Tuesday, November 12, 2024
HomeComputer SecurityMost of the ATM's Around the World Can be Hacked Under 30...

Most of the ATM’s Around the World Can be Hacked Under 30 Minutes

Published on

Malware protection

Recent research revealed that most of the ATM’s around the world are vulnerable to compromise and cash out from the ATM by attackers within 30 min.

Cyber criminals are using various sophisticated methods including physical access and remote access by compromise the bank network in order to steal the money from  ATM.

Recent ATM based attacks targeted by Malicious hackers stealing cash from cardless ATM using a new form of SMS phishing attack that force let user give away their bank account credentials into the phished website.

- Advertisement - SIEM as a Service

U.S. Secret Service also warned the new form of ATM Skimming Attack called “Wiretapping” targeting the financial institutions by creating a small size of the hole in the ATM machine and steal the customer data directly from card reader inside of the ATM Mchine.

Also, attackers trying to inject the ATM malware families such as Alice, Ripper, Radpin, and Ploutus, that is frequently available on the dark web market.

A researcher from PT Security tested around 26 ATMs models and performed deep security analysis revealed that ATM’s are vulnerable in the following 4 categories.

  • Insufficient network security 
  • Insufficient peripheral security 
  • Improper configuration of systems or devices 
  • Vulnerabilities or improper configuration of Application Control

In order to compromise the ATM network, attackers targeting bank networks by intercept and spoof traffic, and attack network equipment.

Attacks Scenarios to Compromise ATM

There are 2 categories mainly used by an attacker to compromise and cashout from the ATM. First is fall under the scenario of obtaining money from the ATM and the second one is steal the user’s card data by copying it when they use it to cash-out.

Network attacks

Intially, the network-level attacks are most commonly used attack by compromising the Bank network remotely that connected with ATM who can be the employer of the bank or internet service provider.

This scenario takes just 15 mins to access the ATM network both physically or remotely and 85 % of the ATM’s are vulnerable to such attacks.

Spoofing of the Processing Center

This attack scenario could be possible if data between the ATM and processing center is not secured and the attack manipulates transaction confirmation process which is performing while processing center emulator receives the request from the ATM and command to dispatch to the user.

This attack can be successfully performed when data between the ATM and processing center is not specially encrypted, VPN protection is poorly implemented, Message Authentication Codes are not used in transaction requests and responses. 27% of ATM machine can be compromised by this attack.

Exploiting the Network Service Vulnerabilities

Attackers exploiting the network service vulnerabilities by execution the remote code into the vulnerable network that leads to turning off the security system that implemented by the bank and dispatches the cash from ATM.

Mostly this type of attacks targeting when the Bank failed to implement the proper firewall, out of date software, misconfigured security systems and 58% of ATMs are vulnerable to this attack.

Compromise the  Network Devices

Compromising the network devices that connected to the ATM machine leads to successfully obtain the full control of the ATM machine and command to cash out remotely.

This scenario leads to compromise all the ATM machine that connected to the attacked network and 23 % of tested ATM machines are vulnerable to such kind of attacks.

Physically Access the ATM cabinet

In this kind of ATM Attacks, cyber criminals directly drill the ATM machine inorder to access the dispenser cable. unlike cash dispenser which is protected inside of the ATM,  the connection of the cash dispenser to the ATM computer is located outside that is completely unsafe.

IN This case, once the access the dispenser cable, they connected it to their own device and command it to send the cashout. shockingly 63% of ATM’s are vulnerable to this kind of attack.

Connection to the hard drive

Attackers trying to connect to the ATM harddrive through bypass the security system in order to gain full control of the dispenser also if the hard drive is not encrypted then the attack will load copy the malware that command to dispatch the cash.

Also attackers copy the sensitive files from the hard drive and use it to future attacks.92% of tested ATMs are vulnerable to this kind of attack.

Likewise, some other scenario also addressed and reported by the team of researcher from PT security and banks are need to concentrate more to ensure the complete ATM security in order to stop the future ATM-related attacks.

Mitigation Steps to Detect Banking environment Cyberattack 

  • Suspicious Transaction Activity – Targeted – Frontend and backend Transaction Discrepancy Analytic (This can be used to help detect malware activity utilized to compromise ATM switches e.g. where TR enters a payment switch but never leaves for authorization etc.)
  • Suspicious SWIFT Endpoint Activity – Rare SAA Process/MD5 Analytic
  • Suspicious SWIFT Activity – Amount – Unusual 103 For Source Analytic
  • Suspicious ATM Activity – Peak Sequential Non-EMV Transactions For ATM Source Analytic
  • Suspicious Network Activity – Amount – Unusual PCCR Changes Analytic (This can be used to help detect unusual changes in the behavior of the ATM switches from a network perspective.)
  • Suspicious ATM Activity – Peak EMV Fallbacks to Magstripe Analytic
  • Suspicious Network Activity – Rare Outbound Network Connection For Host Analytic (This can be used to help detect attack activity associated with the compromised ATM switch.)
  • Suspicious ATM Activity – Peak *On-Us Transaction Volume For PAN Analytic
  • Suspicious ATM Activity – Amount – Unusual Foreign Cash-out Volume Analytic
  • Suspicious Transaction Activity – Targeted – Cash Withdrawal Limit Elimination Analytic – Malicious threat actors manually changing cash withdrawal limits
  • Suspicious Process Activity – Rare Scheduled Task For Host Analytic (This is an example that can be used to detect one of the common techniques leveraged by Lazarus Group to which the attacks were attributed.)
  • Suspicious Process Activity – Targeted – Executable File Creation Analytic
  • Also, you can read Advanced ATM Penetration Testing Methods.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the best Cybersecurity courses online to keep your self updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...