Researchers showed how easy it is to hack next-generation ATMs and steal chip and pin data Credit: TaxCredits.net We’ve been told that EMV (Europay, MasterCard and Visa) chip-equipped cards have an added layer of security, making them more secure and harder to clone than cards with only a magnetic stripe. But Rapid7 security research manager Tod Beardsley said, “The state of chip and pin security is that it’s a little oversold.”Black Hat USA attendees who watched an ATM spit out hundreds of dollars might tend to agree. The demonstration was part of Hacking Next-Gen ATMs: From Capture to Washout, which was presented by Rapid7’s Weston Hecker. The abstract of his talk said the system he devised could “cash out around $20,000/$50,000 in 15 minutes.”Rapid7 used a “shimmer” to pull off a man-in-the-middle attack against an ATM. When Brian Krebs previously reported on a “shimmer” type of skimmer, he explained that the shimmer “acts a shim that sits between the chip on the card and the chip reader in the ATM—recording the data on the chip as it is read by the ATM.”Beardsley told The Register that the equipment used to pull this off is tiny, can be installed quickly and does not require access to the internal hardware. “The modifications on the ATM are on the outside,” he added to the BBC. “I don’t have to open it up. It’s really just a card that is capable of impersonating a chip. It’s not cloning.”The shimmer reads the data on the chip, records the PIN that was entered and transmits that data to thugs. The criminals use a smartphone to download the data stolen from the card “and then essentially recreate that same card in any ATM.” If a criminal gets hold of data off a card with a magnetic stripe, it is used until the card is canceled. Chip and pin cards, however, can be spoofed for only a short time. Beardsley said maybe only a few minutes, but he “suggested criminals could have a vast network of modified POS points with a steady rate of unsuspecting victims providing constantly ‘active’ cards.”“You could shim 20 or 30 POS systems and have a constant stream,” Beardsley said. “You’ll have plenty of time to spit money out of ATMs.”Although Rapid7 contacted ATM vendors and banks about the research, the team would not name names or share specifics about the attack. The team said it had not yet seen any attempt to rectify the problem.Don’t enter your PIN more than onceAlso at Black Hat, during Breaking Payment Points of Interaction, researchers said to avoid re-entering your PIN number if it isn’t taken the first time when you’re paying via a point-of-sale device. People usually think they entered their PIN wrong when it asks a second time, but NCR Corporation researchers Nir Valtman and Patrick Watson said you “should never re-enter” your PIN, as “it’s a telltale giveaway that a pin pad may have been compromised.” Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe