Boardman Police are trying to find out who attached a skimmer to a credit card reader at the checkout line of a township grocery store.
A police report doesn’t name the store but gives its address as 4121 South Avenue.
When a customer noticed that the cover on the credit card reader appeared to be “loose”, the cashier immediately recognized that a skimmer had been placed on the device.
Skimmers are used by criminals to steal financial data and other information from unsuspecting consumers.
The skimmer was removed, the register was shut down, and the manager called the police and the credit processing company.
The manager told police that since cashiers have been told to check daily for skimmers, it’s likely that the skimmer was placed earlier that same day.
At the time the police report was filed, the manager said there had been no reports from customers whose credit information had been compromised.
Store officials will review the security video to see if they can find out who installed the skimmer.
The FBI says skimmer devices are illegally installed on or inside ATMs, point-of-sale terminals, or fuel pumps capture card data and record cardholders’ PIN entries.
Criminals use the data to create fake payment cards and then make unauthorized purchases or steal from victims' accounts. It is estimated that skimming costs financial institutions and consumers more than $1 billion each year.
More FBI info on skimmers:
Fuel Pump Skimming
Fuel pump skimmers are usually attached to the internal wiring of the machine and aren’t visible to the customer. The skimming devices store data to be downloaded or wirelessly transferred later.
Tips When Using a Fuel Pump
Choose a fuel pump that is closer to the store and in direct view of the attendant. These pumps are less likely to be targets for skimmers.
Run your debit card as a credit card. If that’s not an option, cover the keypad when you enter your PIN. You should also examine the keypad before use for any inconsistencies in coloring, material, or shape. These inconsistencies might suggest that a foreign device (keypad overlay) is present.
Consider paying inside with the attendant, not outside at the pump.
Tap the card instead of swiping or inserting it when paying at the pump (if the card and terminal allow for it). Tap-to-pay transactions are more secure and less likely to be compromised.
If you think you’ve been a victim of skimming, immediately contact your financial institution.
ATM and POS Terminal Skimming
ATM skimmer devices are inserted in the card reader or otherwise installed within the terminal. However, some skimmer devices may fit over the terminal's card reader or be situated along exposed cables at freestanding ATMs (such as those found at convenience stores).
Pinhole cameras installed on or around ATMs record a customer's PIN entry. Pinhole camera placement varies widely.
In some cases, keylogging keypad overlays are used instead of pinhole cameras to records PINs. These overlays record a customer’s keystrokes.
POS skimming devices, such as those capturing EBT card data, are generally designed as overlays to the POS terminal and have wireless transmission capabilities. These may be present in any market, convenience store, or retailer.
It only takes seconds to install a skimming device. Fraudsters may seek to distract store clerks—such as by requesting items from behind the counter—to accomplish this.
Skimming devices store data to be downloaded or wirelessly transferred later. Some of these devices transmit the data wirelessly in real time to nearby devices.
Electronic Benefits Transfer (EBT) Card Skimming
EBT card data has become a key target for many skimming groups and criminals since at least 2021, through card skimming and other tactics.
“ATM skimming” is placing an electronic device on an ATM that scoops information from a bank card’s magnetic strip whenever a customer uses the machine. ATM skimming is a growing criminal activity that some experts believe costs U.S. banks hundreds of millions of dollars annually.
EBT and some other types of public-benefits cards are an appealing target for bad actors because they largely aren't chip-enabled. Embedded microchips secure customer payments far better than magnetic stripes. The lack of chips on benefits cards make it far easier for bad actors to compromise them and “cash out." (As of early 2024, no state’s EBT cards had an embedded chip, though a few states are working toward this goal.)
Additionally, some complicit retailers have facilitated the compromise and cash-outs of this card data, further exacerbating the problem.
Criminals typically cash out EBT cash benefits (those available for withdrawal at ATMs) right after these accounts receive monthly funding. This often occurs between midnight and 6 a.m. the day the benefits become available.
Criminals also often cash out Supplemental Nutritional Assistance Program (SNAP) between the first and tenth of the month. They do this through bulk purchases of readily marketable items like baby formula, energy bars and drinks, cooking oil, and candy items.
EBT cardholders generally have limited protections compared with holders of common credit and debit cards. As a result, they may not be reimbursed fully or at all for benefits lost to criminals. This, in turn, can compound their existing financial hardships. Reimbursement—when it does occur—may take weeks.
Tips When Using an ATM or POS Terminal, Including for EBT
Inspect ATMs, POS terminals, and other card readers before using. Look for anything loose, crooked, damaged, or scratched. Don't use any card reader if you notice anything unusual.
Pull at the edges of the keypad before entering your PIN. Then, cover the keypad as fully as possible when you enter your PIN to prevent cameras from recording your entry. Keep in mind that a pinhole camera may be present anywhere on or around the terminal.
If possible, use ATMs in a well-lit, indoor location. These may still be compromised, but are less-vulnerable targets.
Be especially alert for skimming devices in tourist areas, since these are popular targets.
When possible, use debit and credit cards with chip technology. There are fewer devices in the U.S. that steal chip data than magnetic strip data. However, the mag-stripe data on the backs of these cards is still vulnerable.
Avoid using your debit card when you have linked accounts, since the card's compromise will give criminals access to all of the accounts. Use a credit card instead.
Routinely monitor your credit card, bank, EBT, or other benefits accounts to promptly identify any unauthorized transactions. If possible, set email or text message alerts to notify you of card or account transactions.
Proactively review the account-security options available for any payment cards you use. These options can include multi-factor authentication of transactions or freezing an account between your own transactions. Such steps may seem inconvenient, but they significantly reduce the risk of financial losses.
Contact your financial institution immediately if the ATM doesn't return your card after you end or cancel a transaction. This may suggest the presence of a foreign device in the card reader.