{"id":4485,"date":"2015-01-21T10:00:14","date_gmt":"2015-01-21T15:00:14","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4485"},"modified":"2017-09-24T18:37:36","modified_gmt":"2017-09-24T14:37:36","slug":"skimmers-part-one","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/skimmers-part-one\/4485\/","title":{"rendered":"Juggling with cards: doing criminal business on ATMs"},"content":{"rendered":"<p>We all know to be aware of pickpockets. Even if <a id=\"_GPLITA_6\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;early childhood education&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095638\/arrow-10x10.png\" alt=\"\"><\/a> did not include tips on watching your pockets when outdoors, life itself provides opportunities to learn the simple rules. The same can be said with hackers. Today, widely publicized hacker activities on the Internet are known even to children.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05104114\/ATM-1024x768.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7230\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095650\/ATM-1024x768-1.png\" alt=\"ATM\" width=\"1067\" height=\"800\"><\/a><\/p>\n<p>But skimmers enjoy less popularity, which is too bad since you run a relevantly high risk of falling victim to their activity. These carders specialize in stealing card credentials with the help of miniature, stealth hardware <a id=\"_GPLITA_8\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;installed&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095651\/arrow-10x10-1.png\" alt=\"\"><\/a> on ATMs. Even with the combined effort of police, banks, and payment systems, the amount of money stolen from card accounts <a id=\"_GPLITA_7\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;continues&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095652\/arrow-10x10-2.png\" alt=\"\"><\/a> to grow.<\/p>\n<p>Skimmers are a little like pickpockets (they use similar palmistry skills) and, to a lesser degree, they\u2019re a little like hackers, too \u2013 what they do is not possible without employing some hi-tech and PC tricks.<\/p>\n<p>To become their target, you just need to use your debit card to <a id=\"_GPLITA_9\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;withdraw&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095653\/arrow-10x10-3.png\" alt=\"\"><\/a> cash. If your card is not equipped with a chip, the situation is worse for you and better for them: non-chipped cards are stripped of money a lot easier. To increase your chances of falling victim to skimmers, just skip the option of SMS notifications from your bank, insert your card into any ATM you see on the street, and proudly show off the PIN you enter. You\u2019d make skimmers extremely grateful.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05102835\/atm_1-1024x640.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7229\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095715\/atm_1-1024x640-1.png\" alt=\"atm_1\" width=\"1280\" height=\"800\"><\/a><\/p>\n<p>On a serious note, this illicit business has grown and evolved over the years. Its principle remains the same: Use stealth techniques to read data from the magnetic strip on a card, look up the PIN code, clone the card and <a id=\"_GPLITA_10\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;withdraw&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095717\/arrow-10x10-4.png\" alt=\"\"><\/a> the maximum amount of money from the corresponding bank account. However, the data theft techniques evolved greatly.<\/p>\n<p><strong>Just<\/strong> <strong>business<\/strong><\/p>\n<p>There were times when skimmers used DIY card readers, installed clumsy hardware on ATM input trays, and risked getting caught in the act when extracting the data manually. Times have changed. The industry has moved on, and DIY skimmer enthusiasts are extinct. Today, skimming is a well-organized and highly automated process.<\/p>\n<p>The first link in the process chain is producers and sellers of ready-made hardware solutions made of massively available components. The deals are made online, and the goods are shipped via courier services \u2013 this is safest for the criminals.<\/p>\n<p>https:\/\/twitter.com\/GreyCastleSec\/status\/413645017987551232<\/p>\n<p>\u00a0<\/p>\n<p>To see the proof of how widely popular skimming hardware is, just type in a simple request in any search engine. Kits containing a stealth reader to extract data from a plastic card, a vanity panel to get PIN codes, and a cloning device bundled with corresponding <a id=\"_GPLITA_11\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;software&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095717\/arrow-10x10-5.png\" alt=\"\"><\/a> are sold for as much as $1500 \u2013 $2000. A couple of years ago such offers would go as high as $10,000, as estimated by Brian Krebbs, an infosec expert.<\/p>\n<p>Buyers of skimming bundles needn\u2019t be proficient hackers: They are offered detailed manuals, some even containing a \u2018best practices\u2019 section. The instructions are so detailed they go as far as including recommendations of proper first-time battery use to ensure a reader enjoys a long battery life.<\/p>\n<p><strong>Tech<\/strong> <strong>wonders<\/strong><\/p>\n<p>Tech progress, coupled with massive demand, fueled evolution of electronic components used for illicit activities. Security specialists recommend examining any ATMs for peculiarities, but these recommendations are gradually becoming outdated.<\/p>\n<p>First, experienced criminal vendors sell hardware barely distinguishable from original ATM components. Even a conscientious user wouldn\u2019t be able to tell them apart: The foul input tray is made of the same sort of plastic and is of the same color as the legitimate one. And the shape of the fake is only slightly different.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05102834\/skimmer-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7226\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095720\/skimmer-2-1.jpg\" alt=\"skimmer-2\" width=\"636\" height=\"358\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>This similarity is achieved through a deliberate adaptation of ATM elements in widely used models \u2013 any <a id=\"_GPLITA_0\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;market&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095721\/arrow-10x10-6.png\" alt=\"\"><\/a> has major banks serving a lot of clients. Of course, banks use anti-skimming techniques as a counter measure.<\/p>\n<p>Secondly, there are readers <a id=\"_GPLITA_1\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;installed&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095722\/arrow-10x10-7.png\" alt=\"\"><\/a> by skimmers <em>inside<\/em> ATMs through the input trays. This novelty was referenced in the recent report issued by European ATM Security Team, a non-profit organization. Even worse, some such devices do not bother to read the magnetic strip \u2014 they use ATM\u2019s own <a id=\"_GPLITA_2\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;computing&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095723\/arrow-10x10-8.png\" alt=\"\"><\/a> resources to do that.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">This New Card Skimmer Is Almost As Thin As A Credit Card <a href=\"http:\/\/t.co\/rvXS3W5HVa\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/rvXS3W5HVa<\/a> by <a href=\"https:\/\/twitter.com\/johnbiggs?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@johnbiggs<\/a><\/p>\n<p>\u2014 TechCrunch (@TechCrunch) <a href=\"https:\/\/twitter.com\/TechCrunch\/status\/502914277548634115?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 22, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>Extracting stolen data manually is also an old method. New reader models are equipped with a GSM module that serves to send encrypted (yes, skimmers have to fight <a id=\"_GPLITA_3\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;competition&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095724\/arrow-10x10-9.png\" alt=\"\"><\/a>!) magnetic strip data via ordinary cellular networks.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">why GSM-based ATM skimmers are the \"best,\" according to skimmer makers http:\/\/bit.ly\/dKRrrp<\/p>\n<p>\u2014 briankrebs (@briankrebs) <a href=\"https:\/\/twitter.com\/briankrebs\/status\/14221410897498112?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 13, 2010<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p><strong>Watch<\/strong> <strong>your<\/strong> <strong>PIN<\/strong><\/p>\n<p>Since then, getting a PIN code remains the weakest link. In order to look up PINs, culprits use miniature stealth cameras or even ordinary mobile devices like an iPod Touch, which is notable for its slim Z-height and powerful battery.<\/p>\n<p>A camera is installed above the keypad or elsewhere in the room. Skimmers are particularly fond of brochure stands where banks usually exhibit their <a id=\"_GPLITA_4\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;marketing&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095725\/arrow-10x10-10.png\" alt=\"\"><\/a> materials. As an element of any bank interior, they are hardly perceived as something dangerous.<\/p>\n<p>However, if a person trying to <a id=\"_GPLITA_5\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;withdraw&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095726\/arrow-10x10-11.png\" alt=\"\"><\/a> cash covers the pad with their hand, the camera is no longer of any use. Also, video is not very convenient to send or process, and requires a lot of manual labor.<\/p>\n<p>\u00a0<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/reqrUP5qSn0?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>\u00a0<\/p>\n<p>Slim vanity panels for ATM key pads are getting a lot cheaper and are now priced at less than a thousand euros on the black <a id=\"_GPLITA_12\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;market&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095727\/arrow-10x10-12.png\" alt=\"\"><\/a>, further complicating the situation. There is no use covering the pad anymore \u2013 the panels will still detect your PIN. Sending a 4-digit code in an SMS to a skimmer database is a lot easier than processing long videos, and the whole process is a lot more automated.