Auto Teller Machine (ATM) Fraud - Case Study of A Commercial Bank in Pakistan
Auto Teller Machine (ATM) Fraud - Case Study of A Commercial Bank in Pakistan
Auto Teller Machine (ATM) Fraud - Case Study of A Commercial Bank in Pakistan
net/publication/269849725
CITATIONS READS
6 8,722
2 authors, including:
Aijaz A. Shaikh
University of Jyväskylä
53 PUBLICATIONS 1,331 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Aijaz A. Shaikh on 18 February 2015.
Received: August 5, 2012 Accepted: September 19, 2012 Online Published: October 24, 2012
doi:10.5539/ijbm.v7n22p100 URL: http://dx.doi.org/10.5539/ijbm.v7n22p100
Abstract
ATM occupies an important position in the e-Banking portfolio. It has given the consumers a quality of life
allowing them to access cash and other financial information. Its role in promoting, developing and expanding
the concept of ‘Anytime Anywhere Anyplace” banking is undeniable. It offers a real convenience to those who
are on the run in their everyday life, but at the same time, it also carries a big element of risk.
In this paper we have investigated and demonstrated a mapping flaw (bug) in the ATM Controller (commonly
known as financial middleware), which allows the ATM card holders of various banks to fraudulently withdraw
cash from the ATMs of ACB Bank Limited. The flaw remained undetected for nearly 3 months.
Since the breach has been thoroughly investigated, we, therefore, concluded that the banks’ internal control
system had failed to detect the implantation of mapping bug which deprived the bank of more than 21 million
Pakistani Rupees. In addition, lack of understanding of higher management on the systems & procedures
supporting ATM Infrastructure played a significant role in developing the bug.
Considering the nature of the fraud and the degree of losses incurred, this paper has recommended strong
internal controls implementation over the payment system applications. A detailed review of fraud screening
strategy is also recommended to ensure that the security tools are optimized for their particular product or service.
Turnkey ATM solution has also been recommended for the ACB Bank Limited.
Keywords: electronic banking, ATM fraud, mapping bug, ATM controller, internal controls, Pakistan
1. Introduction
Among the prominent financial touch-points, Automated Teller Machine (ATM) has been considered as one of
the important components of electronic banking infrastructure.
ATM is a terminal deployed by bank or other financial institutions, which enables the customers to withdraw
cash, to make a balance enquiry, to order a bank statement, to make a money transfer and/or to deposit cash. The
ATMs are basically self service banking terminals and are aimed at providing fast and convenient services to
customers (Rasiah, 2010).
ATMs provide different services to cardholders without the help of any bank employee or teller. All these
services have been segregated as financial and non-financial. A variety of payment cards such as Debit (Expense)
Cards, Credit Cards, Prepaid Debit Cards and recently introduced Remittance Cards can be used in Pakistan on
ATMs. Prominent services offered through ATMs are listed below in Table-1:
100
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
Considering their nature, the frauds perpetuated on ATMs and other E-Banking Channels have been divided
among different categories as mentioned in Table 2.
This paper discusses the ATM fraud which was perpetuated on one of the important components of ATM IT
Infrastructure i.e. ATM Controller of ACB Bank Limited.
1.1 ATM Controller
The ATM Controller famously known as Transaction Processing Switching or Financial Middleware is one of
the most important components in conducting electronic transactions. The first ATM Controller was introduced
in Pakistan by TPS Pvt. Limited in 1996.
The importance of the ATM Controller can be gauged from the fact that in 1990s and most part of 2000, almost
all the banks in Pakistan had distributed core banking systems and some banks still continue to operate in the
same fashion. These distributed core banking system applications were usually housed in bank branches and
once the branches are closed in the evening, the customer data in core banking is not available for any real-time
transaction. To overcome this challenge and to provide anytime, anywhere, anyplace banking facilities to
consumers, the ATM Controller was introduced.
In the banking environment, the controller sits between the Bank’s Core Banking Application, Bank’s delivery
channels i.e. Mobile Banking, Internet Banking, External networks/3rd Party Service Providers i.e. 1-Link, VISA,
MasterCard, Bill Payment Services, and Financial Touch Points i.e. ATMs, Kiosks, POS as depicted below.
As a middleware, the ATM Controller acquires electronic transactions from the Bank’s ATM and POS network,
process these transactions and then forward them to the host or issuer bank for authorization. After receiving
authorization, the acquirer bank ATM disburses the cash.
The next section discusses the Statement of Problem (Section-2), Research Methodology (Section-3), Literature
Review (Section-4), ATM Infrastructure in Pakistan (Section-5). Findings and Observations have been discussed
in Section-6 followed by the Conclusion and Recommendations, which have been discussed under Section-7.
Acknowledgement and References have been provided in Section-8 and 9 respectively.
101
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
2. Statement of Problem
In Pakistan, the ATM transactions are based on predefined and pre-allocated mapping codes ranging from 00 to
99 wherein ‘00’ code has been reserved for ‘cash withdrawal’ by all the banks. Accordingly, the ATMs and the
associated ATM Controllers have been configured on the parameters that does not allow ‘cash withdrawal’ from
ATM if any other code except for the ‘00’ is received from the issuer bank’s core banking application.
ATMs are always attached with ATM Controller when conducting inter-bank transactions involving two
different banks. Once the card holder of Bank-A (issuer bank) access the ATM of Bank-B (acquirer bank), the
ATM of Bank-B sends the card holder credentials to Bank-A for verification and authorization. This
communication is conducted through the ATM controller deployed at both Bank-A and Bank-B. After receiving
the authorization from issuer bank i.e. Bank-A, the ATM of acquirer bank i.e. Bank-B disburses the cash to
cardholder of Bank-A.
In this case study, we have investigated the presence of a mapping bug when the ATMs of ACB Bank Limited
started disbursing cash to the card holders of Bank-A having ‘zero’ or ‘insufficient’ balance in their bank
account. Despite of the fact that the Bank-A sent a rejection “06” code from its ATM controller to ACB Bank
ATM Controller, but due to the presence of a mapping bug, the ATM Controller of ACB Bank started reading
every code as ‘’00’ and disbursed the cash as depicted in the following diagram:
Figure 2. Flow of ATM transactios showing how the “06” was converted into “00” code by the ATM controller
of ACB bank limited
3. Research Methodology
The data for this paper was collected from different organizations including the ACB Bank Limited, the State
Bank of Pakistan (the central bank), technology partners and the ATM Switch operator. Internal bank reports,
documents and policy papers, the investigation reports prepared by the State Bank of Pakistan were thoroughly
checked and analyzed. The ACB bank premises were visited for conducting few interviews with the staff
working in its Information Technology Group.
The Central Bank guidelines, instructions and by-laws on ATMs along with the Payment Systems & Electronic
Funds Transfer Act 2007 were also collected and reviewed. The ‘Payment Systems Quarterly Review’ reports
published by the State Bank of Pakistan since Financial Year 2006 were collected, consolidated and analyzed.
In addition, exploratory research based on secondary data obtained through journals and Net was also included in
this case study.
4. Literature Review
Commercial banking is undergoing rapid change, as the international economy expends and advances towards
institutional and market completeness. A major force behind these developments is technology (Liano & Cheung,
2001). As further investigated by Ogbuji, Onuoha & Izego (2012), the converging forces of technology have
tremendously altered manual systems of delivering banking services and have subsequently paved way for
electronic delivery platforms in recent time. The ATMs is one of existing replacements of the cascading
labor-intensive transaction system affected through what is popularly referred to as paper-based payment
instruments.
E-Banking in general and ATMs in particular have given the consumers a quality of life allowing them to access
cash and other financial information. It offers a real convenience to those who are on the run in their everyday
life, but at the same time, it causes a big element of risk. The traditional banking risk, in some instances, are
102
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
magnified when banks offer 24/7 transactional websites. As banks move into this new territory, several
challenges arise in the context of banking risks (Pennathur, 2001).
Adepoju & Alhassan (2010) while analyzing the cases of ATM usage and fraud occurrences with some banks in
Nigeria discussed that consumers have come to depend on and trust the Automatic Teller Machine (ATM) to
conveniently meet their banking needs. In recent time there has been a proliferation of ATM frauds in the
country even and across the globe. Managing the risk associated with ATM fraud as well as diminishing its
impact are important issues that face financial institutions as fraud techniques have become more advanced with
increased occurrences. On the other hand, Agoyi and Seral (2010 have shared their concern on the growing
number of ATM frauds and have suggested using the SMS encrypted messages to authenticate the users to
improve ATM security against frauds and crimes.
ATM hacking is now on the rise with some organized and highly sophisticated attacks. This has now become a
real headache because both banks and customers are prone to heavy losses. Criminals are taking the battle a
stage further, by directly manipulating the software inside the ATMs to give them money (Bradbury, 2010).
Report on Global ATM Fraud (2007) published by ICMR has reported that the ATM frauds have evolved from
the conventional ‘trick of shoulder surfing’ to steal the PIN of customers at the ATM to more sophisticated
methods such as the Lebanese loops, use of electronic gadgets, card jamming, card swapping, diversions,
website spoofing, or phishing, ATM Burglary etc.
