| ==Phrack Classic== |
|
|
| Volume Three, Issue 32, File #6 of 12 |
|
|
| +----------------------------------+ |
| ] Exploration of: ] |
| ] Automatic Teller Machine Cards ] |
| ] ] |
| +----+-------------------------+---+ |
| ] Written by: ] |
| ] Jester Sluggo ] |
| ] ] |
| ] Released: May 13, 1989 ] |
| ](to Black-Ice:For Review)] |
| ] Released: Jan 12, 1990 ] |
| ] (to Phrack Inc.) ] |
| ] Released: Nov, 10, 1990 ] |
| ] (to Phrack Classic) ] |
| +-------------------------+ |
|
|
|
|
| With the North American continent the being the worlds biggest |
| consumer of goods and services liquidity of the banking system has |
| become an important factor in our everyday lives. Savings accounts |
| were used by people to keep money safe and used by the banks to |
| provide money for loans. However, due to 'Bankers Hours' (10 AM to |
| 3 PM) it was often difficult for people to get access to thier |
| money when they needed it. |
|
|
| The banking system then created the Checking Account system. This |
| system allowed people to have much easier access to thier money. |
| Unfortunately the biggest drawback of this system is that people can |
| not manage thier own money and accounting procedures. Millions of |
| times each day throughout the North American continent people are |
| writing checks for more money than they have in thier savings accounts. |
| This drawback also causes the already-backed up judicial system to |
| become backed up further. The banking system soon reacted to this |
| problem by producing 'check verification' methods to prevent people |
| from forgery, and overdrawing from thier accounts. |
|
|
| "Money makes the world go 'round" and there are many different ways |
| to make this world spin. Today we have checking accounts, credit |
| cards, travelers checks, and the most 'liquid' form of money: cash. |
| Cash transactions are untrackable and widely accepted, so I feel |
| the "Paperless Society" will never happen. Automated Teller Machines |
| provide consumers with 24-hour access to cash-sources. By simply |
| inserting a plastic card into the machine and keypadding-in the |
| owners' "account password", you can access the owners bank account |
| and receive cash in-hand. This file will explain some details of |
| the automated tellers and the plastic card used by the Teller-system. |
|
|
| The automated teller is connected by wires and cables to a "Main |
| Computer". During each transaction the teller sends signals to |
| the main computer. The main computer records each transaction |
| (a deposit or withdrawl) and updates the card-holders account. |
| It also sends 'approval' or 'denial' signals to the ATM in regard |
| to the transaction requested. If a card-holder attempts to withdraw |
| $150.00 from his account and he has only $100.00 in it, the main |
| computer will tell the ATM to deny the transaction. |
|
|
| The ATM has 2 compartments to store cash in. The first is the "deposits" |
| compartment. This is a small area that receives the daily deposits. |
| It is located in the upper-part of the machine, near all the mechanical |
| devices. However, because most ATM transactions are withdrawls the |
| complete bottom-half is filled with cash where the withdrawls are |
| extracted from. |
|
|
| The plastic card inserted into the machine is the same size as a |
| credit card. The front of the card is embossed with information |
| about the card-holder. The back-side of the card has a thin strip |
| of magnetic tape which also holds some important information. |
|
|
| +--------------------------+ +--------------------------+ |
| ] CIRRUS ] ]--------------------------] |
| ] INSTANT CASH CARD ] ]/////(magnetic strip)/////] |
| ] ] ]--------------------------] |
| ] Acct: 12345675 Exp. ] ] ] |
| ] Joe Schmoe 01/91 ] ] "card-holders signature" ] |
| ] ] ] ] |
| +--------------------------+ +--------------------------+ |
| Front-side Back-side |
|
|
| When a cardholder inserts his card into the machine and requests a |
| transaction, the machine reads the embossed information from the |
| front-side and compares it with the data stored on the magnetic |
| strip; looking for a 'match' of the information on both sides. |
|
|
| The information on the front-side is easily readable with your |
| eyes. However, you can not read the data on the magnetic-strip |
| so easily. You may ask , "What is stored on the magnetic strip ?". |
| The answer is; the same information as the embossing plus some |
| 'confidential' information regarding the cardholders' financial |
| status is stored there. The magnetic strip has 3 "tracks" on it. |
| The first track can store 210 BPI (Bytes per inch), and the second |
| stores 75 BPI, and the third stores 210 BPI. So, we have: |
|
|
| +---------------------------+ |
| Track 1: (210 BPI density) |
| +---------------------------+ |
| Track 2: ( 75 BPI density) |
| +---------------------------+ |
| Track 3: (210 BPI density) |
| +---------------------------+ |
|
|
| THE MAGNETIC STRIP |
|
|
|
|
| Now, here's the information stored on each track of the strip in |
| my example: |
|
|
| Track 1: " ;B 12345675 ^ Schmoe/Joe ^ ; LRC " |
| Track 2: " ;12345675 01/91 ^ 1234 ^ (discriminate data) ; LRC " |
| Track 3: " ;12345675 ^ 01/91 ^ 5 (discriminate data) ; LRC " |
|
|
| Here's the decoding of the above information: |
| Track 1: ";" = Beginning of the data character |
| "B" = Field-Control Character: I believe this character |
| tells the ATM what type of account (or status) |
| the user has. |
| "12345675" = This is the account number of the cardholder. |
| "^" = Data-field seperator. |
| "Schmoe/Joe" = Last/First name of cardholder. |
| "^" = Data-field seperator. |
| ";" = End of data character. |
| "LRC" = Longitude Redundancy Check (end of track character). |
|
|
| Track 2: ";" = Beginning of data character |
| "12345675" = Account number of the cardholder. |
| "01/91" = Month/Year the card expires. |
| "^" = Data-field seperator. |
| "1234" = Process Identification Number (The cardholders 'password', |
| I think... or it could be a number to verify the |
| the transaction between the ATM and the Main Computer). |
| "^" = Data-field seperator |
| "(dscrmn. data)" = Discriminate Data. Not much is known exactly what is |
| stored here. Perhaps Bank Identification data or |
| bank account type (savings, checking?) ? |
| ";" = End of data character. |
| "LRC" = Longitude Redundancy Check. |
|
|
| Track 3: ";" = Beginning of data character. |
| "12345675" = Account number of the cardholder. |
| "^" = Data-field seperator. |
| "01/91" = Month/Year the card expires. |
| "^" = Data-field seperator. |
| "5" = The crypting-digit. When the transaction request |
| is sent to the main computer, it is encrypted. |
| This digit tells which encryption-key is used. |
| "(dscrmn. data)" = A duplicate of the discriminate data stored on |
| Track 2. |
| ";" = End of data character. |
| "LRC" = Longitude Redundancy Check. |
|
|
| When the card is being processed the ATM tries to match the |
| account number, expiration date and name stored on each track. |
| The reason they duplicate data is for verification purposes. But, |
| notice that the duplicate data is stored on different tracks, each |
| having different recording densities. Once the information on the |
| tracks are confirmed to match, the ATM compares them to the embossed |
| information on the front-side. If all of the information matches |
| then the transaction will proceed. If it doesn't match, then the card |
| is considered to be damaged and the ATM will keep the card. It will |
| give the cardholder a piece of paper instructing the user to notify |
| the bank who issued his ATM-card so he can receive a replacement |
| card in the mail (this process takes about 3 weeks). |
|
|
|
|
| Now that you know how the ATM-system is designed and what information |
| is kept where on the card, what "security defects" does this system |
| contain ? I will outline 4 methods of attacking this system that |
| have been tried (not by me!). |
|
|
| 1) Vandalization: If you want, you can break-in to the ATM. |
| However, most ATM's contain 'sensor' devices which sound an |
| alarm when this is tried. Therefore, if you're going to try |
| this method I do not suggest using a hammer and chisel on the |
| ATM because it will take 1/2 an hour to get the machine open |
| and by that time the police will be there. You could try a |
| much faster way, dynamite; but that might scatter the money |
| all-over, making it hard to collect. Also, the bottom-half |
| is where most of the money is stored (unless you happen to |
| choose a machine that has issued all of its withdrawl-cash) |
| so you'll want to break into the bottom-half of the ATM. |
|
|
| In relation to this, you could wait outside the ATM for a |
| valid-user to complete his withdrawl-transaction and mug him. |
| As far as I know, the bank holds no responsibilty for placing |
| the ATM in a 'secure' enviroment. However, usually they will |
| have lights nearby and placed in 'reasonable' places where |
| people need money (example: Grocery store) and where the chance |
| of mugging is slim. |
|
|
|
|
| 2) Physical Penetration: There are several ways of doing this. |
| If you have a stolen card, you could randomly try guessing his |
| account-password. But, I feel this is a primitive method. |
| If you try too many attempts at guessing the 'password', |
| the ATM will return the card to you. But, your attempts |
| *might* be recorded in the central computer; allowing the |
| bank to decide whether to cancel that card... However, |
| this has not been verified by me. If you do get a cash-card, |
| you can make counterfeit-cards. |
|
|
| A) Counterfiet ATM-cards: The same method for producing |
| counterfiet credit cards applies to ATM-cards. If you |
