SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : 2026 TeoTwawKi ... 2032 Darkest Interregnum -- Ignore unavailable to you. Want to Upgrade?


To: Pogeu Mahone who wrote (143064)8/14/2018 1:31:51 PM
From: Elroy Jetson1 Recommendation

Recommended By
loantech

  Respond to of 217825
 
In order to carry out the ATM attacks the Russian mobsters first dressed as ATM technicians and used an endoscope to attach a laptop computer with a mirror image of the ATMs operating system along with a mobile device to the targeted ATM.”

Once connected to the ATM computer they loaded they loaded Ploutus.D malware onto the targeted ATM. This operation has likely been carried out over the past 18 months.

For this reason they have targeted stand-alone ATMs in big-box stores, pharmacies, and other front-loaded ATM machines where full access to the ATM is possible through the card slots. In particular the "ATM technicians" have targeted Diebold Opteva ATMs.

The program now completed, cash-out gangs use copies of bank cards previously used with now known PINs which the ATM sent to the gang over the past 18 months using SMS messaging. In other attack a sequence of keycodes prompt the ATM to dispense the entire cassette of cash in a quick series of transactions.

Diebold voting machines are those which were targeted by Russian security security services during the last presidential election, which strongly suggests Russian security services working with Russian mafia have an insider working at Diebold on whom they have compromising material, in much the same way Russia has compromised Trump's actions.

Banks typically operate back-loaded ATMs which would have required bank employees to unlock the access door inside the bank for the "technician" with fake credentials bank employees are required to verify.

The Secret Service alert says ATMs still running on Windows XP are particularly vulnerable, and it urged ATM operators to update to a version of Windows 7 to defeat this specific type of attack. - krebsonsecurity.com

An cable coupled with a smart phone used in similar ATM attacks in Mexico last year when attached to an endoscope.