The first massive and seemingly coordinated fraudulent attack on ATM users was that may best be described as
the great phishing scam on 2007, in which fraudsters cloned the inter-switch website and sent wide reaching
notices to ATM cardholders to log on to the cloned website and re-register their payment cards by changing their
PIN. So daring was this attempt that notices were even pasted on the walls of bank premises. The fraudsters
succeeded in accessing the accounts of many cardholders and withdrew their money. This act of fraud was
chiefly successful because the magnetic stripe ATM card in use within the country in comparison to the Chip
(smart) cards (Chinedu, 2010).
Chip cards based on EMV technology has been considered as one of the most effective solutions to card
Skimming fraud until the same was successfully broken by a team of University of Cambridge students.
Murdoch, Drimer, Anderson & Bond (2010), in their paper has demonstrated a protocol flaw in Europay,
MasterCard and VISA (EMV) protocol. Because the authors have found and validated a practical attack against
the core functionality of EMV, they concluded that the protocol is broken.
Realizing the severity and the frequency of the ATM frauds, Diebold in their one of the white papers titled
‘ATM Fraud and Security-2012’ has reported that the ATM fraud is not confined to a particular region of the
world. As further reported, the card skimming was the most prevalent crime affecting ATMs in Europe. Card
skimming at ATMs resulted in losses of nearly 111 million Euros across Europe during the first half of 2011.
Card Skimmers are devices used by perpetrators to capture cardholder data from the magnetic stripe on the back
of an ATM card.
The commercial banks therefore need to deploy sufficient preventive controls to minimize the chances of frauds
and maintain the consumer trust on e-banking products and services.
Greene (2009) has defined the key areas of payment fraud. He segregated the fraud into two categories. There is
first-party fraud, which is the abuse of the account privileges by the account holders themselves, or the
acquisition or expansion of those privileges by deceitful means. There is also third-party fraud, which is often
identity fraud, or the abuse of one person’s account by another. Third-party fraud is what we usually think
when we consider fraud.
While investigating the risk management, security and controls in the context of ATMs, Rasiah (2010) has
described that the crime at ATMs has become a nationwide issue that faces not only customers, but also bank
operators. Security measures at banks can play a critical, contributory role in preventing attacks on customers.
These measures are of paramount important when considering vulnerabilities and causation in civil litigation and
banks must meet certain standards in order to ensure a safe and secure banking environment for their customers.
Based on a survey of bank corporate clients in Singapore, Rexha, Kingshott & Aw (2003) concluded that trust
was the key factor influencing the adoption of electronic banking. The trust, therefore, remained to the key factor
influencing the adoption of various e-banking channels and products offered by the banking industry. In addition,
ATM Security has been considered as one of the major concerns for regulators, financial institutions and service
providers.
103
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
Similarly, the total volume of ATM transactions in the e-banking infrastructure occupies a significant position.
Among the prominent e-banking channels, the total volume of ATM transactions stood at 86% percentage of the
total e-banking transactions in the country during financial year 2011 (Table-4).
104
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
105
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
106
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
Bank in identifying the fraudsters. Based on the evidences provided by the systems generated reports, the card
users were, however, identified and the respective issuing banks were contacted for the recovery of the stolen
money.
Job logs, which serves as an effective internal control, logs every event, changes in any system object and
sign-in / sign-off of every user along with date and time so that any unauthorized changes, if made, could easily
and timely be identified. By loosing job logs, evidence of changes in the system by authorized users would also
be lost.
Higher management at ACB bank seemed less concerned about the overall security and safety of e-banking
channels especially the ATMs, which otherwise would have avoided this fraud.
Few weeks after the incident, instructions on the ‘internal controls over ATM Support’ were issued by the
senior management to at ACB Bank, which implies that the internal control system was ineffective at ACB
Bank.
7. Conclusion and Recommendations
The ATM transactions in Pakistan have recorded a continuous growth over the period of time, which shows the
customer preferences in selecting and using this E-Banking Channels for conducting both financial and
non-financial transactions. The ATM Fraud at the same time has opened up new chapters in the IT security
portfolio demanding a reasonable attention from the higher management in thwarting ATM fraud at its early
stages. In addition, to better detect and prevent e-frauds, multiple tools may be used with proper fraud
management practices and systems in place.
Effective internal controls provide a reasonable assurance to the management on fraud prevention and timely
detection. The guidelines and the instructions issued by the central bank need proper attention. Their compliance
will help the banks in minimizing e-banking risks, detecting e-frauds, prevention and safeguarding the e-Banking
assets including ATMs.
