New ATM Malware called ATMJackpot that is capable of dispensing large amounts of cash from the ATM Machine using ATM Jackpotting method.
Previously discovered ATM Jackptting Malware compromise the ATM by installing the malicious software and sophisticated hardware to pull out the cash.
Based on the Binary, researchers discovered this ATM malware originated from Hong Kong as 28th March 2018.
Also, Attackers inject an another ATM Malware called Ploutus.D inject into the ATM machine and performing various Task
This newly Spreading ATM malware has a smaller footprint with a kind of small simple graphical user interface.
This Malware interface contains hostname along with the service provider information such as cash dispenser, PIN pad, and card reader information.
How Does This ATM Malware Works
This ATM Malware propagates via physical access by an attacker using USB and also spreading via a network by downloading the malware on to already-compromised ATM machines.
Initially, windows class name called ‘WIN’ registered by the ATMJackpot malware that leads to handle all the malware activities.
According to netskope, After registering a window class, the malware creates the window, populates the options on the window, and initiates the connection with the XFS manager
Later ATMJackpot malware starts it monitoring an operation of the events from different service providers and finally execute commands.
It using 3 Different commands to perform its malicious operation in the targeted ATM
1.Malware reads the data from PIN pad asynchronously using WFSAsyncExecute API
2.Malware has the functionality to dispense cash
3.Malware also has the functionality to eject the card
You can Also check the Advanced ATM Penetration Testing Methods that help prevent the ATM Based Attacks.