Monday, April 7, 2025
HomeComputer SecurityMalicious Hackers Steal Money From ATM by Connecting Laptop with ATM Cash...

Malicious Hackers Steal Money From ATM by Connecting Laptop with ATM Cash Dispenser

Published on

SIEM as a Service

Follow Us on Google News

The researchers discovered a dangerous black box attack tool called “KoffeyMaker” which is used by cybercriminals to steal money from ATM by connecting a laptop with the ATM machine cash dispenser.

An atm-based attack is discovered often around the world in the various form of operation by cybercriminals with sophisticated tools and they employing new tactics and techniques.

These incidents have been notified in European banks and they frequently reported in attacks since they were unclear how did this happen in their ATM.

- Advertisement - Google News

After the detailed investigation was done by Kaspersky security research team confirmed that they were dealing with a black box attack.

Black box attack refers that cybercriminals opened the ATM and connect their laptop with the cash dispenser and simply leave the device inside.

This crime scene indicates that the “crime instrument” to be a laptop with ATM dispenser drivers and a patched KDIAG tool.

Later attacker gains the remote access through USB GPRS modem and they are using windows OS with XP, ME, or 7.

Cash out from ATM moments

Once everything goes well then cybercriminals returned to the ATM and pretending to normal ATM users in order to run the KDIAG tool by accomplished a remote connection with the laptop.

Later they provide an instructions to the dispenser to issue the cashout form ATM machine and they will retrieve the laptop on a later moment.

               ATM dispenser connected to a computer without the necessary drivers
According to Kaspersky, The whole operation could well be done solo, but the scheme whereby a “mule” handles the cash and ATM side, while a second “jackpotter” provides technical support for a share of the loot, is more common. 

Hardware encryption between ATM PC and its dispenser will be the better solution to prevent such attack but if it fails single ATM can spit out tens of thousands of dollars.

This attack is very similar to the earlier ATM based attack Cutlet Maker used by this new tool and Kaspersky Lab products detect as RiskTool.Win32.DIAGK.a and same tools used for various bank robbers.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

The Indonesian hacker group "INDOHAXSEC" has allegedly breached the National Tuberculosis Registry (NTBR) of...

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...