2025 ICBC Pub. 4 Issue 3

ATM security requires more than just traditional surveillance. A comprehensive strategy involves real-time monitoring, intelligent analytics and proactive threat detection to address a variety of vulnerabilities. The following are some of the common threats and how they can be mitigated through a layered security approach: • Hook and Chain, Physical Attacks: These involve brute force attempts to physically extract cash from terminals. Reinforced hardware and physical protections help deter these types of attacks. • Card Skimming and Cash Harvesting: Criminals use devices to illegally capture card data or access cash. Anti-skimming technologies and secure software protocols can reduce this risk. • Regulation E Claims: In cases of disputed transactions, security systems can support compliance efforts by providing transaction data and video verification. • Terminal Jackpotting: This involves manipulating terminal software to fraudulently dispense cash. Monitoring for software anomalies and applying security patches regularly helps prevent this. • External Dispenser Manipulation: Criminals may attempt to tamper with cash dispensing mechanisms. Hardware protections and tamper detection can alert institutions to these risks. By Levi Daily, CTO Cook Solutions Group, ICBC Associate Member A Layered Approach to ATM Security 28 | INDEPENDENT REPORT

RkJQdWJsaXNoZXIy MTg3NDExNQ==