GPS used to locate a gang using gas pump skimmers

Law enforcement identifies and located suspects members of a criminal organization that used gas pump skimmers, by using the GPS technology.

The number of attacks against ATMs located in supermarkets and Gas pumps is constantly increasing, the crooks use credit and debit card skimmers that use different technologies to steal card data and steal them.

Today I desire to comment with you an interesting case presented by the popular investigator and blogger Brian Krebs, who explained how law enforcement has used GPS technology to track a criminal crew that was targeting gas pumps to steal credit and debit card data.

The phenomenon is very common in the US where many groups of criminals are exploiting electronic equipment specifically designed to secretly attach to gas pumps and steal the precious information.

There are various models of skimmers to steal data from gas pumps, including gas pump skimmer equipped with the Bluetooth technology. In January 2014, US prosecutors have charged 13 members of a criminal gang accused of stealing $2 million from customers,  the gang used a Bluetooth-enabled skimmers hidden inside pump ATMs.

Unlike normal ATM skimmers, skimming devices used to steal card data from gas pumps, are impossible for customers to spot because they are hidden inside the pump mechanism.

Recently, a law enforcement inspected 6,100 gas stations in Florida uncovering skimmers at 81 locations, to see a list of locations where the skimmers were found, click here

The investigation described by Krebs was conducted by the California police department that used a cheap GPS tracking device to follow the movements of the criminals that installed the skimmers. The agents, once discovered the skimmers hidden in the gas pump, have modified it by adding a GPS tracker that allowed them to follow crooks when they returned to remove the skimmer.

One morning last year the Redlands, California police department received a call about a skimming device that was found attached to a local gas pump. This wasn’t the first call of the day about such a discovery, but Redlands police didn’t exactly have time to stake out the compromised pumps. Instead, they attached a specially-made GPS tracking device to the pump skimmer.” wrote Krebs.

At around 5 am in the next morning the police tracked the movement of the skimmer device that they have tampered by inserting the GPS module. The police were able to locate and identify the criminals, the gang was in posses of many other similar devices that it was used by the member of the organization.

The U.S. Justice Department‘s “COPS Office” reported that the operation allowed law enforcement at the Redlands PD to resolve the case, the department used the GPS technology in many other cases to solve other crimes and arrest nearly 139 suspects.

GPS technology allowed law enforcement to arrest suspects committing armed robberies, vehicle burglary, robberies, object theft (i.e. Laptops and bikes) and much more.

This victory for law enforcement is a partial as important success of a difficult war,  in my opinion, it is easy to predict that more advanced group of criminals will foil the GPS used by law enforcement with GPS win of law enforcement is a partial as important success of a difficult war,  in my opinion, it is easy to predict that more advanced group of criminals will foil the GPS used by law enforcement with GPS jamming devices.

Let me close suggesting you to read a very interesting post, titled All About Skimmers, wrote by Brian Krebs about skimmer technologies.

Pierluigi Paganini

(Security Affairs –  pump skimmers, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

10 mins ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

12 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

18 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

1 day ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

2 days ago

This website uses cookies.