Saturday, March 2, 2024

Russian Bank ATM Vulnerability Allows to Hack the ATM by Pressing Shift Key Five Times

A Russian user discovered a major ATM vulnerability in Windows XP running ATM machine that could be compromised by pressing five Shift Key times.

When Shift key pressed for 5 times, a special window that suggesting to enable the sticking mode of the keys which enable up to Windows 10.

This feature is not helping ATM machines and most of the ATM machines in the world still run on the older versions of Windows mainly on the Windows XP.

Windows XP got a final update on 2014 and most of the machines that are running under Windows XP are completely vulnerable to many potential threats.

Also Read:  Advanced ATM Penetration Testing Methods

Russian user standing at the terminal of the Savings Bank with a full-sized keyboard and waiting for the operator to answer the phone decided to press this Shift from boredom, naively believing that without functional keys this would lead to nothing.

Later he Pressed a shift key 5 times that gave him an access to a window that has given access to reach the task panel with all the bank software.

Later He tried to report this serious issue to the concern  Sberbank Employee but unfortunately, he couldn’t reach the right person.

 According to habrahabr blog where the Russian person has written his experience, The girl rather reluctantly replied that she did not know anything, to answer questions about how to contact the authorities, responded with a laconic silence and advised him to contact the support service on the phone written on the terminal itself.

“Also he said, In tech support, a friendly girl after I said that I want to report a vulnerability, immediately switched me to some other specialist. He first asked how to contact me and the terminal number, then on the nature of the problem, then I listened to music for a long time, and, after all, the guy said that the problem is fixed”

But two weeks later he tried it again but still, the vulnerability has not fixed even they said they said that they “fixed” the problem.

“He feels, I’m not an expert in the field of information security and I can not judge what damage this “feature” can cause, but, judging by the sluggish reaction – no. Therefore, for the fact of the inaction of Sberbank, I inform you of the merry action “SberShift” to you”.


Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles