Knowledge (XXG)

Lebanese loop

Source đź“ť

92:), or by approaching the victim under the pretense of offering help and suggesting they re-enter their PIN (and again, watching them do so). More sophisticated variants of the Lebanese loop scam have developed. In some cases, the fraudsters attach a small camera to the ATM to record the victim entering their PIN. The video from this camera is then transmitted to the fraudsters, who may be waiting near the machine and viewing the video on a laptop computer, meaning they need not approach the victim directly. There have been cases where a fake keypad is fitted to the machine over the top of the real one, and this records the PINs entered. 85:(PIN) as normal, and requests the funds. The ATM then tries to eject the card, the loop device prevents the card from being ejected, either with a flap covering the fascia's slot, or a diagonal slit in the tape which catches against the card. The machine senses that the card has not been ejected, and draws the card back into the machine. The cash drawer does not open, and the money that has been counted is retained by the machine. In most cases, the victim's account is not debited. The victim believes the machine has malfunctioned or genuinely retained their card. 61: 20: 111:
ATM industry groups counsel cardholders to take precautions when entering their PIN into any device. Customers are also advised to avoid an ATM if strangers are standing next to it (especially if they do not move after being asked), be careful of ATMs which appear out of the ordinary (such as having
136:
At their most sophisticated, scams can involve the construction and installation of fake fascias built to fit particular ATMs or other card reading devices. These false fronts can house any of the above devices to gather data from the user and allow the perpetrators to acquire or clone cards and
98:
Since the Lebanese Loop is only able to capture one card at a time and the card holder will usually react quickly to the loss of the card, the technique must be widely deployed to net a useful number of cards in a short amount of time. This may require a large workforce to accomplish the task.
73:
tape) that is inserted into the ATM's card slot. Some loops have a covering fascia which appears superficially to be part of the ATM, while others are simply a length of dark-coloured tape with glue strips to hold it temporarily inside an ATM slot. Lebanese Loop devices are relatively simple to
107:
ATM manufacturers have resorted to several methods to counteract the Lebanese Loop, generally consisting of adding various sensing mechanisms to the card readers. Various network activity profiling processes can be applied to attempt to detect this activity. Often ATM vestibules have video
68:
The term “Lebanese loop” is applied to any number of similar devices that are used to perpetrate ATM fraud by retaining the user's card. In their simplest form, Lebanese loops consist of a strip or sleeve of metal or plastic (even something as simple as a strip of
44:(ATMs). In its simplest form, it is a strip or sleeve of metal or plastic which blocks the ATM's card slot, causing any inserted card to be apparently retained by the machine, allowing it to be retrieved by the fraudster when the card holder leaves. 112:
unusual instructions attached), to never enter a PIN more than twice (to prevent the card from being retained by the machine), and to ignore advice from "helpful" strangers who may approach when they see a customer is having difficulty.
51:
financial crime perpetrators, although it has since spread to other international criminal groups. The scam has been reported in countries with high numbers of ATMs such as the UK, the United States, Germany and France.
23:
A Lebanese loop device (black) attached to an ATM slot (grey). When the victim's card (green) is inserted, it pushes aside a small flap which falls back into place, trapping the card so that the ATM is unable to eject
128:
on the back of the victim's card as it is inserted. This variant does not require the card to be retained; the transaction runs normally, and the data recorded from the original card is copied to another blank
64:
A Lebanese loop device viewed from the back: a loop of plastic holds the card in place while allowing it to be read by the ATM. Double-sided tape (yellow) holds the device in place over the ATM's card slot.
95:
Once the victim has left the area, the perpetrator retrieves the loop and the trapped card, and uses it, along with the stolen PIN, to withdraw cash from the victim's account.
81:
