自动取款机(ATM)容易遭到恶意软件破坏

2014/10/29

Legend ATM machines are not vulnerable to the other terminal system is infected with malware, as they relate to their network and user interaction isolation. Although ATM is not likely to be infected, but already there is sufficient evidence to prove that the offender can overcome obstacles, use ATM malware successfully destroy ATM.

ATM malware damage

In 2013, researchers at the Chaos Communications Conference held annual sweat Berg reported that hackers may have used ATM malware infection, they are reluctant to disclose the bank’s ATM cut a hole, and then use the USB malicious software onto the system. The hacker patch the hole on the machine in order to cover their tracks. The bank found that the cash machine is underrun after that ATM was destroyed.

 

Software used by hackers and do not depend on identifying specific customer account or account information. It identifies a number of different denominations of money, and allows criminals to extract money denominations.

In March 2014, for the ATM machine malware “Ploutus” is recognized. This is because hackers need physical access to the machine, especially in the independent ATM machines and retail stores. Ploutus allow a hacker to control the machine and steal an unlimited amount of cash. The latest version of the software allows malicious hackers to use text messaging, remote control ATM machine. This remote control to set the mobile phone in the machine.

Not all were found infected with malicious software, ATM machines need physical access. Some agency network security vulnerabilities using malicious software into the terminal. In 2013, it is known as the “dump memory Collector” (Dump Memory Grabber) was confirmed infected with POS and ATM to steal credit card data. This malicious software can scan ATM reservoir to obtain credit card data.

According to security company Group-IB, the malicious software has been used to steal card data major US banks, including JP Morgan Chase Bank Bank , Capital Bank and Citibank. Group-IB believes “ Memory Dump Collector “has been spread insiders who have authorized access to the target terminal.

Why ATM machines so vulnerable to damage?

When an organization attempts to isolate and restrict access to ATM machines through the user interface from their networks, ATM is only a problem with your ordinary desktop computer terminal is not much different. In fact, most of the cash dispenser are using Windows operating systems, hackers and fraudsters favorite attack platform.

When Microsoft announced in April this year to stop the security update for Windows XP, most ATM machines are still in use, introduced in 2001 operating system. Unsupported operating system is the main target of hackers. No matter how safe you think your ATM, hackers have proven they can beat any conventional method. Hackers can use the following method using malicious software from infecting your ATM:

“Sabotage network security

“Joined the organization conspirators

“Physical damage to the machine

Protect your ATM software, not just your ATM machine

Protect your ATM system the safest assumption is test failure. Your application must be able to safe operation in an infected environment. That is why the Komodo invented a unique solution called SecureBox.

Comodo ‘s SecureBox not a terminal protection. It is a fortress, on-machine communication allows your application to run a safe and infection. As medieval castle, provides a safe harbor for the growing enemy.

Learn more about Securebox

Tags:

Write a comment

Name
Comment