1. How about ATM artwork?
Based on the most extensive experience, ATMs can work by accepting customers ’coin requests, verifying that users have the right to gain access to a particular economic institution ’s account, and ensuring that the account has enough coins to satisfy the request and meet the cash requirement-all of which are No help from a financial institution clerk or cashier is required.
From the beginning, to all methods, to the main ATM machine put into use in London in 1967, the identity of the customer became the main troublesome bank to be solved. In order to meet the needs of today’s plastic cards with magnetic stripe and embedded microchips, the first device put paper with a light radioactive substance (carbon 14) on paper in a selected form. The device matches the samples with various codes entered with the assistance of the customer. If it matches, and if a budget is necessary, the system allocates a total of £ 10 (the value of these days does exceed $ 200).
While using the current ATM, customers insert a plastic card into the device’s reader, which can record statistical information encoded on the card’s magnetic stripe or its embedded chip. It opens the password of the buyer’s personal identification variety (commonly called PIN), which is usually extended by 4 or 6 digits.
If you use cardboard and PIN sets, customers can deposit cash, check account stability, or usually require up to cash withdrawals. Even if the consumer specifies a sum of money, the tool uses an Internet connection or a mobile phone line to link with the consumer ’s economic institution to verify that the budget is sufficient and pay the cash.
2. What are the protection issues for ATMs?
Because ATMs contain large amounts of cash, they are targeted by criminals. Although the robbers are also with ATM users, it is not surprising that they are likely to carry coins with them, but the greatest degree of theft is still related to the entire body stealing the ATM.
The end result is that today, most ATMs are equipped with cameras to provide supporting documents in the event of robbery or other crimes, or to someone who may show tampering with the device.
More modern thefts require secret tracking tools and their customers. Thieves can deploy small cameras in unique locations on the ATM, and every other time, they will be hidden by plastic panels that look like daily additives for the system. With these cards, they can grab the number of cards, the expiration date of the card, the phone on the cardboard, and even find the 3-digit card verification fee (CVV) on the lower back. These records are sufficient to use cardboard to make the appearance of unauthorized online purchases effective. Fraudsters can also promote online black market statistics.
By installing an artificial card slot or even more accessories (called a “scraper”) on top of the main card slot, an attacker can view the information on the card’s magnetic stripe. This may help them to make imitation copy playing cards that can be used in other ATMs.
The hidden camera also allows the thief to watch the customer enter their PIN. Today ’s survey found that since it was actually pressed manually, the thermal digital camera can also capture the PIN by figuring out which range keys are barely heated. In particular, the researchers found that even if the warm traces on important pads were captured within 30 seconds of identity verification, the PIN detection accuracy could be as high as 78%. A comparable research institution is well known that it is possible to find all four digits of a PIN from a distance of 35 centimeters, and it is possible if a hot digital digital camera is located in a perspective view of 30 to 45 stages. However, choosing the correct number sequence becomes more and more difficult.
3. Can ATM be hacked?
Tech-savvy criminals can use multiple alternative methods to invade ATMs. The shell of the ATM usually hides a hidden USB port for saving and replacing software applications. If the attacker can find the hidden port, he can insert a portable USB device with errors and control the tool. In essence, this allows an attacker to distribute cash without using a card.
A few years later, a new attack has become famous. The robbery was called a “black box” attack by the police. The robbery included cutting a hole in the ATM case and establishing a physical disconnection cable between the computer and the actual cash distribution organization. Inserting another laptop into the coin dispenser’s controls, an attacker may order it to start a lot of cash.
ATM’s telecommunications connection provides other attack methods. By intercepting the communication between the tool and the bank, an attacker can accumulate useful card and account information. This can also provide a way to install malware programs remotely and control the system itself: for example, to solve the problem of instructions for distributing coins.
4. What protection functions have been deployed or may be deployed?
ATM-related fraud and robbery cannot be completely avoided. The bank is working hard to add additional security features and to use the three-digit CVV gambling card again. People can also take precautions to protect themselves when using ATMs:
In case your bank encounters problems, please use a chip-supported card. They improve security by verifying that the physical certificate is the correct way (now not a counterfeit).
Compared with using an ATM on the street immediately, using an ATM is usually easier. Before or after the transaction, it is easier to access the indoor ATM by using criminals.
Test the ATM to see if its appearance has been artificially altered or damaged, whether something has been built into the built-in card reader (to read the magnetic stripe) or whether there is a small camera on the keyboard. If some components look suspicious, avoid using it.
Pay attention to your environment and the people in the ATM area. You can find someone in your lower back to catch a glimpse of the PIN you entered on the keyboard.
When entering the PIN, cover the important object pad so that it cannot be seen by observers or detective digital cameras.
If you enter the appropriate PIN, but the transaction fails, please contact the financial department that issued the cardboard immediately to warn them that there may be a problem with the machine or your account.
5. How can the new era make ATM more comfortable?
Due to the constant finger competition between ATM security experts and criminals, customers will find themselves recommending the use of more and more advanced security strategies to realize their identity on ATM. One method is -factor authentication, which provides a higher layer of security so that someone must pass earlier than permission to allow access to an account.
-Component authentication is often used when logging in to online products such as social media and e-mail systems. Usually, the greatest worry is that the PIN entered now is not good, but the digital code received on the customer’s mobile phone by SMS and legal means is fast. frame.
This technology has not been easily considered because it incorrectly simulates mobile phone numbers so cleanly. This technology has been replaced by phasing out mobile phone applications that generate new codes or physical keys every few seconds. Without this one-time code, the attacker will not be able to enter the victim ’s bank account correctly.