This Hacker Robbed ATM's (The Ploutus Wave)




This Hacker Robbed ATM's (The Ploutus Wave) Hacking ATMs Cyber criminals are adopting creative and sophisticated tactics to collect users’ personal information. Banking is one of the industries most targeted by cyber criminals. Very interesting are the techniques adopted by criminals to steal money with malicious code or to capture users’ PINs directly from the ATMs. It really just blows you away how sophisticated these folks are in thinking this stuff up. US Intelligence estimated annual losses from ATM skimming at more than $1 billion in 2008. In the past, cyber criminals used phony number pads and skimmers to steal debit card PIN data, a risky practice due to the necessity to deploy the sniffing equipment and then come back to remove it while avoiding surveillance. For this reason, cyber criminals have evolved their attack schema to steal users’ PINs directly from ATMs and remote locations like gas pumps. The hackers exploit banks’ wireless Internet connections used by financial institution to monitor ATM cash flow and update software. A History of Attacks Criminals are able to capture PINs remotely. Another common tactic is to get jobs with technical-support companies that give them access to ATMs, then installing malicious code that can steal and transmit PIN data back to the attackers via e-mail address or through a phone line. Remote hacking of Web-connected ATMs is a serious problem that occurs very frequently. In March 2014, the FBI identified 17 people involved in a card fraud that stretched from Bulgaria to Chicago. The technology used in these attack schemas is available in the cyber criminal ecosystem. Criminals could easily acquire memory chips and transmitters that enable to assemble PIN hacking devices, thin and light enough to be hidden easily in ATM installed by banks. Ploutus malware – How to rob ATMs with SMS messages Tyupkin malware is just one of the more recent malicious code spotted by investigators. Experts at Symantec discovered a series of attacks against ATM machines based on Windows XP. In March 2014, a team of researcher at Symantec detected a strain of malware dubbed Ploutus that is able to exploit a weakness in Windows XP based ATMs. The malware infected a few machines in Mexico, and according to the experts, the threat actors were able to steal cash just by sending text messages to the automated teller machine. The new variant was identified as Backdoor.Ploutus.B. What was interesting about this variant of Ploutus was that it allowed cybercriminals to simply send an SMS to the compromised ATM, then walk up and collect the dispensed cash. It may seem incredible, but this technique was being used in a number of places across the world at the time. How to Protect the ATMs The banking industry is working to improve security of modern ATMs to respond to the numerous cyber-attacks experts are observing. The new automated teller machines have enhanced security features such as hard-drive encryption enabled by default, which can prevent malware installations. However, older ATMs still deployed worldwide are running on Windows XP and in many cases vulnerable to external cyber-attacks, and the problem is particularly challenging for those machines deployed in all sorts of remote locations. Another difficulty that needs to be addressed is the physical security of the computer inside the ATMs. While the ATM’s money is locked inside a safe, the computer generally is not. Without adequate physical security for these older ATMs, the attacker has the upper hand, and so can grab your hard-earned bucks with much ease. #hacker #hackerexposed #Ploutus

Hello and welcome to the temple of cybersecurity. Now you are watching This Hacker Robbed ATM's (The Ploutus Wave) published at October 22, 2022 at 11:15AM.
For more hacking info and free hacking tutorials visit: https://ift.tt/YgyphAe
follow us on:

Youtube: https://www.youtube.com/channel/UCiu1SUqoBRbnClQ5Zh9-0hQ/
Whatsapp: https://ift.tt/CNeEhSg
Reddit: https://ift.tt/e7hoHzp
Telegram: https://ift.tt/kRBTI4U
NFT store: https://mintable.app/u/cha0smagick
Twitter: https://twitter.com/freakbizarro
Facebook: https://web.facebook.com/sectempleblogspotcom/
Discord: https://discord.gg/wKuknQA



Ignore tags:
#hacking,#infosec,#tutorial,#bugbounty,#threat,#hunting,#pentest,#hacked,#ethical,#hacker,#cyber,#learn,#security,#computer,#pc,#news

Comments