PLA Forums

Other Stuff That Has Little To Do With PLA => Techinical Shit => Phreaking, Hacking, Social Engineering, Lock Picking => Topic started by: Staples on December 10, 2009, 05:50:10 AM

Title: the ATM 'reprogramming' scam
Post by: Staples on December 10, 2009, 05:50:10 AM
Quote
ok so if you haven't heard of this before, it involves using default/master passwords on certain ATM's to change the dollar amount (it thinks its giving out 1's/5's/10's but it's giving 20's) and then resetting and then leaving.

Obviously this isn't the greatest idea, but i was wondering if anyone has done this before...and the chances of getting caught and the trouble you would get in.



edit: if this is posted somewhere else, just delete it.
Title: Re: the ATM 'reprogramming' scam
Post by: MattGSX on December 16, 2009, 09:12:23 AM
Huh. All ATMs have cameras in front of them, so you will be on tape as you are reprogramming it, assuming you are using the front panel for physical access. If you have to log in (swipe your card) to exploit a backdoor or loophole, then you will be logged and the police would have a name and bank with tons of sensitive info to link to you. I can see how it would be easy to get caught. If you don't require physical access to the machine, then that isn't something that a spoofed MAC address, public unlogged internet, and proxy can't help (ie: do that).

As far as charges, I'm not sure. It seems like everyone else should be charged with theft for taking money they shouldn't! There would be definite civil penalties, plus your state's version of anti-hacking laws, etc.

If you are going to do this, or are advising someone who is doing this, and they plan on physically accessing the machine, plan on getting caught.
Title: Re: the ATM 'reprogramming' scam
Post by: rbcp on December 16, 2009, 10:49:27 AM
Here's a pretty good article on one case of that happening:

http://www.wired.com/threatlevel/2008/09/two-arrested-in/ (http://www.wired.com/threatlevel/2008/09/two-arrested-in/)