| ==Phrack Classic== | |
| Volume Three, Issue 32, File #6 of 12 | |
| +----------------------------------+ | |
| ] Exploration of: ] | |
| ] Automatic Teller Machine Cards ] | |
| ] ] | |
| +----+-------------------------+---+ | |
| ] Written by: ] | |
| ] Jester Sluggo ] | |
| ] ] | |
| ] Released: May 13, 1989 ] | |
| ](to Black-Ice:For Review)] | |
| ] Released: Jan 12, 1990 ] | |
| ] (to Phrack Inc.) ] | |
| ] Released: Nov, 10, 1990 ] | |
| ] (to Phrack Classic) ] | |
| +-------------------------+ | |
| With the North American continent the being the worlds biggest | |
| consumer of goods and services liquidity of the banking system has | |
| become an important factor in our everyday lives. Savings accounts | |
| were used by people to keep money safe and used by the banks to | |
| provide money for loans. However, due to 'Bankers Hours' (10 AM to | |
| 3 PM) it was often difficult for people to get access to thier | |
| money when they needed it. | |
| The banking system then created the Checking Account system. This | |
| system allowed people to have much easier access to thier money. | |
| Unfortunately the biggest drawback of this system is that people can | |
| not manage thier own money and accounting procedures. Millions of | |
| times each day throughout the North American continent people are | |
| writing checks for more money than they have in thier savings accounts. | |
| This drawback also causes the already-backed up judicial system to | |
| become backed up further. The banking system soon reacted to this | |
| problem by producing 'check verification' methods to prevent people | |
| from forgery, and overdrawing from thier accounts. | |
| "Money makes the world go 'round" and there are many different ways | |
| to make this world spin. Today we have checking accounts, credit | |
| cards, travelers checks, and the most 'liquid' form of money: cash. | |
| Cash transactions are untrackable and widely accepted, so I feel | |
| the "Paperless Society" will never happen. Automated Teller Machines | |
| provide consumers with 24-hour access to cash-sources. By simply | |
| inserting a plastic card into the machine and keypadding-in the | |
| owners' "account password", you can access the owners bank account | |
| and receive cash in-hand. This file will explain some details of | |
| the automated tellers and the plastic card used by the Teller-system. | |
| The automated teller is connected by wires and cables to a "Main | |
| Computer". During each transaction the teller sends signals to | |
| the main computer. The main computer records each transaction | |
| (a deposit or withdrawl) and updates the card-holders account. | |
| It also sends 'approval' or 'denial' signals to the ATM in regard | |
| to the transaction requested. If a card-holder attempts to withdraw | |
| $150.00 from his account and he has only $100.00 in it, the main | |
| computer will tell the ATM to deny the transaction. | |
| The ATM has 2 compartments to store cash in. The first is the "deposits" | |
| compartment. This is a small area that receives the daily deposits. | |
| It is located in the upper-part of the machine, near all the mechanical | |
| devices. However, because most ATM transactions are withdrawls the | |
| complete bottom-half is filled with cash where the withdrawls are | |
| extracted from. | |
| The plastic card inserted into the machine is the same size as a | |
| credit card. The front of the card is embossed with information | |
| about the card-holder. The back-side of the card has a thin strip | |
| of magnetic tape which also holds some important information. | |
| +--------------------------+ +--------------------------+ | |
| ] CIRRUS ] ]--------------------------] | |
| ] INSTANT CASH CARD ] ]/////(magnetic strip)/////] | |
| ] ] ]--------------------------] | |
| ] Acct: 12345675 Exp. ] ] ] | |
| ] Joe Schmoe 01/91 ] ] "card-holders signature" ] | |
| ] ] ] ] | |
| +--------------------------+ +--------------------------+ | |
| Front-side Back-side | |
| When a cardholder inserts his card into the machine and requests a | |
| transaction, the machine reads the embossed information from the | |
| front-side and compares it with the data stored on the magnetic | |
| strip; looking for a 'match' of the information on both sides. | |
| The information on the front-side is easily readable with your | |
| eyes. However, you can not read the data on the magnetic-strip | |
| so easily. You may ask , "What is stored on the magnetic strip ?". | |
| The answer is; the same information as the embossing plus some | |
| 'confidential' information regarding the cardholders' financial | |
| status is stored there. The magnetic strip has 3 "tracks" on it. | |
| The first track can store 210 BPI (Bytes per inch), and the second | |
| stores 75 BPI, and the third stores 210 BPI. So, we have: | |
| +---------------------------+ | |
| Track 1: (210 BPI density) | |
| +---------------------------+ | |
| Track 2: ( 75 BPI density) | |
| +---------------------------+ | |
