Monday, April 21, 2025
HomeCyber AttackResearchers Uncover How Lazarus Hacking Group Stole Millions of Dollars From ATMs

Researchers Uncover How Lazarus Hacking Group Stole Millions of Dollars From ATMs

Published on

SIEM as a Service

Follow Us on Google News

Lazarus Hacking Group is known for launching highly Sophisticated Cyber attacks targeting various sectors such as entertainment, financial services, defense, technology, and virtual currency industries, academia, and electric utilities.

Their activities including the development of various malware that was used for one of the biggest Wannacry Ransomware attacks in 2017, Sony cyber Attack on 2014 and Bangladesh Bank attack where attackers theft $81 million.

Security researchers from Symantec uncover the important tool used by Lazarus Hacking Group to steal money from the ATMs.

- Advertisement - Google News

According to Symantec’s research, to make the fraudulent withdrawals, Lazarus first breaches targeted banks’ networks and compromises the switch application servers handling ATM transactions.

Once the server compromised they deploy previously unknown malware (Trojan.Fastcash) which intercepts the fraudulent withdrawal requests and send fake responses to dispense cash from ATMs.

Lazarus Hacking Group
Credits: Symantec

ISO 8583 is standard message format that details the exchange between the credit/debit card issuers and the devices where it used such as point-of-sale devices and automated teller machines.

Attackers inject malicious codes into a legitimate process on application servers running the AIX operating system, the inserted malicious script has the ability to construct the ISO 8583 messages.

According to Symantec analysis, the malware monitors incoming messages and intercepts the attacker generated fraudulent transaction requests to prevent them from reaching the switch application.

Then it transmits a fake response approving fraudulent withdrawal requests and the hacker group drops cash from the ATM.

“Symantec has found several different variants of (Trojan.Fastcash), each of which uses different response logic. The attackers appear to have built in a capability to selectively deny transactions based on their own blacklist of account numbers.”

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cloud Security Challenges Every CISO Must Address in Hybrid Environments

Hybrid cloud environments, which blend on-premises infrastructure with public and private cloud services, have...

Cyber Hygiene Best Practices for Modern Enterprises

Cyber hygiene refers to the routine practices and fundamental security measures organizations implement to...

Security Awareness Metrics That Matter to the CISO

In today's rapidly evolving threat landscape, Chief Information Security Officers (CISOs) are tasked with...

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cloud Security Challenges Every CISO Must Address in Hybrid Environments

Hybrid cloud environments, which blend on-premises infrastructure with public and private cloud services, have...

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where...

VibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed "VibeScamming," where...