Considering the nature of the fraud and after thoroughly investigating the ACB Bank’s internal control
mechanisms and lack of higher management involvement and understands of ATM operations, a turnkey ATM
solution has been recommended for ACB Bank. Under this solution, a 3rd party or an Independent Selling
Organization (ISO) may be contacted to deploy and look after the ATMs, provide monitoring and diagnostic
services and also ensure the safety and security of the ATMs. The cash replenishment shall rests with the ACB
Bank Limited.
In order to keep the identity of the respondent, software developer and ATM Switch Operator anonymous,
imaginary names were used in this case study i.e. ACB Bank Limited, Beeta ATM Controller, Omega Pakistan
Limited and Alpha ATM Switch respectively.
Acknowledgement
Staff members working in the Information technology of ACB Bank Limited and Beeta ATM Switch. I also
acknowledge the support and access to documents provided by the staff members working at the State Bank of
Pakistan.
References
Adelowo Solomon A., & Mohammed Enagi A. (2010). Challenges of ATM usage and Fraud Occurrences in
Nigeria-A Case Study of Selected Banks in Minna Metropolis. Journal of Internet Banking and Commerce,
15(2). Retrieved from www.arraydev.com/commerce/jibc/2010-08/Solomon.pdf
Aijaz Ahmed Shaikh. (2011). Reducing Fraud Risks in E-Banking. Pakistan and Gulf Economist, 30, 19.
Anita K. Pennathur. (2001). Clicks and Bricks: E-Risk Management for Banks in the age of the Internet. Journal
of Banking and Finance, 2103-2123. http://dx.doi.org/10.1016/S0378-4266(01)00197-2
Chinedu N. Ogbuji., Chima B. Onuoha., & Emeka E. I. (2012). Analysis of the Negative Effects of the
Automated Teller Machine (ATM) as a Channel for Delivering Banking Services in Nigeria. International
Journal of Business and Management, 7(7), 180-190. Retrieved from
http://ccsenet.org/journal/index.php/ijbm/article/view/16034
Danny Bradbury. (2010). A Hole in the Security Wall: ATM Hacking. Network Security, 2010(6), 12-15.
http://dx.doi.org/10.1016/S1353-4858(10)70082-9
107
www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 22; 2012
Devinaga Rasiah. (2010). ATM Risk Management and Controls. European Journal of Economics, Finance and
Administrative Sciences, 21, 161-171. Retrieved from www.eurojournals.com/ejefas_21_13.pdf
Diebold Corporation. (2012). ATM Fraud and Security (2012). Retrieved from www.diebold.com
ICMR. (2007). Report on Global ATM Fraud-2007. Retrieved from
www.icmrindia.org/casestudies/catalogue/Business%20Reports/BREP041.htm, July 2007
Igwe Stanley Chinedu. (2010). Technology Innovations and in the Banking Sector – An Evaluation of the Rate
of Diffusion of the Automated Teller Machine. Academic Leadership, the Online Journal, 8(4).
M. Agoyi., & D. Seral. (2010). The use of SMS encrypted message to secure automatic teller machine. Procedia
Computer Science, 1310-1314.
Mark N. Greene. (2009). Divided we fall: Fighting payments fraud together. Federal Reserve Bank of Chicago,
37-42. Retrieved from
wwws.chicagofed.org/digital_assets/publications/economic_perspectives/2009/ep_1qtr2009_part6_greene.p
df
Nexhmi R., Russel Philip john K., & Audrey Shang Shang A. (2003). The Impact of the Relational Plan on
Adoption of Electronic banking. Journal of Services Marketing, 17(1), 53-67.
http://dx.doi.org/10.1108/08876040310461273
SBP. (2002). Mandatory Connectivity of Two ATM Switches By all Banks. Retrieved from
www.sbp.org.pk/bpd/2002/c20.htm
SBP. (2006). Guidelines for Standardization of ATM Operations. Retrieved from
www.sbp.org.pk/psd/2010/CL2.htm
SBP. (2007). Operational Guidelines on ATMs. Retrieved from www.sbp.org.pk/psd/2007/c2-07.htm
State Bank of Pakistan-SBP. (2010). Payment Systems Quarterly Review. Retrieved from
www.sbp.org.pk/psd/reports/index.htm, July 2012
Steven J. M., Saar D., Ross A., & Mike B. (2010). Chip and PIN is Broken. IEEE Computer Society, 433-445.
Ziqi L., & Michael Tow C. (2001). Internet-based e-banking and consumer attitudes: An empirical study.
Information & Management, 39, 283-295.
108