Get a Pentest and security assessment of your IT network.

Cyber Security

Wireless Card Skimmers: Real Threat?

TL;DR

Wireless card skimmers are a real threat, though not as widespread as some reports suggest. They’re sneaky devices that steal credit card details remotely. This guide explains how they work, how to spot them, and what you can do to protect yourself.

What are Wireless Card Skimmers?

Traditional card skimmers need physical access to a card reader – think dodgy ATMs or point-of-sale terminals. Wireless skimmers are different. They’re small devices hidden near payment points that intercept the wireless signal between your card and the terminal. They then transmit this data to the criminals.

How Do They Work?

  1. Signal Interception: The skimmer acts like a mini-router, creating its own Wi-Fi network that mimics legitimate ones (often with names similar to shops or cafes).
  2. Data Capture: When your card communicates wirelessly with the payment terminal (using technologies like NFC or Bluetooth), the skimmer intercepts this data.
  3. Remote Transmission: The stolen card details are then sent via Wi-Fi, often to a nearby laptop controlled by the criminal.

How to Spot Wireless Card Skimmers

It’s tricky! They’re designed to be hidden. Here’s what to look for:

  • Suspicious Wi-Fi Networks: Be wary of open Wi-Fi networks with generic names like “Free WiFi” or ones closely resembling a shop’s name but slightly off (e.g., “Starbucks_WiFi” instead of “Starbucks WiFi”).
  • Unusual Devices: Look for small, unfamiliar devices plugged into walls near payment terminals. They might look like power adapters or USB chargers, but with extra antennas or ports.
  • Slow Payment Processing: If a contactless payment takes unusually long, it could indicate interference from a skimmer.
  • Check Your Bank Statements Regularly: This is the most important step! Look for any unauthorised transactions immediately.

Protecting Yourself – Step-by-Step

  1. Use Chip and PIN/Contactless with Caution: While generally secure, be aware of your surroundings when using these methods.
  2. Pay with Physical Cash: The most secure option if you’re concerned about skimming.
  3. Mobile Payments (Apple Pay, Google Pay): These are often more secure as they use tokenisation and biometric authentication.
  4. Check for Tampering: Before using an ATM or payment terminal, visually inspect it for anything that looks out of place. Wiggle the card reader – a loose component could indicate tampering.
  5. Use a Credit Card (Not Debit): Credit cards generally offer better fraud protection than debit cards.
  6. Monitor Your Bank Account: Regularly check your online banking for any suspicious activity. Set up transaction alerts if possible.
  7. Bluetooth Scanning (Advanced): You can use tools on your smartphone to scan for nearby Bluetooth devices. Look for unfamiliar or oddly named devices near payment points.
    nmap --scan-type bt 

    (Requires a phone with Bluetooth scanning capabilities and the nmap app installed.)

  8. Wi-Fi Scanning (Advanced): Use a Wi-Fi analyser app on your smartphone to identify nearby networks. Look for rogue access points.
    iwlist wlan0 scan

    (Linux example; command varies depending on your phone’s operating system.)

Reporting Suspicious Activity

If you suspect a skimmer, immediately:

  • Notify the Merchant: Inform the shop or bank where you saw the suspicious device.
  • Contact Your Bank: Report any fraudulent transactions and request a new card.
  • Report to Action Fraud: The UK’s national reporting centre for fraud: https://www.actionfraud.police.uk
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation