{"id":27636,"date":"2018-08-22T04:00:00","date_gmt":"2018-08-22T08:00:00","guid":{"rendered":"https:\/\/goebt.com\/https-blog-cdesolutions-com-unattended-retail-3-fraud-risks-for-your-retailers\/"},"modified":"2025-04-02T13:26:40","modified_gmt":"2025-04-02T17:26:40","slug":"unattended-retail-3-fraud-risks-for-your-retailers","status":"publish","type":"post","link":"https:\/\/goebt.com\/unattended-retail-3-fraud-risks-for-your-retailers\/","title":{"rendered":"Unattended Payments: 3 Fraud Risks for Your Retailers"},"content":{"rendered":"<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" style=\"\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><\/p>\n<p><span style=\"font-weight: 400;\">Unattended retail is a great way for your retailers to cut labor costs and build efficiency. From &nbsp;grocery self checkout to payment kiosks, unattended retail is growing in popularity every year. But it\u2019s important to realize that <strong><em>unattended retail comes with some unique fraud risks.<\/em><\/strong> Be aware of these risks so that you can help your merchants develop wise loss prevention strategies. <\/span><\/p>\n<p> <!--more--><\/p>\n<p><span style=\"font-weight: 400;\">Unattended retail fraud risks come from three distinct angles: <\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Thieves using the technology to <em><strong>steal products directly<\/strong><\/em><\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Thieves using the technology to <em><strong>steal data <\/strong><\/em><\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Thieves using <em><strong>stolen data to buy products<\/strong><\/em><\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">First let\u2019s look at the risks of direct product theft:<\/span><\/p>\n<p><strong>1. The Five-Finger Discount<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">If you think self checkout is a tempting opportunity for thieves, you\u2019d be right. Retail self checkout is a major source of shrink. Some of the theft schemes are so common, they even have names. There\u2019s the <em><strong>banana trick<\/strong><\/em>, where an expensive item like steak is weighed with a cheap produce code like bananas. With the <em><strong>pass-around<\/strong><\/em>, customers pretend to scan an item before dropping it into the bag. And finally, there\u2019s the <em><strong>switcheroo<\/strong><\/em> &#8211; just as it sounds, replacing an expensive item\u2019s barcode with a cheap one. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While these names might make you smile, they\u2019re a real problem for merchants. Some studies <sup><a href=\"https:\/\/www.theatlantic.com\/magazine\/archive\/2018\/03\/stealing-from-self-checkout\/550940\/\" rel=\"noopener\">1<\/a>, <a href=\"https:\/\/www.news.com.au\/technology\/innovation\/inventions\/new-technology-from-aussie-company-will-make-it-impossible-to-steal-from-selfserve-checkouts\/news-story\/dd4ed934c1d17242bfd09bc3c4a7624c\" rel=\"noopener\">2<\/a><\/sup> have shown that up to 20% of shoppers admit stealing items at self checkout. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To reduce shrink, your retailers need more than a staff member monitoring the self checkout corral. Consider adding a layer of technology. Developers are producing AI that can visually recognize products and verify whether scanned prices are accurate.&nbsp;&nbsp; <br \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some providers offer video-based solutions ready to be implemented today. Take a look at <a href=\"https:\/\/www.stoplift.com\/\" rel=\"noopener\">Stoplift<\/a>, which boasts ease of POS integration as well as PCI compliance. And what\u2019s more, they provide several entertaining (and alarming!) <a href=\"https:\/\/www.youtube.com\/watch?time_continue=5&amp;v=XFtiD8-DqEs\" rel=\"noopener\">real-life videos<\/a> of self checkout thieves in action. <\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>2. Skimming for profit<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now let\u2019s consider how unattended retail can be mined for data theft. Skimmers are an ongoing problem for fuel pumps and ATMs. Recently, this risk has expanded to other unattended retail providers such as car wash payment kiosks, vending machines and even grocery checkout units. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bluetooth skimmers can be inserted deep into a card reader slot, undetectable to the eye. In the past, thieves would have to physically pull a skimmer from a card reader to access data, but these days technology makes it awfully convenient. Called blue skimming, thieves can simply park nearby and download data in real time via bluetooth. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">So how can your merchants prevent skimming? To start, you should instruct merchants to check their equipment regularly for signs of tampering. Measures such as security tape on fuel pumps can keep thieves from disassembling equipment and installing skimmers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">But with skimmers inserted into the card reader, merchants need to fight fire with fire. For Android and iOS, your merchants can easily download apps such as <a href=\"https:\/\/thepointsguy.com\/2017\/11\/skimmer-scanner-app\/\" rel=\"noopener\">Skimmer Scanner<\/a> or Card Skimmer Locator (on the iOS app store) to check their machines for common bluetooth skimmers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, keep in mind that these solutions are just a patch on the problem. The underlying problem remains the use of mag stripe transactions. For the ultimate fix, urge your merchants to upgrade to chip technology, even if they are in a vertical currently exempt from EMV penalties. <\/span><\/p>\n<p> <strong>3. NFC: Bypassing EMV security<\/strong> <\/p>\n<p><span style=\"font-weight: 400;\">While EMV upgrades will prevent mag stripe skimming, clever thieves have still found a way to bypass EMV security using NFC (tap and pay.) Since the EMV shift, most retailers have upgraded their POS hardware with NFC technology. It\u2019s ironic that this move meant to increase security has left a back door wide open.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As it turns out, it can be easy to add stolen credentials to Apple Pay, Samsung Pay and Google Pay. While large issuers like Citi require two step verification before allowing a card to be added to a payment service, thieves have learned that many smaller issuers don\u2019t bother. Thieves simply snap a photo of a counterfeit card, or even enter the data manually. And within minutes, they\u2019re in business. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">By using unattended retail, thieves don\u2019t have to worry about showing a matching photo ID to a cashier. Depending on the issuing bank\u2019s alertness, thousands of dollars can be siphoned away before the fraud is noticed. Are your merchants liable for these fraudulent transactions? They shouldn\u2019t be, but it may be a hassle to convince the issuing bank otherwise. <\/span><\/p>\n<p><strong>Final Thoughts<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Without doubt, unattended retail is the way of the future. And while this sector cuts labor costs, it still requires a level of retail supervision. From minimizing shrinkage to staying on top of equipment upgrades, unattended retail is not necessarily effortless retail. Help your retailers take the right steps to manage this payment environment, and you\u2019ll make it as frictionless and profitable as it can be. <\/span><\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unattended retail is a great way for your retailers to cut labor costs and build efficiency. From &nbsp;grocery self checkout to payment kiosks, unattended retail is growing in popularity every year. But it\u2019s important to realize that unattended retail comes with some unique fraud risks. Be aware of these risks so that you can help [&hellip;]<\/p>\n","protected":false},"author":244,"featured_media":27637,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[218],"class_list":["post-27636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-important-announcement","tag-security"],"_links":{"self":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/27636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/comments?post=27636"}],"version-history":[{"count":1,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/27636\/revisions"}],"predecessor-version":[{"id":31191,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/27636\/revisions\/31191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media\/27637"}],"wp:attachment":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media?parent=27636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/categories?post=27636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/tags?post=27636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}