There are some types of malware designed to steal sensitive information from Automated Teller Machines (ATMs). However, there are some malware that allow the attacker to completely control it machine and instruct him to disburse to him the money he has deposited.
Last week, at Chaos Communication Congress (CCC), δύο Γερμανοί researchers have uncovered a piece of malware that enables cybercriminals to gain control of ATMs and, with a command, siphon off all of their money.
In accordance with Wired, the malware is installed on a USB drive. The attacker goes to a vulnerable ATM (usually running Windows XP), cuts a piece of its chassis to gain access to the USB port, and from there runs the malware that causes the machine to reboot. During the reboot, the malware rewrites registries, and gives the attacker control over machineof me.
So when the ATM is full of cash, the attacker uses a hidden menu to quit the network connection and get all the money.
Researchers believe that the person who wrote the malware is a knowledgeable and "inside" person. In any case, a very good knowledge of the operation of ATMs is necessary to carry out such an attack.
Researchers want to remain anonymous because they are afraid of criminal organizations. They have not provided any details about the model of vulnerable types of ATMs or malware. It is also uncertain whether the use of this malware is widespread.
On the other hand, experts say that some banks have started upgrading ATMs for the prevention security issues like what we described above.