this system up should be prosecuted for negligence.

Reply to
Tumbleweed

At 01:47:37 on 19/11/2006, Tumbleweed delighted uk.finance by announcing:

Transactions have been sent unencrypted over the public telephone network for years. It's the encrypted Message Authentication Code that prevents any 'playback' fraud. Similarly, ATMs may send the card details unencrypted but the PIN will be encrypted. You'll note that the story states that the data "could then be used to 'clone' cards and use them for bogus purchases," not that he could use them to withdraw cash at ATMs.

Reply to
Alex

"Alex" wrote

Is that meant to make it OK? 'Playback' fraud might be stopped, but never mind about the gaping hole in 'cloning' fraud?!!

"Alex" wrote

Reply to
Tim

At 12:11:14 on 21/11/2006, Tim delighted uk.finance by announcing:

What gaping hole? It's exactly the same hole that you have with conventional skimming - the hole that's plugged by EMV.

Reply to
Alex

well said

Reply to
bored

he means the hole that could have been easily prevented by our banks that make multi-billion profits and who harass anyone who claims they didnt make specific ATM withdrawls

thats what hole !

you plonker !

just have the balls to admit they should have covered this gap

Reply to
bored

At 11:06:24 on 23/11/2006, bored delighted uk.finance by announcing:

You haven't explained what the hole is. And I'd remind you that the fraud in this case wasn't against ATMs but in regular purchases.

Reply to
Alex

What about the 'security code' that is printed on the signaure strip on the back of the card. i thought that was not encoded anywhere on the magnetic strip. Robert

Reply to
Robert

At 16:47:55 on 23/11/2006, Robert delighted uk.finance by announcing:

That's correct. However, it's only used in card not present transactions.

Reply to
Alex

BeanSmart website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.