Automated Teller Machines (ATMs) have revolutionized the way we access our finances, offering convenience and round-the-clock service.
However, this convenience comes with its own set of risks. ATM frauds are on the rise, with scammers devising new methods to exploit users.
Understanding these frauds is the first step towards safeguarding oneself. Here are seven common ATM frauds and tips on how to stay safe.
1. Skimming
Skimming is one of the most prevalent ATM frauds. Scammers install a discreet device on the ATM that can capture the data on your card’s magnetic strip. Coupled with a hidden camera to record your PIN, they can clone your card and make unauthorized transactions. To avoid skimming, inspect the ATM for any unusual devices attached to it, and always cover the keypad while entering your PIN.
2. Shimming
Shimming is a sophisticated form of ATM fraud where criminals use a thin, card-sized device called a shim to access data from the chip of a debit or credit card. Unlike skimming devices that are often more visible to the naked eye, shims are discreetly inserted into the card slot, making them nearly undetectable. They work by intercepting the data during a transaction, allowing fraudsters to clone the card’s chip and potentially steal funds. To protect against shimming, it’s crucial to be cautious and observant. Before inserting your card, inspect the ATM for any signs of tampering, such as loose or odd-looking parts around the card slot. Use ATMs in secure, well-monitored areas, and consider using contactless payment methods when available. Additionally, regularly monitoring bank statements for unauthorized transactions and setting up banking alerts can provide an extra layer of security against this type of fraud
3. Cloning
Card cloning is a deceptive practice where criminals replicate your ATM card’s data to create a counterfeit card. This fraudulent activity often targets individuals who are less familiar with such scams, including the elderly. The cloning process involves capturing the card’s information using a device covertly installed on an ATM or card reader. Once the data is obtained, it’s transferred onto a new card, which is then used to make unauthorized transactions or withdrawals. To safeguard against cloning, it’s crucial to keep your card within sight during transactions and be cautious of strangers offering assistance at ATMs.
4. Trapping
Trapping is a deceptive technique used by fraudsters to capture an ATM user’s card. They install a device inside the card slot that physically ensnares the card, preventing it from being returned after a transaction. Unsuspecting victims, finding their card stuck, are often approached by the scammer posing as a helpful bystander or even a bank official. The fraudster may offer to assist in retrieving the card, using this opportunity to observe the victim entering their PIN, which is then used to access the trapped card and steal funds. If your card becomes trapped, it’s crucial to contact your bank immediately and report the incident. Avoid using ATMs that appear tampered with or are located in poorly lit or secluded areas, as these are more likely to be targeted by criminals. Always be aware of your surroundings and if you notice anything suspicious, use a different machine.
5. Keyboard jamming
Keyboard Jamming is a devious form of ATM fraud where scammers intentionally disable key buttons on the ATM’s keypad, such as ‘Enter’, ‘Cancel’, or numeric keys. The aim is to disrupt the normal transaction process, causing confusion and leading the user to abandon the session, potentially leaving their card in the machine. The fraudster, who is usually nearby, can then step in to complete the transaction using the victim’s entered details, or retrieve the card for later misuse. To guard against this scam, always test the keypad before inserting your card to ensure all buttons are responsive. If you encounter any resistance or find that certain keys don’t work, cancel the transaction immediately, retrieve your card, and report the issue to the bank.
6. Phishing
Phishing is a fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in electronic communication. Typically carried out through email spoofing or instant messaging, it directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. In the context of ATM fraud, phishing can involve scammers sending messages that appear to be from your bank, requesting your ATM card details and PIN. They may use sophisticated techniques to make the request seem legitimate, such as using the bank’s logos and branding. To protect yourself from phishing, it’s crucial to verify the authenticity of any communication received. Do not click on links or download attachments from unknown or unsolicited emails or messages. Always contact your bank directly using official channels if you receive a request for personal information.
7. Card swapping
Card Swapping is a cunning form of ATM fraud where a scammer watches as you input your PIN and then uses a distraction technique to exchange your card with a fake one. This often occurs in the brief moment you might be engaged in conversation or distracted by something the scammer has staged. Once they have your card and PIN, they can access your account and withdraw funds. To prevent this, it’s essential to stay focused at the ATM and not allow any interruptions during your transaction. Be wary of strangers approaching or speaking to you, and if someone tries to alert you to a problem with the machine or offers help, it’s likely a ploy. Always keep your card within sight and hand, and after completing your transaction, ensure that the card you retrieve is indeed yours. If you suspect a card swap has occurred, notify your bank immediately to secure your account.