Feeds

Petrol-pump thieves go hi-tech

System bypass

Build a business case: developing custom apps

Tech-savvy thieves have worked out a means to obtain free petrol after hacking into electronically-controlled petrol pumps, according to US reports. Two gas stations in St Louis, Missouri report recently losing up to $10,000 each through the scam. Crooks reportedly reprogrammed internal keypads to dispense free gas after opening up pumps. Thereafter, other unscrupulous customers take advantage of the ruse to avoid paying for petrol either.

"They (the thieves) have a key to the pump and then after they open up the pump they go in and they reprogram the pump, so they can have free gas. And then everybody behind them sees what they're doing, and they continue," Kevin Tippit, manager of the Phillips 66 gas station told KSDK News Channel 5. Amjad Darwish, owner of Mobile Food Mart, which houses another gas station, suffered a similar attack last month.

You might think that gas station attendants would notice someone tinkering with the pumps but this in not necessarily the case. "What it actually does is bypass our system," Tippit explained. "It goes beyond the register and is drawing directly off the pumps."

Tippit's staff don't have access to the codes to the interior keypads even though they do have access to physical keys. Mobile Food Mart contacted the supplier and had keypads removed from its petrol pumps. Staff at the store are keeping close tabs on footage from CCTV cameras that monitor its gas pumps.

Last week workers nabbed a suspect in the case. "When he walks in, we locked the door and call the police. They searched his car. They found the keys (and) the program. Everything was in his car," Darwish said. Local police are investigating the thefts. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?