Crooks use USB sticks to infect ATMs and steal cash

Cyber-crooks have been cutting open ATMs to get to USB ports and installing malware which lets them empty the machines of cash, security researchers have demonstrated.

2 comments

Crooks use USB sticks to infect ATMs and steal cash

Editorial

This content has been selected, created and edited by the Finextra editorial team based upon its relevance and interest to our community.

In a presentation, which can be watched online, at the Chaos Communication Congress, two researchers showed how hackers sliced open the ATMs of an unnamed bank and plugged in USB sticks containing malware.

Once the malware was installed and the ATMs patched up, the crooks used a 12-digit code to access a special interface on the machines which displayed a breakdown of how much money, and in what denominations, was in them.

With no honour among thieves, the malware required crooks to enter a second, one-time code to withdraw cash, which had to be obtained by phoning the gang leaders.

When the targeted bank realised that its ATMs were being hit, it stepped up surveillance and caught a man trying to cash out a machine. He was arrested with a malware-holding USB stick on him which was given to the security researchers for analysis.

The analysis suggests that the malicious code was designed only to remove cash - not to steal card data - and was written by a large and skilled team with a deep knowledge of ATMs, say the researchers. It had been written specifically to target one bank but could be of use against other machines running Windows XP.

Sponsored [Webinar] Using modern technology platforms to create an AI-driven bank

Comments: (2)

A Finextra member 

Let me see if I understand this:

Two guys turn up at a bank, with a blowtorch, a five foot high acetylene bottle, and an oxygen bottle, and cut the corner off the cast iron ATM case. They then insert a USB stick, and carefully weld up the hole they made earlier. Right?

I have to ask myself whether even my bank would have noticed that something was wrong...

Vernon Crabtree Test automation architect at My comments are my own

I always thought it was a risk that the steel around the housing of the electronics is thinner than the safe.  The air-vents look particularly easy to cut into.

If this sort of thing continues, it is another nail in the coffin for cash.

 

[Webinar] Real Time Goes Global: Expanding Revenue Potential Beyond BordersFinextra Promoted[Webinar] Real Time Goes Global: Expanding Revenue Potential Beyond Borders