Thursday, March 6, 2025
HomeCyber CrimeTwo Cybercriminals Arrested for ATM Jackpotting Scheme

Two Cybercriminals Arrested for ATM Jackpotting Scheme

Published on

SIEM as a Service

Follow Us on Google News

Federal authorities have unveiled details of a sophisticated cybercrime operation targeting financial institutions across four states, resulting in the arrests of two Venezuelan nationals linked to the violent Tren de Aragua criminal organization.

David Jose Gomez Cegarra, 24, and Jesus Segundo Hernandez-Gil, 19, face charges of bank theft and conspiracy following a coordinated investigation by the FBI and local law enforcement agencies.

The defendants allegedly orchestrated a series of ATM “jackpotting” attacks that netted over $297,000 from credit unions and community banks between October and November 2024.

The Mechanics of ATM Jackpotting

The cybercrime technique, known formally as “ATM logical attacks,” involves physical and digital components to override secure banking systems.

Per court documents, perpetrators first gain physical access to an ATM’s internal components using specialized keys or tools.

Once inside, they either infect the machine’s hard drive with malware or replace it entirely with a compromised drive containing pre-installed malicious software.

This digital takeover allows remote control of cash dispensing mechanisms, enabling unlimited withdrawals until the ATM’s currency reserves are depleted.

Prosecutors outline a multi-state timeline beginning on October 5, 2024, when surveillance footage captured Gomez-Cegarra’s vehicle approaching a Radius Federal Credit Union ATM in Kenmore, New York.

A conspirator exited the car, accessed the machine’s interior, and installed malicious hardware within 90 seconds.

Over subsequent hours, the group executed 37 unauthorized withdrawals totaling $110,440 from that single location.

The operation expanded rapidly:

  • October 6: St. Malachy’s Federal Credit Union in Framingham, Massachusetts lost $63,200
  • October 17: First National Bank of Dryden (NY) suffered $13,360 in losses
  • November 11: Twin attacks on Community First Bank in Mount Vernon, Illinois drained $110,440

The White House’s recent designation of Tren de Aragua as a Transnational Criminal Organization proves critical to the case.

Investigators traced financial flows and communication patterns suggesting the jackpotting proceeds funded the gang’s broader operations, including human trafficking and narcotics distribution.

Forensic analysis of malware used in the attacks matches code fragments previously deployed in South American banking heists.

Investigation and Apprehension

A routine traffic stop in Mahomet, Illinois, on November 11 precipitated the arrests. Officers grew suspicious of Gomez-Cegarra and Hernandez-Gil’s conflicting travel explanations and Venezuelan identification documents.

Subsequent searches revealed modified ATM components, $18,450 in sequentially marked bills from the Mount Vernon heist, and encrypted communication devices.

The Western District of New York’s indictment leverages the FBI’s Cyber Task Force evidence linking biometric data, vehicle GPS histories, and cryptocurrency transactions.

U.S. Attorney Michael DiGiacomo emphasized that federal bank theft charges carry stiffer penalties than traditional robbery statutes, with each defendant facing up to 30 years when accounting for sentencing enhancements tied to terrorism designations.

Radius FCU President Carla Mitchell revealed that 83% of affected ATMs used outdated Windows XP-based controllers lacking partition encryption.

The National ATM Council has since issued urgent guidelines for:

  • Biometric access controls for technician panels
  • Real-time transaction monitoring algorithms
  • Tamper-evident holographic seals on internal components

As the case proceeds to discovery, Secret Service data shows a 214% year-over-year increase in ATM logical attacks, signaling an urgent need for regulatory action.

The arrested individuals remain in custody without bail, with deportation proceedings pending resolution of criminal charges.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns

Trend Micro's Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...