Monday, March 31, 2025
HomeCyber AttackBeware!! Cyber Criminals Stealing Cash From Cardless ATM Using SMS Phishing Attack

Beware!! Cyber Criminals Stealing Cash From Cardless ATM Using SMS Phishing Attack

Published on

SIEM as a Service

Follow Us on Google News

Malicious hackers stealing cash from cardless ATM using a new form of SMS  phishing attack that force let user give away their bank account credentials into the phished website.

Cardless ATM is now using various financial institutions to take users cash without any form of physical cards but only using their mobile phone.

Cybercriminals abusing the cashless ATM future using an innovative phishing attack to steal  the bank credentials by adding the new number to the customer’s account

Using a new number added device, attacker steals the cash amount from the Cardless ATM machines.

Likewise another incident in January 2017, KrebsOnSecurity told the story of a California woman who saw nearly $3,000 drained from her account via a cardless ATM operated by Chase Bank.

“In that incident, the thieves didn’t even need to know her ATM PIN; the thieves were able to use a phone number and mobile device they controlled and associate it with her Chase account simply by supplying her username and password”

A Real-Time Stealing Incidents From Cardless ATM

A Customer from Ohio-based financial institution Fifth Third Bank reported In May 2018 that he has received a text message on their phone that claimed from the bank.

The text message warning that their account has been locked and it contains a link which helps the unlock the account when user follow it

Once the user clicked the link then it will be redirected into a Web site that mimics the legitimate Fifth Third site which is a clear phishing page.

The site leads the visitor to give away their sensitive information including usernames, passwords, one-time passcodes and PIN numbers in order to unlock their account.

According to Kerb on security, scam netted credentials for approximately 125 Fifth Third customers — most of them in or around the Cincinnati area. The crooks then used the phished data to withdraw $68,000 from 17 ATMs in Illinois, Michigan, and Ohio in less than two weeks using Fifth Third’s cardless ATM function.

Cybercriminals continuously compromise user via phishing scam and withdrawals at cardless ATMs until the account balance goes zero.

Also, kerbs said, “cardless ATMs were offered mainly by the big banks, and then only at some of their ATMs. Now, many smaller regional and local banks have upgraded their cash machines to enable the new technology.”

Based on the Mastercard says its polling (PDF) suggests that 78 percent of consumers would rather use a cardless ATM solution than carry a physical card but the fact is most of the peoples are not even once heard about cardless ATM.

Related Read

ATM Skimmer – How to Spot and Avoid Dangerous ATM Insert Skimmer

Famous Indian Bank SWIFT/ATM System Hacked – Hackers Stolen US$13.5 Million – A High Profile Cyber Attack

Advanced ATM Penetration Testing Methods

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially...

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel has issued a security advisory (MISA-2025-0003) to notify users of its MiContact Center...

ClickFix Captcha – A New Technique Hackers Used to Deliver Infostealers, Ransomware, & Quakbot Malware

Cybercriminals are leveraging fake CAPTCHA verification pages dubbed ClickFix to distribute malware, including infostealers,...

Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Dell Technologies has released a security advisory detailing multiple critical vulnerabilities in its Dell...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially...

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel has issued a security advisory (MISA-2025-0003) to notify users of its MiContact Center...

ClickFix Captcha – A New Technique Hackers Used to Deliver Infostealers, Ransomware, & Quakbot Malware

Cybercriminals are leveraging fake CAPTCHA verification pages dubbed ClickFix to distribute malware, including infostealers,...