That way, temporary employees could switch out their usual device with the phony one and, once they left, they'd have all the decrypted card data and PINs they could get their hands on. The sellers pitch, as discovered by Brian Krebs: "POS is 'fake' and stores D+P [card data and PIN], prints out approved receipt or can be setup for connection error. Software to decrypt the data is provided. It keeps d+p inside memory for manual retrieval via USB cable."

Advertisement

2013

Then, it was the gas pump's turn. In 2013, a series of scams in Oklahoma saw thieves take home $400,000 from a chain of Murphy's gas stations before they were eventually caught. The thieves used a card skimmer and fake PIN pad overlay to obtain the necessary information.

Advertisement

Image via MyFox9

What's more, these skimmers used Bluetooth-enabled devices that sucked power from the pumps themselves. That means they could run indefinitely, and allow remote access to the data they collected; once it was installed, the thieves would never need touch the skimmer again.

Advertisement

While most skimmers were getting small beyond belief, others took the opposite approach. The "skimmer" below is actually an entire fake ATM cover that was stacked on top of an already existing machine in Brazil.

Advertisement

Image via Krebs on Security

The elaborate device appears to be powered by a disassembled laptop, screen and all.

Advertisement

2014

Something that large obviously isn't quite as viable as a smaller, more discreet option, which is what you're most likely to fall victim to today, like the razor-thin ATM skimmer uncovered just earlier this week.

Advertisement

Image via Krebs on Security

Here, all it took was a watch battery, a tiny storage device, and what we assume was little more than a few minute spent messing around with the ATM itself. As you can see from the video below of scammers installing and removing skimmers, it doesn't take much time at all.

Fortunately, manufacturers are working on ways to stop these fiends before they can get their claws into your data. But as we've seen, it doesn't take long for crooks to adapt to the same tech meant to fend them off.

Advertisement

So what can you do to stop this from happening to you? Always, always cover the keypad when entering your PIN; the majority of setups use a camera to capture the final puzzle piece. And while the US is finally embracing so-called "chip-and-pin" credit card systems (which can certainly help cut back on current skimmers' effects), those will bring with them a whole new set of problems.

So if anything on any credit or ATM card-reader looks suspicious to you, better to be safe and pass it up. You never know what crazy camouflage they'll cook up next.