<\/p>\n<p>Of course, the vanity panel visibly protrudes over the original keypad, but hardly any user would closely examine the pad and look for clearance. From above, the whole construction looks very average \u2013 vanity panels are made using the same steel and quality paints as original ATM keypads.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05104116\/skimmer-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7224\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/05111818\/skimmer-1-1.jpg\" alt=\"skimmer-1\" width=\"800\" height=\"566\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>There is one more technique skimmers use: They guard the <a id=\"_GPLITA_13\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;software&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095733\/arrow-10x10-13.png\" alt=\"\"><\/a> they use for decoding and cloning the information. This is how carders protect themselves from competing skimmers and law enforcement officers.<\/p>\n<p>Should an incorrect password be used, the skimming software would not inform the user it\u2019s incorrect \u2013 it would simply shut down. Giving any incorrect plausible password to the police, a skimmer says the program is just a harmless small piece of software he recently <a id=\"_GPLITA_14\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;downloaded&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095734\/arrow-10x10-14.png\" alt=\"\"><\/a>. Oh, and what a shame it won\u2019t start\u2026<\/p>\n<p>To prove it was a <a id=\"_GPLITA_15\" style=\"border: none !important; display: inline-block !important; text-indent: 0px !important; float: none !important; font-weight: bold !important; height: auto !important; margin: 0px !important; min-height: 0px !important; min-width: 0px !important; padding: 0px !important; text-transform: uppercase !important; text-decoration: underline !important; vertical-align: baseline !important; width: auto !important; background: transparent !important;\" title=\"Click to Continue &gt; by MacSaleApp\u201d href=\u201d#\u201d&gt;program&lt;img decoding=\" async src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/01\/23095735\/arrow-10x10-15.png\" alt=\"\"><\/a> used for illicit activity, law enforcement officers have to employ qualified specialists to analyze the code, which is a painstaking and time-consuming process.<\/p>\n<p>\u00a0<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">\"Five lessons I\u2019ve learned from having my credit card hacked\" <a href=\"https:\/\/t.co\/TQHBbK0Oqw\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/TQHBbK0Oqw<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/532820878699278336?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 13, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u00a0<\/p>\n<p>With all that said, tech is just part of the story. Many skimming operations remain manual and very risky. We will relate that part of the story in our next article and give you some tips to protect your bank account from the culprits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you use an ATM card, you are of interest to skimmers. How do these criminals act and how can you keep your bank account safe?<\/p>\n","protected":false},"author":521,"featured_media":4489,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[401,132,77,93,354,894],"class_list":{"0":"post-4485","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-atm","9":"tag-credit-cards","10":"tag-cybercrime","11":"tag-cybercriminals","12":"tag-financial-security","13":"tag-skimmers"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/skimmers-part-one\/4485\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/skimmers-part-one\/4541\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/skimmers-part-one\/5033\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/skimmers-part-one\/5345\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/skimmers-part-one\/6658\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/skimmers-part-one\/7223\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/skimmers-part-one\/6654\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/skimmers-part-one\/6658\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/skimmers-part-one\/7223\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/skimmers-part-one\/7223\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/atm\/","name":"atm"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4485"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4485\/revisions"}],"predecessor-version":[{"id":8188,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4485\/revisions\/8188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4489"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}