atms running windows xp robbed with usb
Last Updated : GMT 09:07:40
Egypt Today, egypt today
Egypt Today, egypt today
Last Updated : GMT 09:07:40
Egypt Today, egypt today

ATMs running Windows XP robbed with USB

Egypt Today, egypt today

Egypt Today, egypt today ATMs running Windows XP robbed with USB

Tehran - FNA

A high-tech criminal group in Europe has been infecting ATMs (cash machines) with malware, and then completely emptying the machines without a trace. The group has not yet been caught and the attacks continue — and thus very few details have been released — but we assume that they’ve already made off with millions of pounds/euros. The best bit: The hack is carried out by plugging an infected USB stick into ATMs that run Windows XP. Not many people know this, but most of the world’s ATMs run some flavor of Windows. In the olden days, it wasn’t too unusual to find an ATM that had crashed with a blue screen of death (BSOD), and to this day it’s still fairly common to hear the standard Windows “ding” when interacting with an ATM. A conventional ATM might consist of a standard Windows XP PC (or perhaps XP Embedded), connected to a display, a secure keypad, cryptoprocessor, various other bits of hardware, and of course the vault (where the money is stored). The ATM boots up normally, then launches into a full-screen program that manages all of the tasks that a customer might want to carry out. Unfortunately, just like your Windows PC, some ATMs also have USB sockets — and just like your PC, some ATMs will automatically boot whatever’s plugged into the USB socket. The USB socket is hidden behind the ATM’s fascia, but it can be revealed if you know where to cut — and once you’ve loaded the malware on, you can easily cover up the hole. If you have knowledge of the ATM’s software, it’s possible to use malware to inject new features, or disable existing ones. In a word, once you’ve infected the ATM, it’s fairly easy to steal its money with complete impunity. You may have noticed that we’re talking in generalities here — but that’s because it’s all we have. Two German researchers, who have asked to remain anonymous, were contacted by the European bank that had discovered this attack earlier in the year. They analyzed the disk image of an infected cash machine, and worked out that the high-tech criminals must’ve reverse-engineered the ATM’s client software and injected a new menu. When triggered by a code entered on the keypad, the menu gives the criminals direct access to the ATM’s cash-dispensing functions. ”For sure, they had to have a profound knowledge of ATMs,” said one member of the research team. “Most likely they actually had one to test. Either they stole one and reverse engineered the cash client, or most likely, they had someone on the inside.” As you can imagine, given the fact that most ATMs are powered by Windows XP, this isn’t exactly a new attack vector. According to Wired, some banks have upgraded their ATMs to prevent them from booting from external USB drives. This particular attack only affects the cash machines of a sole (undisclosed) bank in Europe, and the researchers say that the malware doesn’t appear to harvest customer PINs or other sensitive data. Basically, they install the malware, wait for the machine to be refilled with cash, and then empty the machine out — presumably in the middle of the night, as it takes quite a while to withdraw thousands of bills. Moving forward, there isn’t a whole lot banks can do, except for upgrade their ATMs — but, as you can imagine, that’s a slow and expensive task. The upgrades filter out slowly, too, so while the ATMs in Berlin might be safe, ATMs deployed in developing countries might take a lot longer to be updated. The only saving grace is that developing a hack like this requires a lot of time and expertise — but considering the attack appears to be untraceable, and can be used repeatedly to accrue millions of euros/dollars, it’s probably worth it. Some other operating systems, including Linux, are used by ATMs, but it’s mostly a Windows-dominated market.

egypttoday
egypttoday

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

atms running windows xp robbed with usb atms running windows xp robbed with usb



GMT 21:06 2017 Monday ,01 May

Will Smith at all-star Jazz Day in Cuba

GMT 06:25 2017 Monday ,27 November

Bali raises volcano alert to highest level

GMT 12:45 2018 Monday ,26 November

Israeli forces close entrance of village in Ramallah

GMT 12:14 2018 Monday ,08 October

HM King congratulates Ugandan President

GMT 13:49 2017 Thursday ,17 August

Alibaba posts 94% surge in quarterly profit

GMT 08:47 2017 Saturday ,10 June

CDD responds to 236 various incidents

GMT 00:31 2015 Saturday ,16 May

Canada plans 30% CO2 emissions cut by 2030

GMT 03:31 2017 Wednesday ,22 February

‘Man-made’ climate change a major woman’s problem

GMT 10:42 2017 Thursday ,16 November

Algeria FM leaves Cairo following tripartite meeting

GMT 11:08 2017 Tuesday ,03 October

Moscow, Riyadh willing to boost cooperation
 
 Egypt Today Facebook,egypt today facebook  Egypt Today Twitter,egypt today twitter Egypt Today Rss,egypt today rss  Egypt Today Youtube,egypt today youtube  Egypt Today Youtube,egypt today youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©

egypttoday egypttoday egypttoday egypttoday
egypttoday egypttoday egypttoday
egypttoday
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
egypttoday, Egypttoday, Egypttoday