A flaw in cash machines that allows criminals to quickly steal wads of cash has been discovered, reports Reuters.
Interpol
has alerted countries in Europe, Latin America and Asia known to have
been targeted – and is carrying out a widespread investigation.
Security firm Kaspersky Labs discovered the hack, which is enabled by entering a series of digits on the keypad.
Infected cash machines can be instructed to dispense 40 notes at once, without a credit or debit card.
Kaspersky Labs produced a video showing how the hack was carried out. More details were provided in a blog post.
Prior to trying to obtain the cash, targeted machines are infected with malicious software via a boot CD.
To do this, criminals need physical access to the workings of the machine.
Once
the malware – known as Tyupkin – has been installed, the “mule” sent to
collect the cash must enter a code on the machine’s key pad.
But
Tyupkin then requires a second unique code – randomly generated by an
algorithm at a remote location – to unlock the machine and dispense the
cash.
It is this part of the process that ensures the
criminal who has this algorithm retains control over when and how often
these illegal withdrawals occur.
“Over the last few
years, we have observed a major upswing in ATM attacks using skimming
devices and malicious software,” said Vicente Diaz, principal security
researcher at Kaspersky.
“Now we are seeing the natural
evolution of this threat with cybercriminals moving up the chain and
targeting financial institutions directly.”
Kaspersky carried out its initial investigation at the “request of a financial institution” – although it would not say which.
The
attack does not affect individual customers, instead simply instructing
the machine to dispense notes, with no link to bank accounts.
The
weaknesses of cash machines are routinely under the spotlight in the
security industry. Many machines run outdated software, which is hard to
update for logistical and financial reasons – there are lots of cash
machines, and money needs to be spent upgrading their hardware.
“The
fact that many ATMs run on operating systems with known security
weaknesses and the absence of security solutions is another problem that
needs to be addressed urgently,” Kaspersky wrote.
Earlier
this year another malware strain, known as Ploutus, allowed hackers to
command machines to dispense cash by sending a text message to them.
In
2010, hacker Barnaby Jack discovered a technique he dubbed
“Jackpotting” – in which a cash machine could be made to spew out money.
His demonstration on stage at security conference Black Hat provoked a standing ovation.
Mr
Jack died of a suspected accidental drugs overdose in 2013, just days
before he was due to give a presentation on the weaknesses in medical
devices.
No comments:
Post a Comment