Thursday, February 27, 2025
HomeCyber Security NewsHackers Steal 800,000€ from ATMs in Italy Using Black Box attack

Hackers Steal 800,000€ from ATMs in Italy Using Black Box attack

Published on

SIEM as a Service

Follow Us on Google News

A criminal organization has stolen money from a minimum of 35 ATMs and Post Office cash dispensers operated by Italian banks with a new Black Box attack technique.

The Carabinieri of Monza dismantled by the gang, the Italian law enforcement agency confirmed that the cybercrime organization stole about 800,000€ in mere 7 months using the ATM Black Box attack.

This was announced by the provincial command of the capital, which investigated 12 people of which, 6 of them were arrested, over the past weekend, following a decree of the arrest of a suspect issued by the Public Prosecutor’s Office of Monza, for the accusations of criminal association aimed toward the commission of aggravated theft.  

The Investigation

Monza Investigative Unit initiated the investigation last September, made it possible to document numerous cyber-attacks called ‘black boxes’ against ATMs, consisting of “crediting” as a “system administrator” and then obtaining the “delivery of all cash” from ATMs.

According to local media, the gang had numerous logistical bases within the provinces of Milan, Monza, Bologna, Modena, Rome, Viterbo, Mantua, Vicenza, and Parma.

BlackBox attack

 “Black box” can be a kind of jackpotting attack destined at forcing an ATM to dispense cash. The unapproved device (typically obscure Box or tablet) that sends administrators orders on to the machine to “money out” the ATM. Lawbreakers access the ATM prime Box regularly by boring gaps or liquefying to physically associate such devices.

In this attack, a black box device, like a mobile device or a Raspberry, is physically connected to the ATM and is used by the attackers to send commands to the machine.

The ATM black box attacks are quite popular within the cybercrime underground and several other threat actors offer the hardware equipment and malware that would be used to compromise the ATMs.

Security Alert

Poorly protected ATMs are more exposed to the present sort of attack because criminals can easily tamper with their case to connect the mobile device.

Diebold Nixdorf, a number one manufacturer of ATMs, issued an alert to customers warning all banks of a new variant of ATM black box or jackpotting attacks. The alert was issued after the Argenta Bank in Belgium was forced to shut down 143 ATMs after a jackpotting attack. All the compromised machines were Diebold Nixdorf ProCash 2050xe devices.

According to the security alert issued by Diebold Nixdorf, and obtained by ZDNet, the new variation of black-box attacks has been used in certain countries across Europe.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Related Articles

ATM Jackpotting – Cutlet Maker Malware Spike Around the World to Spit the Cash From ATM

ATM “black box” – A New Attack to Dispense Money from ATM Terminal

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...