• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Pro ATM Hacker ‘Chao’ Gives Out ATM Hacking Tips

September 30, 2008

Views: 40,895

[ad]

It seems like ATM hacking is still the way to go for those into a bit of hardware hacking. One of the most notorious and well known ATM hackers was recently arrest in Turkey and a list of his tips discovered online where he also sold the ATM skimming equipment.

Well his tips can’t be THAT good if he got caught can they?

A bank-machine hacker who reportedly was arrested earlier this month in Turkey gave would-be fraudsters tips on how to install rogue card-reading devices, including advising them to target drive-through ATMs (automated teller machines) and avoid towns with fewer than 15,000 residents.

The hacker, who went by the handle “Chao,” reportedly was arrested earlier this month in Turkey. He was one of the most well-known ATM hackers in the world, according to Uri Rivner, head of new technologies for RSA Consumer Solutions.

Chao sold fake faceplates that fraudsters could attach to the card slots in ATMs. These “skimmer” devices can read the magnetic stripe of every customer’s ATM or credit card, and are often used in conjunction with a hidden camera that watches people enter their PINs (personal identification numbers), Rivner said. Alternatively, criminals can attach an extra keypad on top of the one in the machine and capture the PIN that way, he added.

It seems like the old methods are still prevailing but the kit used is probably lot smaller, neater and unobtrusive. They skim your card, record your pin on the number pad with a micro dot camera and usually beam it all to a wifi PC nearby which will pipe it back to the owner over the net with a 3G phone or similar.

Just be careful where you use the ATM machine and cover the numberpad with your other hand when you are typing to the PIN to be extra vigilant.

  • don’t install a skimmer in the morning, because people are more vigilant then;
  • determine where a person would have to stand to keep an eye on everything happening on that block;
  • avoid blocks where more than 250 people per day walk through, because of the danger of detection;
  • don’t install skimmers in towns with fewer than 15,000 people, because people in those towns know what their ATMs look like;
  • avoid areas with small shops open 24 hours a day, because there may be surveillance cameras and vigilant shopkeepers;
  • don’t set up in areas where a lot of illegal immigrants live;
  • places with a lot of tourist traffic are good;
  • look for affluent neighborhoods and drive-through ATMs;
  • ATMs near cash-only bars are a good bet for lots of customer activity.

The tips are really nothing ground-breaking, but interesting to read nevertheless. Most of them could be considered common sense, but some like not targeting really small towns are quite interesting.

I would have thought busy times would have been the best time to go in as long as there is no-one else queuing at the ATM machine.

Source: NetworkWorld

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Hardware Hacking, Spammers & Scammers Tagged With: atm fraud, atm hacking, credit-card-fraud



Reader Interactions

Comments

  1. Navin says

    September 30, 2008 at 12:45 pm

    doesn’t this all come under tht little thing we all ignore called “common sense”??

    I mean, its more of observations than tips …what say??

  2. Yami King says

    September 30, 2008 at 7:06 pm

    @ Navin
    I totally agree.

    Except for the one (point 3) that says Avoid blocks where more than 250 people per day walk through, because of the danger of detection.
    Why? Because this just really depends on the time of the day you are at the ATM; when there is no one around and you followed the basic guidelines stated above, there’s basicly nothing to worry about.
    And it’s kind of in contradiction with point 7: Places with a lot of tourist traffic are good. Since these so-called places all contain blocks that are usually visited over 250 times a day (point 3) depending on the popularity of the region.

  3. SpikyHead says

    October 1, 2008 at 12:38 am

    This had to happen (that he got caught), ATM hacking is something which is comparatively easy to figure out especially when more than one customer complains about fraudulent activity in their bank accounts and then finding the fraudsters is even easier unless he has stopped these activities.

    now couple more ‘Blackhat’ tips to add (for humour purposes only):
    -Do not attempt this more than 5 times in one city
    -Change the city every day. This may make it harder for police ;)

    Yami, you seem to be analyzing his tips very carefully.. what ar eyour plans budd?

  4. goblert says

    October 1, 2008 at 1:04 pm

    Interesting read.
    This was happening in my
    country for a while, there was a big thing on the news about it.

  5. Pantagruel says

    October 1, 2008 at 1:13 pm

    Nice read, but nothing ground bracking

  6. terrery says

    October 2, 2008 at 9:07 am

    ”He was one of the most well-known ATM hackers in the world, according to Uri Rivner, head of new technologies for RSA Consumer Solutions”

    maybe a hint for him, after you skim the card you are about to withdraw cash from it.
    it will have a maximum amount of withdrawel, how can we get max profit of this scam? well search for a ATM that has standard passwords provided by the manufacturer, (you can find manuals from that specific ATM manufacture on the internet) use them, hack in the ATM and let the ATM think that a bill of 50 is 5.

    ”a max withdraw of 500”, 500:5= 100 times 50= ”5000”

    5 times in each city = 25000 lets say you can accomplish this is some days.

    well keep this on for a few weeks and fly to the bahama’s or something :)

  7. Goodpeople says

    October 2, 2008 at 9:24 am

    Am I glad that I live in a small town.. :-)

  8. navin says

    October 15, 2008 at 10:50 am

    @ terrery
    Can wht U’re saying be done for a single transaction?? i mean u ever heard of something like this done?? Even as a PoC?? links please…anyone

  9. Joe says

    October 16, 2008 at 9:24 pm

    Avoid ATM’s with video cameras… Although maybe sunglasses and a hood at night time would foil them. Banks and the Secret Service use all that info when they look for their guy.

    Some guys with very complicated heist manuvers have been caught even still.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 288

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 493

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 490

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 690

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,478

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

DataSurgeon is an open-source Linux-based data extraction and transformation tool designed for forensic investigations and recovery scenarios.

DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux

Views: 469

DataSurgeon is an open-source Linux-based data extraction and transformation tool designed for … ...More about DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (73)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,291,666)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,069)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,614)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,675)
  • Password List Download Best Word List – Most Common Passwords (933,462)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,130)
  • Hack Tools/Exploits (673,286)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,143)

Search

Recent Posts

  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025
  • DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux April 28, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy