What to do if you find someones debit card

Criminals are more organized and sophisticated than ever before. Attacks on ATM machines range from simplistic to highly organized efforts involving multiple ATMs across the country, hundreds of fraudulent cards and criminal gangs spanning the globe.

So, how do criminals get your customers' debit card data? Here are 10 different ways:

Steal cards

Attack sophistication: Low / Scale of attack: Small

The simplest way for a criminal to get card data is to steal someone's card. To get the PIN, the thief might shoulder surf or guess a weak password, such as a birth date.

Steal machines

Attack sophistication: Low / Scale of attack: Moderate

A criminal might decide to steal either an ATM or POS terminal. Cash can be pulled from the ATMs, but both types of machines could store card numbers if misconfigured. A stolen machine is also valuable in order to learn about weaknesses or ways to physically attack it.

Offline account takeover

Attack sophistication: Moderate / Scale of attack: Small

Breaking into mailboxes and stealing bank statements or other personal information can let a criminal conduct identity theft. Often they'll try to change the victim's mailing address with the bank, order a new card, and activate it. If the bank has good processes in place that are adhered to, then this type of attack can be stopped.

Separate skimming device

Attack sophistication: Low / Scale of attack: Moderate

If a deft criminal can get a hold of a card for a few seconds, then they can swipe it through a reader and get its data.

Overlaid skimming devices

Attack sophistication: Low / Scale of attack: Moderate

In this case, the criminal places a card reader over the machine's intrinsic reader. They might also attach a video camera or a pin-pad overlay to capture the PIN.

Internal skimming devices

Attack sophistication: Moderate / Scale of attack: Large

More capable criminals could place a skimming device inside a terminal, such as at a gas pump. The skimmer intercepts messages on the data lines, and is tough to detect without opening up machines.

Hijacked terminals

Attack sophistication: High / Scale of attack: Moderate

A terminal can be hijacked by replacing the operating system with a compromised one. An avenue of attack might be available for those ATMs with remote control capabilities that are left in the default (and insecure) settings. Stolen machines might also be modified and then used to replace an existing, non-compromised terminal.

Ghost ATMs and fake fronts

Attack sophistication: Moderate / Scale of attack: Moderate

Why add a skimming device to a real terminal when you can just use your own fake one? Criminals have been known to place fake, modified terminals in public spaces where victims will use their cards but receive communication error messages. In reality the terminal has captured card data and PIN, and stored it for later retrieval.

Buying the data

Attack sophistication: Low / Scale of attack: Moderate to Huge

With so many means of attack, there is a glut of card information on the market. Lazy criminals can simply buy card data, starting at $1 or less. Quality costs extra, but in the underground marketplace there are products for everyone.

Data breaches

Attack sophistication: High / Scale of attack: Huge

Capable hackers are able to crack the security on merchants and other card data holders, and access large volumes of card data. With the heightened awareness of cybercrime, the industry has made strides in using more secure techniques for storing data (or in many cases, ensuring that they don't store it). This has made it harder for criminals, but there are still many opportunities for attacks.

"10 Ways Criminals Get Debit Card Data." Verafin.com. Verafin Inc. Web. 8 Aug 2013

We, Yahoo, are part of the Yahoo family of brands.

By clicking ‘Accept all’ you agree that Yahoo and our partners will process your personal information, and use technologies such as cookies, to display personalised ads and content, for ad and content measurement, audience insights, and product development.

The personal information that may be used

  • Information about your device and internet connection, like your IP address
  • Browsing and search activity while using Yahoo websites and apps
  • Your precise location

Click ‘Manage settings’ for more information and to manage your choices. You can change your choices at any time by visiting your privacy controls. Find out more about how we use your information in our privacy policy and cookie policy.

What do you do if you find a lost debit card?

Hand the lost card over to someone with authority. Depending on where you found it, that could mean a store employee, restaurant or bar manager, security guard or a lost-and-found. If the card's owner can retrace their steps to the last place they used the card, they'll probably contact people on staff to find it.

How do I find the owner of a debit card?

The cardholder name is the name of the owner, printed on the front of the card.

What happens if you find a card and use it?

Contact your bank immediately If you claim the use of the card was not authorised by you, it is for your bank to prove otherwise. The bank may be able to cancel the payment or put the money back into your account.

What do I do if I find a debit card UK?

Natwest says you should report the card as soon as possible to avoid fraud and never tell your pin to anyone, as the bank will not ask for it. Barclays also recommends reporting the lost card as soon as you realise it has gone, and HSBC has the same advice.