iTnews

Phone bug discovered in Aussie bank branch

By Darren Pauli, SC Magazine on Aug 29, 2011 1:42PM
Phone bug discovered in Aussie bank branch

Cleaner installed wiretap to steal card numbers and PIN numbers.

A major Australian bank has discovered a telephone bug [pictured below] installed inside a branch, being used to siphon the credit and debit card information of unwitting consumers.

The meticulously handcrafted device, smaller than the palm of a hand, was pinned carefully to telephone cable that ran along the carpet floor of the bank's metropolitan branch office.


Two inconspicuous cuts were made in the wire to attach the bug. It would listen for keypad tones as unsuspecting customers keyed in their PIN numbers at the automatic teller.

Each tone woke the device from slumber, which it diligently broadcast over a handpicked radio frequency.

The attacker waited in the bank’s carpark and recorded the tones on a laptop. Each tone was then matched to a number, revealing the customer’s PIN.

Corresponding card information was also being copied and stored. The brazen attacker had swapped the terminal on the teller's desk with a skimming device that was capturing enough bank data for replica cards to be manufactured.

The thief needed only match the time signatures at which the card and PIN number were swiped to have unfettered access to potentially hundreds of accounts.

Navid Sobbi, the phone interception expert who busted the scam, held a professional respect for the effort put into the bug.

“It was a work of art,” Sobbi said. “It is one of the best made and tidy bugs I have come across.”

The device was fully sealed save for an exposed screw head which was used to tune the radio frequency over which the PIN numbers were broadcast.

A cleaner was found to have installed both the bug and the skimming device.

“It’s almost always the cleaners,” Sobbi said, speaking of the dozens of interception cases he has foiled this year. “They have the access and are the most vulnerable – they often stand to make a lot of cash and that’s tempting considering they might not be paid a lot.”

However, the bug wasn’t the most sophisticated Sobbi had encountered.

He had recently stumbled on a government military-grade interception device installed in the bedroom of a residential property. The device transmitted captured audio via microwave links and was instantly recognisable as a government plant.

It was deactivated, but Sobbi’s bug hunting kit was able to identify particular metallic components inside the device.

In another case, Sobbi took a call from a client concerned that an office had been wiretapped.

During the drive to the property, Sobbi was called by police to cease and desist: the client had phoned Sobbi to request the search within proximity of the bug. That tipped off police who soon after raided the premises.

“If you ever suspect a phone bug,” Sobbi said “don’t talk about it if you are within range.”

Though 20 percent of Sobbi's work involved searching for suspected bugs, this year he had also found several hidden cameras and keyloggers implanted on the backs of computers.

Lasers had in some cases been used to listen in on corporate meetings, a ploy ultimately foiled by a mock meeting Sobbi established to detect the location of the laser.

“With enough tweaking, even a whisper can be heard,” Sobbi said of the laser.

Most of Sobbi’s cases involved suspected espionage. His team of six within National Surveillance and Intelligence serviced big business like Australia’s mining giants, government agencies and law firms. The company regularly performed “bug sweeps” of conference rooms ahead of sensitive meetings.

Sobbi also ran forensic scans of mobile devices with the same equipment used by police.

This service was a favourite of lawyers, big business and individual clients who suspected foul play by staff and partners.

“When staff leave, companies often want to know if incriminating text messages or phone calls were sent," he said. "Husbands and wives also want to check out if their phone was tampered or tracking software had been installed.”

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
banking crime financeit interception security wiretap

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Ensure your e-signatures are legally binding
Ensure your e-signatures are legally binding
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • Beat the DDoS blackmailers in 2021
By Darren Pauli, SC Magazine
Aug 29 2011
1:42PM
0 Comments

Related Articles

  • CBA builds container-as-a-service platform on AWS, Kubernetes stack
  • NAB ramps up control of privileged system access
  • NAB launches digital receipts with Slyp
  • BoQ sticks to timeline for new Virgin Money Australia core
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

Tyro halts trading following week-long outage

Tyro halts trading following week-long outage

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.