Jackpot: Hackers are letting ATMs get cash off


According to the world’s two largest ATM manufacturers and the U.S. Secret Service, cybercriminals are stealing cash machines and forcing them to pay in “jackpots”.

Diebold Nixdorf and NCR issued alerts to clients over the weekend, but did not identify the victims and did not say how much money was stolen. According to Krebs’ confident warning on security issues, the U.S. Secret Service started to warn financial institutions that Mexico was risk-taked last week in Mexico, where it is now adventurous.
Diebold Nixdorf said authorities have warned the company that hackers are targeting the discontinued Opteva ATM model several years ago.

NCR said: “All ATM deployments should take action to take appropriate measures to protect ATMs from these attacks.”

Although it is not clear how much the stolen money is, victims and police often do not disclose details. Hackers require the use of specialized electronic devices and malware to control their ATMs, including endoscopes.

According to the Secret Service, once these machines are taken over, they may be forced to issue banknotes at a rate of 40 bills every 23 seconds until they are emptied. The only way to stop the machine from spitting cash is to press the cancel button on the keyboard.
According to the Secret Service, criminals have been targeting pharmacies, retailers and straight-through ATMs.

According to security company FireEye, Mexican attackers have been using variants of Ploutus malware, first discovered in 2013. Believe US cybercriminals are using a similar technology.

Last year, Daniel Regalado, FireEye’s research science manager, wrote: “Once deployed to an ATM, Ploutus-D can get thousands of dollars in minutes.

According to Group IB, a Russian network security company, ATMs in dozens of countries in Europe were remotely attacked in 2016. Similar attacks have taken place in Thailand and Taiwan.


Please enter your comment!
Please enter your name here