💰 Money & ATM Scams

ATM Skimming While Traveling: How to Protect Your Card

ATM skimming — where a device captures your card data and PIN — costs travelers significant sums each year and is especially prevalent in tourist-heavy areas where machines see high volumes of unfamiliar users. The risk is manageable with a few consistent habits.

How ATM Skimming Works

Skimmers are physical devices attached to the card slot that read your card's magnetic stripe as it enters. A small camera or fake keypad overlay captures your PIN simultaneously. The thief later uses the captured data to clone your card or make unauthorized withdrawals.

Which ATMs Are Highest Risk

  • •Standalone ATMs in tourist areas not attached to a bank branch
  • •Machines in poorly lit areas or away from main streets
  • •ATMs with card slots that look different from the rest of the machine (recently attached)
  • •Machines in convenience stores, exchange bureaus, and souvenir shops

How to Check an ATM Before Using It

  • •Wiggle the card slot before inserting your card — genuine slots are firmly attached; skimmers feel loose
  • •Cover the keypad with your hand when entering your PIN, even if no one is watching
  • •Look for anything that appears added on — extra plastic, a slightly different color on the card slot, a camera mounted above the screen
  • •If anything feels wrong, use a different machine

Safer Alternatives

  • •Use ATMs directly attached to bank branches, especially inside the bank lobby
  • •Use contactless payment or travel cards (Wise, Revolut) to minimize ATM use
  • •Withdraw larger amounts less frequently to reduce exposure
  • •Enable real-time transaction notifications on your card so unauthorized charges appear immediately
  • •Use chip-and-PIN rather than swipe wherever possible — chip transactions cannot be skimmed the same way

Editorial note: Travel safety guidance on Before You Go is compiled from government travel advisories, verified news sources, and traveler-submitted incidents. Content is reviewed for accuracy before publication. Read our methodology →