Categories: SecurityWorkspace

Cash Machines Hacked By Cybercriminals For Free Money

Customers will no longer need to look over their shoulder for the most worrying threat when using a cash point following the news that cybercriminals have developed a way to hack into and empty ATM’s.

The Tyupkin malware was detected by online security firm Kaspersky as having infected cash machines at over 50 banks across Eastern Europe, netting millions for the criminals involved, and now looks to have also spread to the U.S., China and India.

Tyupkin infects cash machines running older 32-bit versions of the Windows operating system, and allows the criminals direct control of the machine, meaning they can tell it to dispense all of its cash. However, the exploit does need physical access to the machines so that the criminals can insert a bootable CD in order to install the malware, which becomes active when the machine is rebooted, locking down the machine for the criminal.

Hack attack

Users are prompted for a specific PIN key, which when correctly entered shows information on how much money is present in each machine cassette, with a maximum of 40 notes available to withdraw each time.

In order to avoid detection, the malware has also been designed to only be active at certain times during the night, meaning it avoids other busier periods.

“Over the last few years, we have observed a major upswing in ATM attacks using skimming devices and malicious software,” Vicente Diaz, principal security researcher at Kaspersky Lab, said. “Now we are seeing the natural evolution of this threat with cyber-criminals moving up the chain and targeting financial institutions directly.

“Our recommendations for the banks is to review the physical security of their ATMs and consider investing in quality security solutions.”

The discovery of this malware, although small in scale at this point, does mean that many European banks will need to evaluate the need to tighten the security around their cash points, according to Jean Taggart, senior security researcher at Malwarebytes.

“The larger issue is that the banks still do risk analysis and fraud budgets to evaluate if the problem needs immediate attention, rather than addressing the problem from the get go,” he added.

A similar malware variant, which allowed criminals to control infected ATMs via remote text message, was detected earlier this year by security firm Symantec. Cash machines have become an increasingly popular target for attack from cybercriminals in recent years, particularly following the news that almost 95 percent of ATMs continue to run on Windows XP.

Are you a security pro? Try our quiz!

Mike Moore

Michael Moore joined TechWeek Europe in January 2014 as a trainee before graduating to Reporter later that year. He covers a wide range of topics, including but not limited to mobile devices, wearable tech, the Internet of Things, and financial technology.

Recent Posts

UK CMA Seeks Feedback On Microsoft, Amazon AI Partnerships

British regulator invites feedback on major partnerships Microsoft and Amazon have struck with smaller AI…

15 hours ago

Google Fires More Staff Over Israel Protest

Another 20 staff have been fired by Google over Israel protest and their “completely unacceptable…

16 hours ago

Australian PM Hits Out At Elon Musk Over Knife Attack Video

Censorship row brewing down under, after the Australian Prime Minister calls Elon Musk an 'arrogant…

17 hours ago

US SEC Seeks $5.3 Billion Fine From Terra’s Do Kwon

Financial regulator asks New York judge to impose $5.3 billion in fines against Terraform Labs…

18 hours ago

Microsoft Launches Smallest AI Model, Phi-3-mini

Lightweight artificial intelligence model launched this week by Microsoft, offering more cost-effective option for Azure…

22 hours ago

US Senate Passes TikTok Ban Or Divestment Bill

ByteDance protest falls on deaf ears, as Senate passes TikTok ban or divest bill, with…

23 hours ago