ATM-spitting malware, AKA Jackpotting, is an increasing global danger. This guide outlines the threat posed by Jackpotting and how users need to defend against it to keep their funds secure.
Jackpotting is a type of malicious software that targets ATMs, allowing the perpetrator to empty its funds. It's an increasingly prevalent threat that has shown up on the global stage in recent years, and users should take precautions to help protect against it.
What is Jackpotting Malware?
Jackpotting malware is typically delivered through a malicious USB stick or other device, and can be used to access the confidential information stored within an ATM. Once infected with the malware, the ATM can be drained of its funds like a slot machine “Jackpot”. The perpetrator will often install specialist hardware to control and permit withdrawal functions on the targeted ATM, enabling them to empty it quickly and quietly.
Jackpotting malware is one of the newest and most sophisticated forms of cyber-crime. It targets a variety of ATMs, including those manufactured by Diebold Nixdorf, NCR Corporation, Fujitsu, and Wincor Nixdorf, which account for around 80% of all ATM’s worldwide. The hackers are able to bypass security measures such as anti-virus programs and access confidential information stored in the ATM hardware. This enables them to access the machine remotely and issue commands such as cash withdrawals or deposits. In some cases, the malware has even been used to reprogram the software that runs on the ATM itself – effectively allowing perpetrators to directly control it without needing any additional hardware.
How Does Jackpotting Spread and Attack ATMs?
Jackpotting works by targeting an ATM’s security vulnerabilities, exploiting those weaknesses to gain access. The attackers then inject malicious code into the machine's operating system and use the malware to spy upon or directly control the affected ATM's hardware. Jackpotting is especially dangerous as it can potentially allow malicious actors to access confidential customer information stored within the ATM, compromising their personal security.
Once Jackpotting malware has been infiltrated into an ATM, it is programmed to carry out specific tasks. This can include withdrawing cash from the machine, sending money transfers to remote accounts, loading malicious software onto the device or tampering with customer card data. The perpetrators may also seek to disable camera connections or otherwise obscure their activities. As with any cyber attack, attackers can employ social engineering techniques in order to gain further access or control of banking machines without alerting banks and other financial services providers. Depending on the criminals’ capabilities, they can even remotely manage a single or multiple ATMs.
What Damage Can Jackpotting Cause?
Jackpotting is a serious threat to user security and their funds. The damage caused by jackpotters can range from simply stealing card information to physically emptying the machine of its cash reserves. In addition, it can even grant hackers access to the ATM's network and other machines on the same network, allowing them to exploit additional vulnerabilities in the system or infect more machines with malware.
Jackpotting can also have other serious consequences, such as damaging customer confidence in the security of their accounts, which could lead to a drop in ATM usage. In addition, banks can incur large financial losses due to the amount of money jackpotters are able to steal from their machines. Unfortunately, because jackpotting is especially difficult to detect and prevent, banks and credit unions must be vigilant about keeping their ATM networks up-to-date with security patches and monitoring for any suspicious activity.
How to Defend Against Jackpotting Attacks?
To defend against Jackpotting attempts and reduce the risk of being a victim, it is important to take certain precautions. For example, all ATMs should be regularly patched and updated, as well as monitored constantly for suspicious activity. It is also recommended that users regularly check their ATM accounts to see if they have been compromised or any unusual transactions have been made. Additionally, organizations should encourage their employees to be vigilant when using ATMs and always look for signs of malicious tampering.
Other best practices for defending against Jackpotting include regularly training staff and increasing security across enforcement teams. It is also important to ensure the ATM hardware is up-to-date with the latest financial industry security standards, and that physical and logical access to the ATM’s internal components is properly secured. Additionally, organizations should deploy anti-malware solutions on their ATMs to detect known threats, as well as leverage behavioral-based malware detection techniques to identify previously unknown threats. Ultimately, following these precautions can help reduce your risk of becoming a victim of Jackpotting attacks and keep your customers’ accounts safe