Click to Skip Ad
Closing in...
  1. Amazon Home Upgrades
    08:06 Deals

    5 home upgrades under $25 that Amazon shoppers are totally obsessed with

  2. Best Electric Lawn Mower 2021
    12:58 Deals

    The best Greenworks electric lawn mower is down to an all-time low price at Amazon

  3. Best Windows 10 Laptop Deals
    10:32 Deals

    Amazon’s best Windows 10 laptop deals in August start at just $199

  4. Wireless CarPlay Adapter
    08:41 Deals

    Finally! CarlinKit 2.0 on Amazon converts your car’s regular CarPlay to wireless Car…

  5. Instant Pot Pro Price
    11:44 Deals

    Instant Pot Pro in the sleek black color just got a huge discount at Amazon




The latest malware innovation: Infect ATMs and have them pump out cash

January 1st, 2014 at 7:30 PM
ATM Hacking Malware Attack

Hackers in Europe managed to target several cash machines from an unnamed bank earlier last year by infecting them with malware from USB drives, BBC News reports. The researchers who discovered the hack detailed their findings at the Chaos Computing Congress in Hamburg, Germany recently. According to their report, the ATM thefts were discovered in July after a bank noticed how its machines were emptied of cash even though the cash should have been protected inside safes. The bank then discovered how criminals were cutting holes into ATMs in order to transfer malware from the USB to the ATM. Once the data transfer was complete, the holes would be patched up to conceal the attack.

To withdraw money, hackers would then enter a 12-digit code that brought up a special menu showing how much of each currency denomination was available within the ATM. The thieves would then withdraw the highest value banknotes in order to spend as little time as possible in front of ATMs and thus avoid suspicion.

Interestingly, in order to prevent untrusted fellow gang members from withdrawing money from the compromised ATMs, the hackers used a double sign in mechanism. In addition to the 12-digit code, the thief would also have to enter a second code in response to a unique random sequence of numbers shown on the ATM. The response came via a phone call from another gang member, meaning that at least two people would be involved with each ATM heist. The machine would return to its normal state after three minutes of malicious inactivity.

The research has shown that the hack did not actually target data from regular customers using the machines, and instead focused only on directly retrieving the money. As for the code itself, the hackers “had gone to great lengths to make their malware code hard to analyze,” BBC writes, with researchers concluding that the hackers must have “profound knowledge of the target ATMs.”

Chris Smith started writing about gadgets as a hobby, and before he knew it he was sharing his views on tech stuff with readers around the world. Whenever he's not writing about gadgets he miserably fails to stay away from them, although he desperately tries. But that's not necessarily a bad thing.




Popular News