New research by FireEye’s Mandiant group shows that the infamous FIN7 cybercrime group is using new hacking tools in order to target ATMs produced by NCR Corporation. The new tools include a malware dropper called BOOSTWRITE that is designed to deliver multiple payloads. The malware delivered by BOOSTWRITE consists of
Cybersecurity researchers with Kaspersky Lab say that hackers working for the North Korean government have been targeting ATM machines in India with a new strain of payment card skimming malware. The campaign has been active since last summer. The malware used in the attacks is called ATMDTrack, which is linked to
With ATM hacking and credit card skimming becoming more easily prevented and detected, some criminals are resorting to the use of explosive breaches to target ATM machines.
A new report by Kaspersky Lab describes WinPot, a new malware strain designed for “ATM jackpotting” attacks, in which cyber criminals get ATMs to spit out cash. The striking thing about WinPot is that the interface is designed to look similar to a slot machine, as if to underline that plundering cash
“An extensive testing session carried out by bank security experts at Positive Technologies has revealed that most ATMs can be hacked in under 20 minutes, and even less, in certain types of attacks. Experts tested ATMs from NCR, Diebold Nixdorf, and GRGBanking, and detailed their findings in a 22-page report