| have a valid ATM-card you can 'clone' it simply by embossing |
| a blank-card with the same information. Copying the mag- |
| netic strip is also easy. To do this, you place a blank |
| strip of the magnetic tape on top of the valid magnetic |
| strip. Then, using an iron on low-heat, gently rub the |
| iron across the two strips for a few seconds. Lastly, |
| peel the new strip apart from the valid one and you've |
| got a copy of all the data from the valid ATM-card. |
|
|
| B) Also, I've heard a case where some guys had a machine |
| that could read and write to the magnetic strips (probably |
| they were employees of a company that produces the ATM-cards). |
| Using this machine, they were able to create and change |
| existing data on ATM-cards (such as the expiration date |
| so they could keep using the same card over a long period |
| of time). |
|
|
| In relation to this there are other devices available that |
| can read and write to magnetic strips. Using your own |
| microcomputer, you can buy a device that allows you to |
| read and write to these magnetic strips. It looks |
| similar to a disk drive. If you're interested in |
| exploring this method, I'll suggest that you contact |
| the following company: |
|
|
| American Magnetics Corporation |
| 740 Watsoncenter Road |
| Carson, California 90745 |
| USA |
|
|
| 213/775-8651 |
| 213/834-0685 FAX |
| 910-345-6258 TWX |
|
|
| C) WARNING: During each transaction attempted on an ATM a |
| photo of the person requesting the transaction is taken. |
| How long this film is stored is unknown, but it probably |
| is different for each bank (unless there is a federal |
| regulation regarding this). Also, it is possible that |
| this is not done at all ATMs. |
|
|
| 3) "Insider" Theft: The above case also crosses over into this |
| section. The biggest 'security leaks' in any company are |
| its employees. This is also the easiest way to steal money |
| from ATMs. The man who collects the deposits from the machine |
| and inserts cash for withdrawls has the easiest and most |
| open access to these machines. I was told that this person |
| can easily steal money from ATMs and not be detected. Another |
| person with access to these machines is the technician. The |
| technician who fixes ATMs is the most-knowledgeable person |
| about ATMs within the bank, therefore he should be a trust- |
| worthy guy and receive a 'comfortable' salary.. otherwise |
| he'll begin to collect 'retirement benefits' from the ATM |
| and this may go undetected. |
|
|
| However, I have heard of some embezzlement-cases involving ATMs, |
| so I think it's not as easy as it seems. It's only common sense |
| that a bank would account for every dollar of every transaction. |
| Whether the accounting is done inside the ATM or the main |
| computer doesn't make a difference... some form of accounting |
| is *probably* done. |
|
|
| 4) Data-link Intercept: This method has been very successful. What |
| you do is 'tap' into the wires that connect the ATM to the Main |
| computer. By doing this you can intercept and send signals to |
| the ATM. However, some 'inside information' is needed because |
| the transmission is encrypted (refer to the Cryptography Digit |
| stored on the magnetic strip). But, I think you don't need to |
| know *everything* being transferred. You should need to know |
| when to send the 'approval' signal to the ATM telling it to |
| dispense its' cash. I read a case (it may be in Phrack World |
| News; 1985?) where some guys netted $600,000 from various ATMs |
| using this method. This seems to be one of the better, and |
| more ingenious methods of stealing from these machines. |
|
|
|
|
| The information in this file should be 'adequate' to introduce you |
| to how ATMs work. How did I get this information? I went into a |
| bank and inquired about the computer-technology of ATMs. The man |
| who was responsible for the ATMs was a bureaucrat and actually knew |
| very little about the 'guts' of ATMs. Luckily the ATM-technician |
| was there that day and I agreed to buy him dinner later that evening. |
| (Please refer to: "Insider" Theft and the principle of Company-Loyalty). |
| During the dinner at "Toppers" (a neat 1950's Burgers/Milkshake/Beer |
| restaurant) he provided me with Operation and Repair manuals for the |
| ATMs. I feel this information is well-worth the $3.82 dinner and |
| will be of some value to its' readers. Some good information was |
| screened-out due to its 'delicate nature', but the information I've |
| provided has been confirmed. |
|
|
|
|
| +---------+ |
| ] CREDITS ] |
| +---------+ |
| The Mentor (Phrack #8, File #7; "Fun with Automatic Tellers") |
| Deserted Surfer |
| Hyudori |
| Lex Luthor |
|
|
| Please distribute this file in its complete form. |
|
|
| _______________________________________________________________________________ |
|
|