Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/13/2014
04:40 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Criminals Control, Cash Out Bank's ATM Machines

New, sophisticated ATM heist used a malware-laden USB stick to hijack the machine -- one arrest is made

In what could be a sign of what's ahead in ATM fraud, a highly sophisticated and well-funded criminal gang targeted an overseas bank and commandeered at least four of its ATM machines with malware-rigged USB sticks in order to empty them of cash.

Tillmann Werner, a researcher for CrowdStrike, says the organized crime group cracked open the ATM machines and plugged in the USB stick containing a DLL exploit payload. The payload reconfigured the ATM system such that the attackers control it and allowed money mules to steal all of the cash stored in those machines. There has been a single arrest so far -- a money mule -- and the attacks may possibly have incurred millions of dollars in losses. These attacks are expected against other banks as well, he says.

"They crack the ATM open and plug in the USB drive. It's risky, but nevertheless, it works," Werner says.

Werner declined to name the victim bank or the brand of ATM machines it runs. The attacks still appear to be under way, he says. "The fact that such a sophisticated group is operating right now is the most important fact. Another thing that's interesting is banks in Germany potentially have the same issue, although we haven't seen an attack like that in Germany so far," Werner says.

The attackers physically took apart the ATM machines and inserted a USB stick with a malicious DLL installer into the printer port, giving them control of the ATM's Windows XP-based operating system. When a network connection is interrupted to the ATM, it automatically reboots, doing so from the malicious USB. The installer program collects information from the ATM system and also contains a log file for the attackers.

"It's a DLL injection file attack into the running process [of the ATM], and then you have code running in that process, and they can do what they want," Werner says.

One member of the gang in the heist was caught when he went to one of the ATMs to cash out. The cash-out works like this: An attacker types in a 12-digit code that then displays the malicious menu on the ATM screen. He answers a challenge question, and then calls one of his accomplices for a response code, which he inputs to dispense the cash from the ATM. The entire transaction of emptying the ATM takes a few short minutes.

Unlike the ATM Ploutus malware that was discovered last year that targeted bank customers during their ATM transactions, this attack goes after the bank's cash in the ATMs. "It's not related to Ploutus," he says, which is "child's play" compared with this new, more advanced method that steals from the bank itself.

"Attacks against ATMs mostly have been skimming attacks," he says. "With this attack, you can empty a whole ATM and make a lot of money ... It definitely takes a mafia-like organization to pull off such an attack."

The victim bank discovered the heist when its ATMs prematurely went empty of cash. "It doesn't leave any [other] traces," Werner says. The only clue is that the balance in the machine declines -- the theft transaction isn't detected.

There are ways to prevent such an attack, but with ATMs not built with software security in mind, it's tough to defend against it today. "You have to secure the PC, but that's easier said than done," Werner says. The best bet is to add a boot password to the system, which would prevent this attack, or to encrypt the ATM's hard drive.

The attack could work on banks in the U.S. as well, he says. The attackers have different versions of the malware for different banks, he says. "It has nothing to do with the banking system. They're going after the machine that spits out the money," he says. "Maybe they're not attacking U.S. ATMs because they use less cash in their ATMs."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
AdamsD871
50%
50%
AdamsD871,
User Rank: Apprentice
9/26/2016 | 11:22:33 PM
Pending Review
This comment is waiting for review by our moderators.
BrandyM707
50%
50%
BrandyM707,
User Rank: Apprentice
7/22/2016 | 6:03:58 AM
Pending Review
This comment is waiting for review by our moderators.
EdwardP792
50%
50%
EdwardP792,
User Rank: Apprentice
5/7/2016 | 11:02:16 PM
Pending Review
This comment is waiting for review by our moderators.
BanesM942
50%
50%
BanesM942,
User Rank: Apprentice
4/13/2016 | 7:48:22 AM
Pending Review
This comment is waiting for review by our moderators.
EdwinB755
50%
50%
EdwinB755,
User Rank: Apprentice
3/16/2016 | 2:12:43 AM
Pending Review
This comment is waiting for review by our moderators.
brandonlawrenter
50%
50%
brandonlawrenter,
User Rank: Apprentice
1/19/2016 | 8:06:57 AM
Pending Review
This comment is waiting for review by our moderators.
MoyesA252
50%
50%
MoyesA252,
User Rank: Apprentice
10/8/2015 | 5:13:30 PM
Pending Review
This comment is waiting for review by our moderators.
michael clinton
50%
50%
michael clinton,
User Rank: Apprentice
2/12/2015 | 7:59:21 PM
Pending Review
This comment is waiting for review by our moderators.
Beck
50%
50%
Beck,
User Rank: Apprentice
3/3/2014 | 6:38:58 PM
re: Criminals Control, Cash Out Bank's ATM Machines
There's a whole slew of security options beyond encrypting the ATM's hard drive (which should be common sense.) Adding a 2nd factor for authentication between the user and the bank could be used to authorize a specific amount that's to be released. And the bank could use an out of band solution like Toopher or Duo Security to make sure the hackers couldn't intercept the authentication. Why they had USB ports in the first place is beyond me. Not that I condone stealing, but it seems like this was a lesson that needed to be learned the hard way.
jobewan
50%
50%
jobewan,
User Rank: Apprentice
2/19/2014 | 8:36:36 PM
re: Criminals Control, Cash Out Bank's ATM Machines
Why are USB ports installed on the ATM in the first place? Why instead are there no USB ports (given the sheer potential for breach), or just a header to which authorized personnel attach a USB dongle, or a more proprietary connector, or an optically isolated port requiring a mating component, or a USB locking device that when removed, signals for authorization to continue and in the absence of which, or . . .
Page 1 / 2   >   >>
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29040
PUBLISHED: 2021-05-16
The JSON web services in Liferay Portal 7.3.4 and earlier, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 20 and 7.2 before fix pack 10 may provide overly verbose error messages, which allows remote attackers to use the contents of error messages to help launch another, more focused att...
CVE-2021-29041
PUBLISHED: 2021-05-16
Denial-of-service (DoS) vulnerability in the Multi-Factor Authentication module in Liferay DXP 7.3 before fix pack 1 allows remote authenticated attackers to prevent any user from authenticating by (1) enabling Time-based One-time password (TOTP) on behalf of the other user or (2) modifying the othe...
CVE-2021-29047
PUBLISHED: 2021-05-16
The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.
CVE-2021-22668
PUBLISHED: 2021-05-16
Delta Industrial Automation CNCSoft ScreenEditor Versions 1.01.28 (with ScreenEditor Version 1.01.2) and prior are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.
CVE-2021-29039
PUBLISHED: 2021-05-16
Cross-site scripting (XSS) vulnerability in the Asset module's categories administration page in Liferay Portal 7.3.4 allows remote attackers to inject arbitrary web script or HTML via the site name.