![]() ![]() (Fig.7: Screenshot of shopping site on the dark web: Ploutus-D added to cart)Īs hacking tools and techniques become ubiquitous, it is important to be aware and vigilant, by understanding new and sophisticated trends in hacking, and how you can defend yourself against them. The source code for this malware, along with instructions on how to use it, are sold on the dark web. It allows the hacker to suspend all the cash from affected machines, in a few minutes. It works by compromising components of a well-known multivendor ATM software, to gain control over hardware devices such as dispensers, card readers, and pin pads. (Fig.6: Screenshot of dark web forum: Files that aid hacking put for sale)Ī recently uncovered, active ATM Jackpotting method that uses malware, is called Ploutus-D. This method also targets machines that run on Windows XP. The product description is so detailed that even a layman can use it to hack an ATM.Īnother prevalent method to fraudulently dispense cash from ATM Machines, is by infecting them with a Malware hosted USB drive. This card is capable of drawing out all the money that is available in the affected machine which could amount to as much as $500,000. This malware mainly targets ATM machines that run on Windows XP. The image above shows the product description provided on dark web marketplaces, to advertise the features and benefits. (Fig.1: Screenshot of dark web shopping site: ATM Malware Card with product description) The Trigger card is then used to dispense cash from ATMs. Once the ATM Malware card is installed in the ATM, it captures card details of all the customers who subsequently use the ATM. This manual provides step-by-step instructions on how to use the card to suspend cash from ATM machines. On the dark web, anybody can buy an ATM Malware Card, that comes with the PIN Descriptor, Trigger Card and an Instruction Guide. And most of these devices can be operated remotely, using an Antenna, to target systems that run on basic Windows XP. This is possible because the devices sold on the dark web come with detailed instruction manuals. ![]() We have encountered amateurs with rudimentary skills, who have hacked ATMs, using the tools and tutorials available on dark web marketplaces. There used to be a time when hacking an ATM required sophisticated skills and tools. At CloudSEK, we have unearthed a range of techniques and devices, that are used and sold on the dark web, for the purpose of hacking ATMs. Though most of us have a general understanding of the dark web, we are still unaware of the specific activities it facilitates, and how it affects us on a daily basis.ĪTMs are a common part of our everyday lives, yet we know little about how ATMs can be exploited, by even the most novice of attackers. The dark web, which is a component of the deep web, is the nesting ground of online, as well as offline criminal activities. ![]()
0 Comments
Leave a Reply. |