Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Credit Card Skimmers and Shimmers: Everything You Need to Know to Stay Safe

Scammers can steal your credit and debit card information whenever you swipe using legit-looking devices. We tell you what need to know about these rare, but nasty, attacks.

By Max Eddy
& Kim Key
Updated October 12, 2023
ATM (Credit: PCMag)

Have you ever thought about how woefully insecure credit and debit cards are? Try this experiment: Plug a USB magnetic strip reader into a computer, open a word processor, swipe a credit card, and boom—you just stole your own card information. It's that easy.

Now consider that the same technology comes in faster and smaller forms. Tiny "skimmers" can be attached to ATMs and payment terminals to pilfer your data from the card's magnetic strip (called a "magstripe"). Even smaller "shimmers" are shimmed into card readers to attack the chips on newer cards. There's now also a digital version called e-skimming, pilfering data from payment websites.

Worried? The first step to defending yourself from these scammers is to understand more about them. Read on for a complete rundown of the ways they attempt to steal your information—and your money.


What Are Skimmers?

Skimmers are tiny, malicious card readers hidden within legitimate card readers that harvest data from every person who swipes their cards. After letting the hardware sip data for some time, a thief will stop by the compromised machine to pick up the file containing all the stolen data. With that information, he can create cloned cards or just commit fraud. Perhaps the scariest part is that skimmers often don't prevent the ATM or credit card reader from functioning properly, making them that much harder to detect.

Getting inside ATMs is difficult, so ATM skimmers sometimes fit over existing card readers. Most of the time, the attackers also place a hidden camera somewhere in the vicinity in order to record personal identification numbers, or PINs, used to access accounts. The camera may be in the card reader, mounted at the top of the ATM, or even in the ceiling. Some criminals go so far as installing fake PIN pads over the actual keyboards to capture the PIN directly, bypassing the need for a camera.

Automatic teller machine
The yellow part attached to the ATM's card reader slot is a skimming device (Credit: PCMag)

This picture is of a real-life skimmer in use on an ATM. Do you see that weird, bulky yellow bit? That's the skimmer. This one is easy to spot because it has a different color and material than the rest of the machine, but there are other tell-tale signs. Below the slot where you insert your card are raised arrows on the machine's plastic housing. You can see how the grey arrows are very close to the yellow reader housing, almost overlapping. That is a sign a skimmer was installed over the existing reader since the real card reader would have some space between the card slot and the arrows.

ATM manufacturers haven't taken this kind of fraud lying down. Newer ATMs boast robust defenses against tampering, sometimes including radar systems intended to detect objects inserted or attached to the ATM. However, one researcher was able to use an ATM's onboard radar device to capture PINs as part of an elaborate scam.


Are Skimmers Still a Threat?

While researching for this article, PCMag reached out to Kaspersky Labs, and company representatives said something surprising: skimming attacks were on the decline. "Skimming was and still is a rare thing," said the Kaspersky spokesperson.

The Kaspersky representative cited EU statistics from the European Association for Secure Transactions (EAST) as indicative of a larger trend. The EAST reported a record low in skimmer attacks, dropping from 1,496 incidents in April 2020 to 321 incidents in October of the same year. The effects of COVID-19 might have something to do with that drop, but it's nonetheless dramatic.

That doesn't mean skimming has gone away, of course. In January 2021, a major skimming scam was unearthed in New Jersey. It involved attacks on over 1,000 bank customers, with criminals attempting to make off with over $1.5 million. 


From Skimmers to Shimmers

When the US banks finally caught up with the rest of the world and started issuing chip cards, it was a major security boon for consumers. These chip cards, or EMV cards, offer more robust security than the painfully simple magstripes of older payment cards. But thieves learn fast, and they've had years to perfect attacks in Europe and Canada that target chip cards.

Instead of skimmers, which sit on top of the magstripe readers, shimmers are inside the card readers. These are very, very thin devices and cannot be seen from the outside. When you slide your card in, the shimmer reads the data from the chip on your card, much the same way a skimmer reads the data on your card's magstripe.

There are a few key differences, however. For one, the integrated security that comes with EMV means that attackers can only get the same information they would from a skimmer. In his blog, security researcher Brian Krebs explains that "Although the data that is typically stored on a card's magnetic stripe is replicated inside the chip on chip-enabled cards, the chip contains additional security components not found on a magnetic stripe."

