Recent research revealed that most of the ATM’s around the world are vulnerable to compromise and cash out from the ATM by attackers within 30 min.
Cyber criminals are using various sophisticated methods including physical access and remote access by compromise the bank network in order to steal the money from ATM.
Recent ATM based attacks targeted by Malicious hackers stealing cash from cardless ATM using a new form of SMS phishing attack that force let user give away their bank account credentials into the phished website.
U.S. Secret Service also warned the new form of ATM Skimming Attack called “Wiretapping” targeting the financial institutions by creating a small size of the hole in the ATM machine and steal the customer data directly from card reader inside of the ATM Mchine.
Also, attackers trying to inject the ATM malware families such as Alice, Ripper, Radpin, and Ploutus, that is frequently available on the dark web market.
A researcher from PT Security tested around 26 ATMs models and performed deep security analysis revealed that ATM’s are vulnerable in the following 4 categories.
In order to compromise the ATM network, attackers targeting bank networks by intercept and spoof traffic, and attack network equipment.
There are 2 categories mainly used by an attacker to compromise and cashout from the ATM. First is fall under the scenario of obtaining money from the ATM and the second one is steal the user’s card data by copying it when they use it to cash-out.
Intially, the network-level attacks are most commonly used attack by compromising the Bank network remotely that connected with ATM who can be the employer of the bank or internet service provider.
This scenario takes just 15 mins to access the ATM network both physically or remotely and 85 % of the ATM’s are vulnerable to such attacks.
This attack scenario could be possible if data between the ATM and processing center is not secured and the attack manipulates transaction confirmation process which is performing while processing center emulator receives the request from the ATM and command to dispatch to the user.
This attack can be successfully performed when data between the ATM and processing center is not specially encrypted, VPN protection is poorly implemented, Message Authentication Codes are not used in transaction requests and responses. 27% of ATM machine can be compromised by this attack.
Attackers exploiting the network service vulnerabilities by execution the remote code into the vulnerable network that leads to turning off the security system that implemented by the bank and dispatches the cash from ATM.
Mostly this type of attacks targeting when the Bank failed to implement the proper firewall, out of date software, misconfigured security systems and 58% of ATMs are vulnerable to this attack.
Compromising the network devices that connected to the ATM machine leads to successfully obtain the full control of the ATM machine and command to cash out remotely.
This scenario leads to compromise all the ATM machine that connected to the attacked network and 23 % of tested ATM machines are vulnerable to such kind of attacks.
In this kind of ATM Attacks, cyber criminals directly drill the ATM machine inorder to access the dispenser cable. unlike cash dispenser which is protected inside of the ATM, the connection of the cash dispenser to the ATM computer is located outside that is completely unsafe.
IN This case, once the access the dispenser cable, they connected it to their own device and command it to send the cashout. shockingly 63% of ATM’s are vulnerable to this kind of attack.
Attackers trying to connect to the ATM harddrive through bypass the security system in order to gain full control of the dispenser also if the hard drive is not encrypted then the attack will load copy the malware that command to dispatch the cash.
Also attackers copy the sensitive files from the hard drive and use it to future attacks.92% of tested ATMs are vulnerable to this kind of attack.
Likewise, some other scenario also addressed and reported by the team of researcher from PT security and banks are need to concentrate more to ensure the complete ATM security in order to stop the future ATM-related attacks.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the best Cybersecurity courses online to keep your self updated.
A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…
Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…
Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…
The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…
Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…
A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…