What is Card Skimming?
Card skimming is the stealthy theft of payment card data—typically magstripe tracks—from ATMs, fuel
pumps, and POS terminals. Crooks insert shims into chip readers, place overlays on keypads to capture PINs, and conceal
micro cameras. Captured data can be used to manufacture cloned cards or fuel card‑not‑present fraud.
Signals: terminals with abnormal error rates, bursts of disputes all linked to a single merchant or location,
and account holders reporting “card present” fraud after visiting a certain store. Retailers report
reconciliation gaps and spikes in brief authorization volume before issuers can cut it off.
Mitigation: update terminals, inspect and seal points of hardware interaction, enforce tamper‑evident mechanisms
and rotate staff that service or maintain equipment, and alert for anomalous activity windows (e.g., late‑night bursts).
Collaborate with acquirers to rapidly blacklist terminals when skimming is detected. For ecommerce touchpoints potentially
downstream from the impact, harden your payment defenses (see payment fraud prevention) and add reason‑coded evidence for representment. If skimming data is being used to open or modify accounts,
double down on identity verification to prevent lateral abuse.
Skimming prospers in low maintenance environments. Hardware hygiene and vigilant monitoring close the front
door.