Skimming – what is it and how to protect yourself?
Skimming is a crime that involves copying data from the magnetic stripes of ATM cards in order to create duplicates. Find out how skimming works and what the legal consequences of this fraud are. In this article, we will also look at what precautions are worth taking to stay one step ahead of criminals and protect yourself from this threat.
What is skimming?
Skimming – what exactly is it? This is how we define the crime of copying the contents of the magnetic stripes of ATM cards . Why do bandits do this? To create duplicates of original bank cards. Later, the duplicate card works identically to the original one. All transactions made by criminals are, of course, borne by the real owner. Skimming in Polish (the verb to skim ) literally means sliding on a surface, which actually brings to mind swiping a card with a magnetic stripe through a card reader. Skimming, next to phishing and spoofing, is one of the most common scams used by cybercriminals, which aims to extort data, exposing users to serious financial losses.
In the case of PayPass skimming, criminals use advanced RFID devices that are able to capture contactless payment card data without contact. These devices can be hidden in various places, such as payment terminals, but also portable, e.g. in backpacks or bags of criminals who can pass by people with contactless cards, scanning data without their knowledge.
You must be aware that your card can be copied at virtually any point where there is a terminal and the possibility of paying by card . It is sometimes copied by the seller himself, who cooperates with criminals. All you need is a tiny device that contains a card reader and memory for recording the contents of magnetic stripes. Then they are connected to the computer and the contents of the strips are copied. Such a fake card is usually in the possession of bandits for a relatively short time and they do not always have the opportunity to learn the PIN code. However, to find out the card's PIN, criminals came up with the idea of installing special devices with cameras and overlays on (or inside) the ATM . In this way, both the card's magnetic stripe data is recorded and the PIN code entered by the card owner into the ATM is read using a camera.
What are the dangers of skimming?
Using someone else's payment card (e.g. if you found it on the street and started paying with it in stores) and skimming are financial crimes that involve serious legal consequences. Those responsible for skimming may face imprisonment . Pursuant to Article 284 of the Penal Code, it is imprisonment for up to 3 or 5 years, depending on the value of the property and the circumstances of the crime .
How to protect yourself against skimming?
ATM skimming is very dangerous, so before you insert your card into any ATM, first check whether the card reader does not look unusual or suspicious, whether there are any additional elements sticking out of it and whether the ATM keyboard is not even or slightly lower than the level housing. Also check your bank account balance on an ongoing basis. You can also use banking services such as SMS transaction notifications to stay informed about every activity on your account. A case or wallet with RFID blocking technology can also protect you against PayPass skimming . Also browse our category: RFID protection .
If you notice anything unusual in ATMs or terminals, report it to the police. If your card is lost or stolen, inform your bank immediately to block the card and minimize the risk of further losses. However, if money has already disappeared from your account, file a complaint and inform the bank about skimming - you will definitely receive some of your money back, and if skimming is proven, you will recover the entire lost amount.
There are also devices that can detect skimming . These check the number of magnetic stripe heads inside the card reader. You just need to insert and remove this type of tool before using your bank card. It takes a second to process the information and provides reading status using three different LEDs: OK, Warning and Dangerous . With this information, the user can decide whether to continue with the transaction or abandon it.
Also check out the popular Sapsan blog article: what is cybersecurity .