Friday, May 24, 2024

Hackers Steal 800,000€ from ATMs in Italy Using Black Box attack

A criminal organization has stolen money from a minimum of 35 ATMs and Post Office cash dispensers operated by Italian banks with a new Black Box attack technique.

The Carabinieri of Monza dismantled by the gang, the Italian law enforcement agency confirmed that the cybercrime organization stole about 800,000€ in mere 7 months using the ATM Black Box attack.

This was announced by the provincial command of the capital, which investigated 12 people of which, 6 of them were arrested, over the past weekend, following a decree of the arrest of a suspect issued by the Public Prosecutor’s Office of Monza, for the accusations of criminal association aimed toward the commission of aggravated theft.  

The Investigation

Monza Investigative Unit initiated the investigation last September, made it possible to document numerous cyber-attacks called ‘black boxes’ against ATMs, consisting of “crediting” as a “system administrator” and then obtaining the “delivery of all cash” from ATMs.

According to local media, the gang had numerous logistical bases within the provinces of Milan, Monza, Bologna, Modena, Rome, Viterbo, Mantua, Vicenza, and Parma.

BlackBox attack

 “Black box” can be a kind of jackpotting attack destined at forcing an ATM to dispense cash. The unapproved device (typically obscure Box or tablet) that sends administrators orders on to the machine to “money out” the ATM. Lawbreakers access the ATM prime Box regularly by boring gaps or liquefying to physically associate such devices.

In this attack, a black box device, like a mobile device or a Raspberry, is physically connected to the ATM and is used by the attackers to send commands to the machine.

The ATM black box attacks are quite popular within the cybercrime underground and several other threat actors offer the hardware equipment and malware that would be used to compromise the ATMs.

Security Alert

Poorly protected ATMs are more exposed to the present sort of attack because criminals can easily tamper with their case to connect the mobile device.

Diebold Nixdorf, a number one manufacturer of ATMs, issued an alert to customers warning all banks of a new variant of ATM black box or jackpotting attacks. The alert was issued after the Argenta Bank in Belgium was forced to shut down 143 ATMs after a jackpotting attack. All the compromised machines were Diebold Nixdorf ProCash 2050xe devices.

According to the security alert issued by Diebold Nixdorf, and obtained by ZDNet, the new variation of black-box attacks has been used in certain countries across Europe.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Related Articles

ATM Jackpotting – Cutlet Maker Malware Spike Around the World to Spit the Cash From ATM

ATM “black box” – A New Attack to Dispense Money from ATM Terminal


Latest articles

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing...

Microsoft Warns Of Storm-0539’s Aggressive Gift Card Theft

Gift cards are attractive to hackers since they provide quick monetization for stolen data...

Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities

The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining...

NSA Releases Guidance On Zero Trust Maturity To Secure Application From Attackers

Zero Trust Maturity measures the extent to which an organization has adopted and implemented...

Chinese Hackers Stay Hidden On Military And Government Networks For Six Years

Hackers target military and government networks for varied reasons, primarily related to spying, which...

DNSBomb : A New DoS Attack That Exploits DNS Queries

A new practical and powerful Denial of service attack has been discovered that exploits...

Malicious PyPI & NPM Packages Attacking MacOS Users

Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users.These...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles