How does an ATM Empty?

atm1There are some types of malware designed to steal sensitive information from Automated Teller Machines (ATMs). However, there are some malware that allow the attacker to completely control it and instruct him to disburse to him the money he has deposited.

Last week, at Chaos Communication (CCC), δύο Γερμανοί have uncovered a piece of malware that enables cybercriminals to gain control of ATMs and, with a command, siphon off all of their money.

In accordance with Wired, the malware is installed on a USB drive. The attacker goes to a vulnerable ATM (usually running Windows XP), cuts a piece of its chassis to gain access to the USB port, and from there runs the malware that causes the machine to reboot. During the reboot, the malware rewrites registries, and gives the attacker control over of me.

So when the ATM is full of cash, the attacker uses a hidden menu to quit the network connection and get all the money.

Researchers believe that the person who wrote the malware is a knowledgeable and "inside" person. In any case, a very good knowledge of the operation of ATMs is necessary to carry out such an attack.

Researchers want to remain anonymous because they are afraid of criminal organizations. They have not provided any details about the model of vulnerable types of ATMs or malware. It is also uncertain whether the use of this malware is widespread.

On the other hand, experts say that some banks have started upgrading ATMs for the security issues like what we described above.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).