The new technique, which is specific to NCR Personas ATMs, leaves no visible trace of tampering on the exterior of the ATM.
June 26, 2015
NCR Corp. announced this week in asecurity alertthat it is investigating a new method being used by criminals to stage card reader eavesdropping attacks. The technique has been confirmed in the United Arab Emirates, the alert said.
In this variation of the attack, thieves gain access to the card reader of a free-standing NCR Personas ATM by "breeching the security" of the top box (specifically, by picking the lock, the Softpedia website said).
An electronic data tapping and storage device similar to those seen in other eavesdropping attacks is then attached directly to the card reader.
Unlike eavesdropping attacks carried out by drilling a hole in the ATM fascia (which is then disguised with a sticker or other cover) this version leaves no visible trace of the breach on the exterior of the ATM, the alert said.