Thieves couldn't duplicate the EMV chip, but they could use data from the chip to clone the magstripe or use its information for some other fraud. The Kaspersky representative I spoke to was unequivocal in their confidence in chip cards. "EMV is still not broken," Kaspersky told PCMag. "The only successful EMV hacks are in lab conditions."

The real problem is that shimmers are hidden inside victim machines. The shimmer pictured below was found in Canada and reported to the RCMP. It's little more than an integrated circuit printed on a thin plastic sheet. 

Shimmer circuitry on a tiny plastic card
Shimmer circuitry on a tiny plastic card (Credit: Coquitlam RCMP)

3 Ways Avoid Online Credit Card Skimming

Not surprisingly, there's a digital equivalent called e-skimming. The 2018 British Airways hack apparently relied heavily on such tactics

As Bogdan Botezatu, Director of Threat Research and Reporting at Bitdefender, explained, e-skimming is when an attacker inserts malicious code into a payment website that snatches away your card information. 

"These e-skimmers are added either by compromising the online store’s administrator account credentials, the store’s web hosting server, or by directly compromising the [payment platform vendor] so they will distribute tainted copies of their software," stated Botezatu. This is similar to a phishing page, except that the page is authentic—the code on the page has just been tampered with.

"E-skimming attacks are increasingly becoming adept at evading detection," said Botezatu. "The more time an attacker maintains this foothold, the more credit cards they are able to collect."

It's Surprisingly Easy to Be More Secure Online
PCMag Logo It's Surprisingly Easy to Be More Secure Online

Combating this type of attack is ultimately up to the companies who run these stores. Below are a few things you can do to protect yourself:

1. Use Security Software

Botezatu suggested that consumers use security suite software on their computers, which he said can detect malicious code and prevent you from entering your information. 

2. Use a Fake Credit Card Number Online

You can avoid entering your credit card information altogether by using a virtual credit card. These are dummy credit card numbers that are linked to your real credit card account. If one is compromised, you won't have to get a new credit card just generate a new virtual number. Some banks, like Citi, offer this as a feature, so ask your bank if it's available. If you can't get a virtual card from a bank, Abine Blur offers masked credit cards to subscribers, which work in a similar way. Apple Pay and Google Pay are also accepted on some websites, too.

3. Activate Alerts for Your Credit Card Accounts

Some banks will send a push alert to your phone each time your debit card is used. This is handy since you can immediately identify bogus purchases. If your bank supplies a similar option, try turning it on. Personal finance apps like Mint.com can help ease the task of sorting through all your transactions.


Stay Aware to Stop Credit Card Scammers

Even if you do everything right and go over every inch of every payment machine you encounter (much to the chagrin of the people behind you in line) you can be the target of fraud. But take heart: As long as you report the theft to your card issuer (for credit cards) or bank (where you have your account) as soon as possible, you will not be held liable. Your money will be returned. Business customers, on the other hand, don't have the same legal protection and may have a harder time getting their money back. Click here to check out our guide to stopping ATM scammers in their tracks.

Pay attention to your credit card statements and act quickly if you find charges you don't recognize. If something doesn't feel right about an ATM or a credit card reader, don't use it. Whenever you can, use the chip instead of the strip on your card. Your bank account will thank you.

Fahmida Y. Rashid contributed to this story

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

Table of Contents

TRENDING

About Max Eddy

Lead Security Analyst

Since my start in 2008, I've covered a wide variety of topics from space missions to fax service reviews. At PCMag, much of my work has been focused on security and privacy services, as well as a video game or two. I also write the occasional security columns, focused on making information security practical for normal people. I helped organize the Ziff Davis Creators Guild union and currently serve as its Unit Chair.

Read Max's full bio

Read the latest from Max Eddy

About Kim Key

Security Analyst

As a PCMag security analyst, I report on security solutions such as password managers and parental control software, as well as privacy tools such as VPNs. Each week I send out the SecurityWatch newsletter filled with online security news and tips for keeping you and your family safe on the internet. 

Before joining PCMag, I wrote about tech and video games for CNN, Fanbyte, Mashable, The New York Times, and TechRadar. I also worked at CNN International, where I did field producing and reporting on sports that are popular with worldwide audiences. Yes, I know the rules of cricket.

Read Kim's full bio

Read the latest from Kim Key