{"id":14637,"date":"2019-02-20T10:45:03","date_gmt":"2019-02-20T18:45:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/02\/20\/news-8386\/"},"modified":"2019-02-20T10:45:03","modified_gmt":"2019-02-20T18:45:03","slug":"news-8386","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/20\/news-8386\/","title":{"rendered":"ATM Hacking Has Gotten So Easy, the Malware&#8217;s a Game"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c6c7aa2f94f2a1b74c536b9\/master\/pass\/atm_featured-1125750978.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 20 Feb 2019 16:12:51 +0000<\/strong><\/p>\n<p><span class=\"lede\">As long as <\/span>there are ATMs, hackers will be there to drain them of money. Although <a href=\"https:\/\/www.wired.com\/story\/jackpotting-atm-hacks\/\">ATM-targeted \u201cjackpotting\u201d malware<\/a>\u2014which forces machines to spit out cash\u2014has been on the rise for several years, a recent variation of the scheme takes that concept literally, turning the machine\u2019s interface into something like a slot machine. One that pays out every time.<\/p>\n<p>As <a href=\"https:\/\/securelist.com\/atm-robber-winpot\/89611\/\" target=\"_blank\">detailed by<\/a> Kaspersky Lab, so-called WinPot malware afflicts what the security researchers describe only as a \u201cpopular\u201d ATM brand. To install WinPot, a hacker needs either physical or network access to a machine; if <a href=\"https:\/\/www.wired.com\/2017\/04\/hackers-emptying-atms-drill-15-worth-gear\/\">you cut a hole in the right spot<\/a>, it&#x27;s easy enough to plug into a serial port. Once activated, the malware replaces the ATM&#x27;s standard display with four buttons labeled \u201cSPIN\u201d\u2014one for each cassette, the cash-dispensing containers within an ATM. Below each of those buttons, it shows the number of bank notes within each given cassette, as well as the total values. Tap SPIN, and out comes the money. Tap STOP, and well, you know. (But at that point, ATM cyberthief, why would you?)<\/p>\n<p>\u201cThese people do have a sense of humor and some spare time.\u201d<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Konstantin Zykov, Kaspersky Lab<\/p>\n<p class=\"paywall\">Kaspersky started tracking the WinPot family of malware back in March of last year, and in that time has seen a few technical versions on the theme. In fact, WinPot appears to be something of a variation in its own right, inspired by a popular ATM malware dating back to 2016 called Cutlet Maker. Cutlet Maker also displayed detailed information about the contents of its victim ATMs, though rather than the slot motif it used an image of a stereotypical chef giving a wink and the hand gesture for \u201cOK.\u201d<\/p>\n<p class=\"paywall\">The similarities are a feature, not a bug. \u201cThe latest versions of \u2018cashout\u2019 ATM software contain only small improvements compared with previous generations,\u201d says Konstantin Zykov, senior security researcher at Kaspersky Lab. \u201cThese improvements allow the criminals to automate the jackpotting process because time is critical for them.\u201d<\/p>\n<p class=\"paywall\">That also goes some way to explaining the absurdist bent ATM hackers have embraced of late, an atypical trait in a field devoted to secrecy and crime. ATM malware is fundamentally uncomplicated and battle-tested, giving its proprietors space to add some creative flair. The whimsical tilt in WinPot and Cutlet Maker \u201cis not usually found in other kinds of malware,\u201d Zykov adds. \u201cThese people do have a sense of humor and some spare time.\u201d<\/p>\n<p class=\"paywall\">After all, ATMs at their core are computers. Not only that, they&#x27;re computers that often run <a href=\"https:\/\/www.wired.com\/2017\/05\/still-use-windows-xp-prepare-worst\/\">outdated, even unsupported versions of Windows<\/a>. The primary barrier to entry is that most of these efforts require physical access to machine, which is one reason why ATM malware hasn\u2019t become more popular in the US, with its relatively pronounced law-enforcement presence. Many ATM hackers deploy <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/01\/07\/atm-hacking-arrests-tyupkin\/\" target=\"_blank\">so-called money mules<\/a>, people who assume all the risk of actually extracting money from the device in exchange for a piece of the action.<\/p>\n<p class=\"paywall\">But WinPot and Cutlet Maker share an even more important trait than waggery: Both have been available for sale on the dark web. Kaspersky found that one could purchase the latest version of WinPot for as little as $500. That\u2019s unusual for ATM hackers, who have historically kept their work closely guarded.<\/p>\n<p class=\"paywall\">\u201cMore recently, with malware such as Cutlet Maker and WinPot, we see this attack tool is now commercially for sale for a relatively small amount of money,\u201d says Numaan Huq, senior threat researcher with Trend Micro Research, which teamed up with Europol in 2016 for a <a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-cashing-in-on-atm-malware.pdf\" target=\"_blank\">comprehensive look<\/a> at the state of ATM hacking. \u201cWe expect to see an increase in groups targeting ATM machines as a result.\u201d<\/p>\n<p class=\"paywall\">WinPot and Cutlet Maker represent only a slice of the ATM malware market. Ploutus and its variants have haunted cash machines <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/01\/new_ploutus_variant.html\" target=\"_blank\">since 2013<\/a>, and can force an ATM to spit out thousands of dollars in mere minutes. In some cases, all a hacker needed to do was send a text message to a compromised device to make an illicit withdrawal. Typukin Virus, popular <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/tyupkin-malware-atm-security-malware\" target=\"_blank\">in Russia<\/a>, only responds to commands during specific windows of time on Sunday and Monday nights, to minimize the chances of being found. <a href=\"https:\/\/threatpost.com\/latin-american-atm-thieves-turning-to-hacking\/128289\/\" target=\"_blank\">Prilex<\/a> appears to have been homegrown in Brazil, and runs rampant there. It goes on and on.<\/p>\n<p class=\"paywall\">Stopping this sort of malware is relatively easy; manufacturers can create a whitelist of approved software that the ATM can run, blocking anything else. Device control software also can prevent unknown devices\u2014like a malware-carrying USB stick\u2014from connecting in the first place. Then again, think of the last bodega ATM you used, and how long it&#x27;s been since it got any kind of updates.<\/p>\n<p class=\"paywall\">So expect ATM hacking to only get more popular\u2014and more farcical. At this point, it&#x27;s literally fun and games. \u201cCriminals are just having fun,\u201d says Zykov. \u201cWe can only speculate that since the malware itself is not that complicated they have time to spend on these \u2018fun\u2019 features.\u201d<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/atm-hacking-winpot-jackpotting-game\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c6c7aa2f94f2a1b74c536b9\/master\/pass\/atm_featured-1125750978.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 20 Feb 2019 16:12:51 +0000<\/strong><\/p>\n<p>A strain of ATM malware called WinPot turns the act of cashing out into something like a slot machine. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14637","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14637"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14637\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14637"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}