| Track 3: (210 BPI density) | |
| +---------------------------+ | |
| THE MAGNETIC STRIP | |
| Now, here's the information stored on each track of the strip in | |
| my example: | |
| Track 1: " ;B 12345675 ^ Schmoe/Joe ^ ; LRC " | |
| Track 2: " ;12345675 01/91 ^ 1234 ^ (discriminate data) ; LRC " | |
| Track 3: " ;12345675 ^ 01/91 ^ 5 (discriminate data) ; LRC " | |
| Here's the decoding of the above information: | |
| Track 1: ";" = Beginning of the data character | |
| "B" = Field-Control Character: I believe this character | |
| tells the ATM what type of account (or status) | |
| the user has. | |
| "12345675" = This is the account number of the cardholder. | |
| "^" = Data-field seperator. | |
| "Schmoe/Joe" = Last/First name of cardholder. | |
| "^" = Data-field seperator. | |
| ";" = End of data character. | |
| "LRC" = Longitude Redundancy Check (end of track character). | |
| Track 2: ";" = Beginning of data character | |
| "12345675" = Account number of the cardholder. | |
| "01/91" = Month/Year the card expires. | |
| "^" = Data-field seperator. | |
| "1234" = Process Identification Number (The cardholders 'password', | |
| I think... or it could be a number to verify the | |
| the transaction between the ATM and the Main Computer). | |
| "^" = Data-field seperator | |
| "(dscrmn. data)" = Discriminate Data. Not much is known exactly what is | |
| stored here. Perhaps Bank Identification data or | |
| bank account type (savings, checking?) ? | |
| ";" = End of data character. | |
| "LRC" = Longitude Redundancy Check. | |
| Track 3: ";" = Beginning of data character. | |
| "12345675" = Account number of the cardholder. | |
| "^" = Data-field seperator. | |
| "01/91" = Month/Year the card expires. | |
| "^" = Data-field seperator. | |
| "5" = The crypting-digit. When the transaction request | |
| is sent to the main computer, it is encrypted. | |
| This digit tells which encryption-key is used. | |
| "(dscrmn. data)" = A duplicate of the discriminate data stored on | |
| Track 2. | |
| ";" = End of data character. | |
| "LRC" = Longitude Redundancy Check. | |
| When the card is being processed the ATM tries to match the | |
| account number, expiration date and name stored on each track. | |
| The reason they duplicate data is for verification purposes. But, | |
| notice that the duplicate data is stored on different tracks, each | |
| having different recording densities. Once the information on the | |
| tracks are confirmed to match, the ATM compares them to the embossed | |
| information on the front-side. If all of the information matches | |
| then the transaction will proceed. If it doesn't match, then the card | |
| is considered to be damaged and the ATM will keep the card. It will | |
| give the cardholder a piece of paper instructing the user to notify | |
| the bank who issued his ATM-card so he can receive a replacement | |
| card in the mail (this process takes about 3 weeks). | |
| Now that you know how the ATM-system is designed and what information | |
| is kept where on the card, what "security defects" does this system | |
| contain ? I will outline 4 methods of attacking this system that | |
| have been tried (not by me!). | |
| 1) Vandalization: If you want, you can break-in to the ATM. | |
| However, most ATM's contain 'sensor' devices which sound an | |
| alarm when this is tried. Therefore, if you're going to try | |
| this method I do not suggest using a hammer and chisel on the | |
| ATM because it will take 1/2 an hour to get the machine open | |
| and by that time the police will be there. You could try a | |
| much faster way, dynamite; but that might scatter the money | |
| all-over, making it hard to collect. Also, the bottom-half | |
| is where most of the money is stored (unless you happen to | |
| choose a machine that has issued all of its withdrawl-cash) | |
| so you'll want to break into the bottom-half of the ATM. | |
| In relation to this, you could wait outside the ATM for a | |
| valid-user to complete his withdrawl-transaction and mug him. | |
| As far as I know, the bank holds no responsibilty for placing | |
| the ATM in a 'secure' enviroment. However, usually they will | |
| have lights nearby and placed in 'reasonable' places where | |
| people need money (example: Grocery store) and where the chance | |
| of mugging is slim. | |
| 2) Physical Penetration: There are several ways of doing this. | |
| If you have a stolen card, you could randomly try guessing his | |
| account-password. But, I feel this is a primitive method. | |
| If you try too many attempts at guessing the 'password', | |
| the ATM will return the card to you. But, your attempts | |
| *might* be recorded in the central computer; allowing the | |
| bank to decide whether to cancel that card... However, | |
| this has not been verified by me. If you do get a cash-card, | |
| you can make counterfeit-cards. | |
| A) Counterfiet ATM-cards: The same method for producing | |
| counterfiet credit cards applies to ATM-cards. If you | |
