TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Nordstrom Finds Cash Register Skimmers

101 点作者 artas_bartas超过 11 年前

13 条评论

300bps超过 11 年前
There is very little true security in retail establishments.<p>This lady simply swapped bar codes on expensive items for bar codes of inexpensive items. Got away with it for over a year and made as much as $30,000 per month in some months:<p><a href="http://miami.cbslocal.com/latest-videos/?autoStart=true&amp;topVideoCatNo=default&amp;clipId=7535659" rel="nofollow">http:&#x2F;&#x2F;miami.cbslocal.com&#x2F;latest-videos&#x2F;?autoStart=true&amp;topV...</a>
评论 #6540080 未加载
评论 #6539366 未加载
ChuckMcM超过 11 年前
This is another interesting case because it points out how vulnerable this part of the financial transaction chain is. Of course even after they catch the guys who were installing the skimmers they don&#x27;t get the &#x27;top&#x27; guys who make the fake cards and then withdraw funds in Serbia.<p>I did see a talk where the folks noted (but did not remove) such devices and then began tracking every account that went through the modified device. This was to figure out who the bad guys were. By watching the fraudulent transactions that happened later they were able to roll up a carding group in the Baltics. But it does take a more proactive approach.<p>From a future products prospective the use of cards with embedded processors seems better and better.
dguido超过 11 年前
Compelling argument to switch to iPad cash registers? har har<p>Btw, if anyone wants to buy one, you can here: <a href="http://www.keelog.com/wifi_hardware_keylogger.html" rel="nofollow">http:&#x2F;&#x2F;www.keelog.com&#x2F;wifi_hardware_keylogger.html</a>
评论 #6542023 未加载
评论 #6540293 未加载
joenathan超过 11 年前
These are keyloggers and not skimmers, a skimmer looks something like this <a href="http://scams.wikispaces.com/file/view/camera02.jpg/30681221/camera02.jpg" rel="nofollow">http:&#x2F;&#x2F;scams.wikispaces.com&#x2F;file&#x2F;view&#x2F;camera02.jpg&#x2F;30681221&#x2F;...</a>
评论 #6539458 未加载
评论 #6542275 未加载
cardamomo超过 11 年前
It occurred to me once upon a time that I could use just such a keylogger to capture my classmates&#x27; student ID card swipes when they went to release print jobs at any of the print stations on my university campus. I recognized this as a security flaw that (probably) didn&#x27;t have many lucrative uses, but I never imagined such a technique might work for credit cards. I wrongly assumed that credit card readers would employ greater physical security.
评论 #6539227 未加载
zhamilton89超过 11 年前
I think a large factor in the lack of change in payment security (In the US anyway, I can&#x27;t speak for anywhere else) is the rise of the &quot;protected&quot; card. I have no incentive to protect anything about my Amex.<p>Card got skimmed a few years ago somehow, Amex called, asked if I was in Nicaragua (I wasn&#x27;t) they apologized, removed the $200 or so in charges and next-day aired me a new card. Almost zero hassle.<p>I&#x27;d hate to have my debit card skimmed but as far as a credit card... I&#x27;m not too worried. The risk isn&#x27;t mine.
评论 #6540204 未加载
ohazi超过 11 年前
chip and fucking pin. <i>sigh</i> This problem is solved, yet practically nobody in the US is demanding the established solution. Until we do, this is only going to continue.
评论 #6539476 未加载
评论 #6539294 未加载
评论 #6539647 未加载
评论 #6539394 未加载
评论 #6539298 未加载
callmeed超过 11 年前
My debit card got skimmed at a gas station this past week. It was used that same day to make purchases in LA (about 3 hours south of me).<p>Now that this is happening in other types of retail stores, maybe it will spur the use of more secure options (chip and pin?).
评论 #6539671 未加载
eksith超过 11 年前
I once worked for a retailer which was connected via Megapath (they outsourced to whatever local ISP is available at the store location). The internet setup was so abysmal in security, in some cases the stores used wifi to connect to the front registers with the password being (not kidding) [storename:storenumber]. That&#x27;s it.<p>These fools are getting caught doing elaborate plants. That&#x27;s not how real criminals key log (btw, this is not a skimmer, but is a &#x27;keylogger&#x27; as joenathan points out). Real criminals sit in the comfort of their car or nearby coffee shop and scan for open connections and insecure use of credentials.
dietrichepp超过 11 年前
And the question is... why not just use secure card swipe devices? You load an encryption key onto the hardware, and then key loggers don&#x27;t work any more. Sure, it won&#x27;t solve all your problems, but nothing does.
评论 #6539687 未加载
Theodores超过 11 年前
The Cherry PS&#x2F;2 keyboard with built in card reader is designed for retail and used in places where there is no C+P:<p><a href="http://www.cherrycorp.com/english/keyboards/pos/8000/" rel="nofollow">http:&#x2F;&#x2F;www.cherrycorp.com&#x2F;english&#x2F;keyboards&#x2F;pos&#x2F;8000&#x2F;</a><p>This explains the &#x27;attack vector&#x27;. Presumably the scammers have USB dongles too.
评论 #6540748 未加载
peterwwillis超过 11 年前
The main reason I find this interesting is the hacker scene in South Florida is so small. I bet if they caught one of these guys, they could track it down to the mastermind faster than somewhere like NY or SF.
Sami_Lehtinen超过 11 年前
From technical standpoint very lame attack. There&#x27;s no hacking involved at all. There has been technically much more sophisticated attacks modifying terminal hardware &amp; firmware , off loading data completely out of band using 3g networks, etc. That&#x27;s something that could be called hacking and proper (malhardware) engineering.