Remove Account Takeovers Remove Compromise Remove FFIEC
article thumbnail

Hacker Tracker: Shimmers, Identity Fraud, And Hacked Hotels

PYMNTS

But Cagnoni noted that while a shimmer attack can be successful, it requires a lot of manual work, making its effectiveness limited by the number of actual users of the compromised POS or ATM. It’s expected that the number of account takeover attacks will also continue to grow. properties were compromised by a malware attack.