| have a valid ATM-card you can 'clone' it simply by embossing | |
| a blank-card with the same information. Copying the mag- | |
| netic strip is also easy. To do this, you place a blank | |
| strip of the magnetic tape on top of the valid magnetic | |
| strip. Then, using an iron on low-heat, gently rub the | |
| iron across the two strips for a few seconds. Lastly, | |
| peel the new strip apart from the valid one and you've | |
| got a copy of all the data from the valid ATM-card. | |
| B) Also, I've heard a case where some guys had a machine | |
| that could read and write to the magnetic strips (probably | |
| they were employees of a company that produces the ATM-cards). | |
| Using this machine, they were able to create and change | |
| existing data on ATM-cards (such as the expiration date | |
| so they could keep using the same card over a long period | |
| of time). | |
| In relation to this there are other devices available that | |
| can read and write to magnetic strips. Using your own | |
| microcomputer, you can buy a device that allows you to | |
| read and write to these magnetic strips. It looks | |
| similar to a disk drive. If you're interested in | |
| exploring this method, I'll suggest that you contact | |
| the following company: | |
| American Magnetics Corporation | |
| 740 Watsoncenter Road | |
| Carson, California 90745 | |
| USA | |
| 213/775-8651 | |
| 213/834-0685 FAX | |
| 910-345-6258 TWX | |
| C) WARNING: During each transaction attempted on an ATM a | |
| photo of the person requesting the transaction is taken. | |
| How long this film is stored is unknown, but it probably | |
| is different for each bank (unless there is a federal | |
| regulation regarding this). Also, it is possible that | |
| this is not done at all ATMs. | |
| 3) "Insider" Theft: The above case also crosses over into this | |
| section. The biggest 'security leaks' in any company are | |
| its employees. This is also the easiest way to steal money | |
| from ATMs. The man who collects the deposits from the machine | |
| and inserts cash for withdrawls has the easiest and most | |
| open access to these machines. I was told that this person | |
| can easily steal money from ATMs and not be detected. Another | |
| person with access to these machines is the technician. The | |
| technician who fixes ATMs is the most-knowledgeable person | |
| about ATMs within the bank, therefore he should be a trust- | |
| worthy guy and receive a 'comfortable' salary.. otherwise | |
| he'll begin to collect 'retirement benefits' from the ATM | |
| and this may go undetected. | |
| However, I have heard of some embezzlement-cases involving ATMs, | |
| so I think it's not as easy as it seems. It's only common sense | |
| that a bank would account for every dollar of every transaction. | |
| Whether the accounting is done inside the ATM or the main | |
| computer doesn't make a difference... some form of accounting | |
| is *probably* done. | |
| 4) Data-link Intercept: This method has been very successful. What | |
| you do is 'tap' into the wires that connect the ATM to the Main | |
| computer. By doing this you can intercept and send signals to | |
| the ATM. However, some 'inside information' is needed because | |
| the transmission is encrypted (refer to the Cryptography Digit | |
| stored on the magnetic strip). But, I think you don't need to | |
| know *everything* being transferred. You should need to know | |
| when to send the 'approval' signal to the ATM telling it to | |
| dispense its' cash. I read a case (it may be in Phrack World | |
| News; 1985?) where some guys netted $600,000 from various ATMs | |
| using this method. This seems to be one of the better, and | |
| more ingenious methods of stealing from these machines. | |
| The information in this file should be 'adequate' to introduce you | |
| to how ATMs work. How did I get this information? I went into a | |
| bank and inquired about the computer-technology of ATMs. The man | |
| who was responsible for the ATMs was a bureaucrat and actually knew | |
| very little about the 'guts' of ATMs. Luckily the ATM-technician | |
| was there that day and I agreed to buy him dinner later that evening. | |
| (Please refer to: "Insider" Theft and the principle of Company-Loyalty). | |
| During the dinner at "Toppers" (a neat 1950's Burgers/Milkshake/Beer | |
| restaurant) he provided me with Operation and Repair manuals for the | |
| ATMs. I feel this information is well-worth the $3.82 dinner and | |
| will be of some value to its' readers. Some good information was | |
| screened-out due to its 'delicate nature', but the information I've | |
| provided has been confirmed. | |
| +---------+ | |
| ] CREDITS ] | |
| +---------+ | |
| The Mentor (Phrack #8, File #7; "Fun with Automatic Tellers") | |
| Deserted Surfer | |
| Hyudori | |
| Lex Luthor | |
| Please distribute this file in its complete form. | |
| _______________________________________________________________________________ | |