When the victim inserts their ATM card, the loop is long and narrow enough that the ATM machinery can still fully draw the card in and read it. The victim then enters their
317: 89: 398: 236: 299: 333: 210: 82: 124:
technique, where an electronic device is fitted over the ATM's card slot and which reads the information encoded into the
88:
In a typical scam, the perpetrator will obtain the victim's PIN either by watching them enter it the first time (
41: 137:
their associated PINs. These fakes can often be indistinguishable from unmodified devices to the untrained eye.
108:
surveillance equipment installed in them, which can make identification of the perpetrator and method easier.
272: 208:
ATM Security | Landscaper admits to Lebanese loop scam at ATMs in 4 states and D.C. | ATM Marketplace
130: 314: 146: 121: 75: 321: 303: 214: 225: 60: 393: 296: 125: 70: 37: 341: 387: 207: 362: 283: 378: 251: 188: 19: 48: 226:
TU Berlin - Hoax-Info - Extra-Blatt: Ausspionieren von EC-Karten-Daten
59: 33: 151: 334:"Interac Association - Protect Your PIN > Cardholder Tips" 297:
Fraud fight gets more proactive at ATMs | ATM Marketplace
379:
SS Richard Montgomery Matter: How Lebanese Loops Work
74:construct, requiring less technical skill than a 172:ATM Security Forecast at Forefront of 1996 Plans 263: 261: 271:. Evening Standard (London), February 5, 2001 182: 180: 8: 47:Its name comes from its regular use amongst 189:"BBC News - Gangs preying on cash machines" 187:Summers, Chris; Toyne, Sarah (2003-10-09). 237:Google cache of Detroit Free Press article 174:. EFT Report, vol. 19 issue 2, Jan 18 1996 315:SiliconRepublic.com: Attack of the clones 18: 163: 133:, which is then used to withdraw cash. 246: 244: 7: 252:"Atm theft atm theft Lebanese loop" 269:Lebanese loop is new cashpoint con 120:Other variants of fraud may use a 14: 83:personal identification number 1: 32:is a device used to commit 415: 399:Automated teller machines 284:"Lebanese Loop ATM Theft" 116:Other forms of card fraud 42:automated teller machines 16:Fraud device used on ATMs 65: 25: 63: 22: 131:magnetic stripe card 344:on 12 February 2003 267:Nettleton, Philip. 320:2006-07-20 at the 302:2006-05-09 at the 213:2005-03-02 at the 170:Schreiber, Barry. 66: 26: 147:Credit card fraud 406: 366: 360: 354: 353: 351: 349: 340:. Archived from 330: 324: 312: 306: 294: 288: 287: 280: 274: 265: 256: 255: 248: 239: 234: 228: 223: 217: 205: 199: 198: 196: 195: 184: 175: 168: 90:shoulder surfing 414: 413: 409: 408: 407: 405: 404: 403: 384: 383: 375: 370: 369: 361: 357: 347: 345: 338:www.interac.org 332: 331: 327: 322:Wayback Machine 313: 309: 304:Wayback Machine 295: 291: 282: 281: 277: 266: 259: 250: 249: 242: 235: 231: 224: 220: 215:Wayback Machine 206: 202: 193: 191: 186: 185: 178: 169: 165: 160: 143: 118: 105: 103:Countermeasures 58: 17: 12: 11: 5: 412: 410: 402: 401: 396: 386: 385: 382: 381: 374: 373:External links 371: 368: 367: 365:at Snopes.com. 355: 325: 307: 289: 275: 257: 240: 229: 218: 200: 176: 162: 161: 159: 156: 155: 154: 149: 142: 139: 126:magnetic strip 117: 114: 104: 101: 71:video cassette 57: 54: 40:by exploiting 38:identity theft 15: 13: 10: 9: 6: 4: 3: 2: 411: 400: 397: 395: 392: 391: 389: 380: 377: 376: 372: 364: 363:Lebanese Loop 359: 356: 343: 339: 335: 329: 326: 323: 319: 316: 311: 308: 305: 301: 298: 293: 290: 285: 279: 276: 273: 270: 264: 262: 258: 253: 247: 245: 241: 238: 233: 230: 227: 222: 219: 216: 212: 209: 204: 201: 190: 183: 181: 177: 173: 167: 164: 157: 153: 150: 148: 145: 144: 140: 138: 134: 132: 127: 123: 115: 113: 109: 102: 100: 96: 93: 91: 86: 84: 79: 77: 76:card skimming 72: 62: 55: 53: 50: 45: 43: 39: 35: 31: 30:Lebanese loop 21: 358: 346:. Retrieved 342:the original 337: 328: 310: 292: 278: 268: 232: 221: 203: 192:. Retrieved 171: 166: 135: 119: 110: 106: 97: 94: 87: 80: 67: 46: 29: 27: 78:technique. 388:Categories 348:14 January 194:2006-07-21 158:References 122:“skimming” 318:Archived 300:Archived 211:Archived 141:See also 49:Lebanese 56:Process 394:Fraud 34:fraud 350:2022 36:and 152:EMV 24:it. 390:: 336:. 260:^ 243:^ 179:^ 28:A 352:. 286:. 254:. 197:.

Index


fraud
identity theft
automated teller machines
Lebanese

video cassette
card skimming
personal identification number
shoulder surfing
“skimming”
magnetic strip
magnetic stripe card
Credit card fraud
EMV


"BBC News - Gangs preying on cash machines"
ATM Security | Landscaper admits to Lebanese loop scam at ATMs in 4 states and D.C. | ATM Marketplace
Archived
Wayback Machine
TU Berlin - Hoax-Info - Extra-Blatt: Ausspionieren von EC-Karten-Daten
Google cache of Detroit Free Press article


"Atm theft atm theft Lebanese loop"



"Lebanese Loop ATM Theft"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