Attacker Install Skimmers On Bank of the West Debit Cards

Share post:

An investigation into a suspicious withdrawal attempt in 2021 found that an attacker had installed skimmers on several Bank of the West ATMs.

The ATM skimmer is used to forge clone cards that work like the real ones, allowing attackers to empty bank accounts in one go.

“The ATM skimming device that was installed interfered with the normal debit card transaction and allowed the theft of your card number, the PIN number associated with your card, and possibly your name and address. This stolen information may have been used to create fake debit cards and attempt cash withdrawals,” the bank’s notice to compromised customers states.

In notifying customers of the findings of the investigation, the bank noted that it immediately stopped fraudulent use of stolen card information and actively monitored all accounts deemed to have been compromised.

The bank also said it had blocked the debit cards of compromised customers, who will receive a new debit card and PIN. The bank will offer free credit monitoring and identity theft protection services to all affected customers for a year.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Microsoft reveals critical security flaw affecting Android apps

Microsoft has identified a serious vulnerability in Android apps that could allow malicious software to hijack legitimate apps...

Chinese government websites “Riddled with security flaws” say researchers

A recent study conducted by researchers from the Harbin Institute of Technology reveals significant security issues plaguing Chinese...

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways