ATM Malware - A Brief Description PDF
ATM Malware - A Brief Description PDF
ATM Malware - A Brief Description PDF
Most ATMs in the world have a computer system which designed to work 24x7 and
are loaded with Microsoft Windows Operating System. These are very similar to the
desktop operating system with special customization and some of the security
additions like firewall protection, hardened operating system etc.
ATM compromise due to Malware is now nearly 7 years since first reported in
Mexico in 2013. There are number different variants of ATM attack happened across
the globe since then. Fraudster / attacker come prepared to attack target ATM and is
done through a crime syndicate. These Malware are typically a licensed software
provided by the mastermind and front runner need to pay for the license key each
time when a single ATM to be compromised.
Most often traces of the malware is left behind at the ATM and when a detailed
study of the ATM logs or a forensic investigation of the impacted ATM hard disk
drive (HDD) is carried out details are available how the attack is carried out.
Based on our past study of these attacks until now, there are 4 different vectors of
attack in any make of the ATM we have seen globally. These are
1) ATM Attack where OS HDD is offline and fraudster boots ATM through an
alternative media and manipulate the OS HDD data and inject malware. Post
this ATM is made to boot as usual and creating a unique interface with
malware window and give command to dispense cash unauthorizedly
2) ATM attack where OS HDD booted and by logging in as Windows local admin,
a malware is injected into the HDD. Similarly, a malware may come through
the network ports or devices connected in the network. Once ATM is
compromised through the malware fraudster interfaces with it to give direct
command to dispense cash unauthorizedly
3) Black Box attach where ATM PC Core is not used to attack rather ATM
dispenser is directly connected to a black box (a PC or a laptop or
smartphone) and dispense command is given to the dispenser module.
There will not be any record in the ATM for such dispenses as ATM PC Core is
not used to compromise here
4) Man-In the -Middle Attack. In this vector, ATM network is compromised, and
malware could make changes to the data being communicated between ATM
and financial switch or a device put between the network points to give an
unauthorized approval for a transaction without hitting actual banks financial
system