{"id":6109,"date":"2016-09-30T21:52:45","date_gmt":"2016-09-30T21:52:45","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6109"},"modified":"2022-04-26T16:47:54","modified_gmt":"2022-04-26T14:47:54","slug":"atm-attacks-1","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/atm-attacks-1\/6109\/","title":{"rendered":"ATMs are terrifyingly easy to hack"},"content":{"rendered":"<p>Considering that ATMs have precisely one purpose \u2014 to connect bank customers with their accounts \u2014 we decided to investigate the effort it takes to commit a successful attack on an ATM. Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM\u2019s internals.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/videoseries?list=PLPmbqO785Hlv10fOKEkcmBwAsq-ytasFD&amp;hl=en_US\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>As you may know, an ATM is really just a basic PC with some custom hardware added. The PC runs an operating system similar to the one installed on your laptop. In fact, in most cases it is Windows (<a href=\"https:\/\/business.kaspersky.com\/atm-pos-protect\/5641\/\" target=\"_blank\" rel=\"noopener nofollow\">Windows XP<\/a>, at that).<\/p>\n<blockquote class=\"twitter-pullquote\"><p>ATMs are terrifyingly easy to hack #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FA5nZ&amp;text=ATMs+are+terrifyingly+easy+to+hack+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In the video, we see somebody opening the machine using a key, inserting a flash drive containing malware, and then using a keyboard to send a command. The attack ends with the ATM spewing out cash.<\/p>\n<p>This third part can be repeated until the ATM is empty.<\/p>\n<p>An ATM\u2019s service lock isn\u2019t much of an obstacle for a criminal; there are many ways to acquire a duplicate of the keys used by service teams and cash couriers. Not all ATMs are equipped with alarm systems, either. And there are many ways to neutralize security cameras, too.<\/p>\n<p>Ultimately, criminals are not having much trouble infecting ATMs with malware.<\/p>\n<p>In fact, physical access isn\u2019t even necessary; malware can be planted over the Internet (more than a few ATMs are directly <a href=\"https:\/\/www.kaspersky.co.za\/blog\/atm-jackpotting-explained\/11323\/?utm_medium=blg&amp;utm_source=kb_post_160930&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">exposed to the Web<\/a>). Once an ATM has been compromised, <a href=\"https:\/\/business.kaspersky.com\/atms-attacks\/\" target=\"_blank\" rel=\"noopener nofollow\">a shady individual<\/a> arrives late at night with a backpack, packs up the cash, and swiftly disappears.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Getting a physical access,\u00a0criminals do not have\u00a0much trouble infecting ATMs with malware. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FA5nZ&amp;text=Getting+a+physical+access%2C%C2%A0criminals+do+not+have%C2%A0much+trouble+infecting+ATMs+with+malware.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>How are such attacks even possible? In this particular case, besides the obvious ease of physical access to the ATM\u2019s interiors, there are software-related issues as well. ATM PCs apparently lack any serious antimalware protection. Default Deny technology, which would prevent any undesirable software from running, isn\u2019t there either. As a result, criminals can run any arbitrary code on this machine.<\/p>\n<p>Nothing is preventing the deployment of unauthorized hardware, either, because ATMs have no hardware authentication tools.<\/p>\n<p>Hence, looting an ATM is a trivial task, and banks are losing big.<\/p>\n<p>Kindly fill down the form below to receive more information on the ATMs protection.<br>\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p> Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM\u2019s internals.<\/p>\n","protected":false},"author":2706,"featured_media":15325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[401,36,192,97],"class_list":{"0":"post-6109","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-atm","10":"tag-malware-2","11":"tag-protection","12":"tag-security-2"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/atm-attacks-1\/6109\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/atm-attacks-1\/4201\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/atm-attacks-1\/6109\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/atm-attacks-1\/6109\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/atm\/","name":"atm"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/6109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=6109"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/6109\/revisions"}],"predecessor-version":[{"id":24257,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/6109\/revisions\/24257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15325"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=6109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=6109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=6109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}