Thursday, February 27, 2025
HomeMalwarePress F3 for Money : "Ploutus" Dangerous ATM Malware Discovered

Press F3 for Money : “Ploutus” Dangerous ATM Malware Discovered

Published on

SIEM as a Service

Follow Us on Google News

FireEye have recognized another variation of the Ploutus ATM malware, utilized for as far back as couple of years to make ATMs retch out money on charge.

Ploutus enabled criminals to empty ATMs using either an external keyboard attached to the machine or via SMS message, a technique that had never been seen before.

There are some previously unobserved version of Ploutus, dubbed Ploutus-D, that interacts with KAL’s Kalignite multivendor ATM platform.

The samples we identified target the ATM vendor Diebold. However, minimal code change to Ploutus-D would greatly expand its ATM vendor targets since Kalignite Platform runs on 40 different ATM vendors in 80 countries

How it works

When conveyed to an ATM, Ploutus-D makes it feasible for a cash donkey to get a large number of dollars in minutes. A cash donkey must have an ace key to open the top segment of the ATM (or have the capacity to pick it), a physical console to interface with the machine, and an enactment code (gave by the manager accountable for the operation) keeping in mind the end goal to administer cash from the ATM.

FireEye described some previous Activities of  Ploutus,

  • It uses the Kalignite multivendor ATM Platform.
  • It could run on ATMs running the Windows 10, Windows 8, Windows 7 and XP operating systems.
  • It is configured to control Diebold ATMs.
  • It has a different GUI interface.
  • It comes with a Launcher that attempts to identify and kill security monitoring processes to avoid detection.
  • It uses a stronger .NET obfuscator called Reactor.

Commonality between Ploutus and Ploutus-D

  • The main purpose is to empty the ATM without requiring an ATM card.
  • The attacker must interact with the malware using an external keyboard attached to the ATM.
  • An activation code is generated by the attacker, which expires after 24 hours.
  • Both were created in .NET.
  • Can run as Windows Service or standalone application.

New Ploutus malware variant targets Diebold-made ATMs

As indicated by Researchers, this new variation was seen in November 2016, when somebody transferred a duplicate on the VirusTotal amassed filtering motor.

This mix-up permitted Researcher’s to get their hands on a duplicate of this new form, which they nicknamed Ploutus-D because of elements that permitted it to explicitly target Diebold ATMs.

Later investigation uncovered that with minor adjustments, Ploutus-D could likewise focus on the ATMs of different sellers that fabricated their money distributors on the Kalignite Platform, at present conveyed by 40 diverse ATM merchants in 80 nations.

A Keyboard helps evildoers discharge out ATMs

Like past variations, hoodlums send Ploutus-D on the off chance that they can get to unsecured ATM ports where they associate a console to the ATM’s accessible ports.

The Keyboard permits them access to the ATM’s product. As per specialists, Ploutus-D can be utilized viably against ATMs running on Windows 10, 8, 7, and XP.

In the wake of associating the Keyboard, a charge line interface shows up, and cheats can utilize the console to enter blends of Fx keys to control the ATM, for example, “F8 F1” or “F8 F4 F5.”

After the convicts settle on the measure of money they need to take, they just need to press F3 and gather their cash.

FireEye Malware Analyst Daniel Regalado Said ,This code is provided by the boss in charge of the operation and is calculated based on a unique ID generated per ATM, and the current month and day of the attack,” 

Key Notes About Ploutus,

  • Ploutus-D was uploaded to VirusTotal in November 2016.
  • Ploutus-D was uploaded to VirusTotal in November 2016.
  • It has been observed in Latin America.
  • Ploutus-D affects Diebold ATMs.
  • Minor modifications could be made to Ploutus-D to affect other vendors using the Kalignite Platform.
  • It activity Through physical access to the ATM.
  • Via an external keyboard that needs to be connected to the ATM.

     

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting...