• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Pro ATM Hacker ‘Chao’ Gives Out ATM Hacking Tips

September 30, 2008

Views: 40,947

[ad]

It seems like ATM hacking is still the way to go for those into a bit of hardware hacking. One of the most notorious and well known ATM hackers was recently arrest in Turkey and a list of his tips discovered online where he also sold the ATM skimming equipment.

Well his tips can’t be THAT good if he got caught can they?

A bank-machine hacker who reportedly was arrested earlier this month in Turkey gave would-be fraudsters tips on how to install rogue card-reading devices, including advising them to target drive-through ATMs (automated teller machines) and avoid towns with fewer than 15,000 residents.

The hacker, who went by the handle “Chao,” reportedly was arrested earlier this month in Turkey. He was one of the most well-known ATM hackers in the world, according to Uri Rivner, head of new technologies for RSA Consumer Solutions.

Chao sold fake faceplates that fraudsters could attach to the card slots in ATMs. These “skimmer” devices can read the magnetic stripe of every customer’s ATM or credit card, and are often used in conjunction with a hidden camera that watches people enter their PINs (personal identification numbers), Rivner said. Alternatively, criminals can attach an extra keypad on top of the one in the machine and capture the PIN that way, he added.

It seems like the old methods are still prevailing but the kit used is probably lot smaller, neater and unobtrusive. They skim your card, record your pin on the number pad with a micro dot camera and usually beam it all to a wifi PC nearby which will pipe it back to the owner over the net with a 3G phone or similar.

Just be careful where you use the ATM machine and cover the numberpad with your other hand when you are typing to the PIN to be extra vigilant.

  • don’t install a skimmer in the morning, because people are more vigilant then;
  • determine where a person would have to stand to keep an eye on everything happening on that block;
  • avoid blocks where more than 250 people per day walk through, because of the danger of detection;
  • don’t install skimmers in towns with fewer than 15,000 people, because people in those towns know what their ATMs look like;
  • avoid areas with small shops open 24 hours a day, because there may be surveillance cameras and vigilant shopkeepers;
  • don’t set up in areas where a lot of illegal immigrants live;
  • places with a lot of tourist traffic are good;
  • look for affluent neighborhoods and drive-through ATMs;
  • ATMs near cash-only bars are a good bet for lots of customer activity.

The tips are really nothing ground-breaking, but interesting to read nevertheless. Most of them could be considered common sense, but some like not targeting really small towns are quite interesting.

I would have thought busy times would have been the best time to go in as long as there is no-one else queuing at the ATM machine.

Source: NetworkWorld

Related Posts:

  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Privacy Implications of Web 3.0 and Darknets
  • Dark Web Search Engines in 2025 - Enterprise…
  • SmbCrawler - SMB Share Discovery and Secret-Hunting
  • An Introduction To Web Application Security Systems
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hardware Hacking, Spammers & Scammers Tagged With: atm fraud, atm hacking, credit-card-fraud



Reader Interactions

Comments

  1. Navin says

    September 30, 2008 at 12:45 pm

    doesn’t this all come under tht little thing we all ignore called “common sense”??

    I mean, its more of observations than tips …what say??

  2. Yami King says

    September 30, 2008 at 7:06 pm

    @ Navin
    I totally agree.

    Except for the one (point 3) that says Avoid blocks where more than 250 people per day walk through, because of the danger of detection.
    Why? Because this just really depends on the time of the day you are at the ATM; when there is no one around and you followed the basic guidelines stated above, there’s basicly nothing to worry about.
    And it’s kind of in contradiction with point 7: Places with a lot of tourist traffic are good. Since these so-called places all contain blocks that are usually visited over 250 times a day (point 3) depending on the popularity of the region.

  3. SpikyHead says

    October 1, 2008 at 12:38 am

    This had to happen (that he got caught), ATM hacking is something which is comparatively easy to figure out especially when more than one customer complains about fraudulent activity in their bank accounts and then finding the fraudsters is even easier unless he has stopped these activities.

    now couple more ‘Blackhat’ tips to add (for humour purposes only):
    -Do not attempt this more than 5 times in one city
    -Change the city every day. This may make it harder for police ;)

    Yami, you seem to be analyzing his tips very carefully.. what ar eyour plans budd?

  4. goblert says

    October 1, 2008 at 1:04 pm

    Interesting read.
    This was happening in my
    country for a while, there was a big thing on the news about it.

  5. Pantagruel says

    October 1, 2008 at 1:13 pm

    Nice read, but nothing ground bracking

  6. terrery says

    October 2, 2008 at 9:07 am

    ”He was one of the most well-known ATM hackers in the world, according to Uri Rivner, head of new technologies for RSA Consumer Solutions”

    maybe a hint for him, after you skim the card you are about to withdraw cash from it.
    it will have a maximum amount of withdrawel, how can we get max profit of this scam? well search for a ATM that has standard passwords provided by the manufacturer, (you can find manuals from that specific ATM manufacture on the internet) use them, hack in the ATM and let the ATM think that a bill of 50 is 5.

    ”a max withdraw of 500”, 500:5= 100 times 50= ”5000”

    5 times in each city = 25000 lets say you can accomplish this is some days.

    well keep this on for a few weeks and fly to the bahama’s or something :)

  7. Goodpeople says

    October 2, 2008 at 9:24 am

    Am I glad that I live in a small town.. :-)

  8. navin says

    October 15, 2008 at 10:50 am

    @ terrery
    Can wht U’re saying be done for a single transaction?? i mean u ever heard of something like this done?? Even as a PoC?? links please…anyone

  9. Joe says

    October 16, 2008 at 9:24 pm

    Avoid ATM’s with video cameras… Although maybe sunglasses and a hood at night time would foil them. Banks and the Secret Service use all that info when they look for their guy.

    Some guys with very complicated heist manuvers have been caught even still.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,236

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,088

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,369

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,257

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,213

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,101

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,432,844)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,100)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,557)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,354)
  • Password List Download Best Word List – Most Common Passwords (934,670)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,393)
  • Hack Tools/Exploits (674,313)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,432)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy