IDG News Service - Criminals running an ATM card-skimming scam made a big mistake this week: They tried to hit the Defcon hacker conference in Las Vegas.
As the conference was kicking off a few days ago, attendees noticed that an ATM placed in the Riviera Hotel, which plays host to the annual event, didn't quite look right, according to a senior conference organizer who identified himself only as Priest. "They looked at the screen where there would normally be a camera," he said. "It was a little bit too dark, so someone shined a flashlight in there and there was a PC."
The ATM looked like a working system, but when people would put their cards in the machine, it would scan their card information and record the PINs they entered. He didn't know how long the ATM had been at the Riviera.
Conference organizers notified local law enforcement who hauled away the machine on "Thursday or Friday," said Priest, who said he works as a "civil servant" in his day job.
Credit card skimmers -- small devices installed on top of card readers to steal information -- and fake ATMs are a common problem. Once the criminal records the card information and PIN, he can use that to create a fake ATM card and then empty the victim's account.
Previously unsophisticated criminal gangs are increasingly using these devices, Priest said. "They're realizing that this is a great way to make money without getting caught."
The criminals probably didn't realize that they were installing their ATM in a hotel that was soon going to be flooded with more than 8,000 security professionals, he added.
They were smart enough to place the machine in one of the few spots in the hotel where there was no security camera to catch them, Priest said. "It was literally right next to the hotel security entrance."
- The Critical Incident Response Maturity Journey As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key.
- Advanced Attacks Demand New Defenses Cyber-criminals wielding APTs have plenty of innovative techniques to evade network and endpoint defenses. It's scary stuff, and ignorance is definitely not bliss....
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!