Jump to content
Nytro

LIVE IN THE ATM MALWARE TRENCHES

Recommended Posts

 

Publicat pe 3 mai 2017

Sergey Golovanov
Igor Soumenkov
Kaspersky Lab

In 2016 Kaspersky Lab employees participated in incident response cases that took place in dozens of financial institutions around the globe. In most cases we had to provide forensics analysis of ATMs. When Carbanak attack details were announced at #TheSAS2015, criminals also found this information useful. Other criminal groups eagerly adopted the same TTPs. Banks started to suffer from attacks on ATMs including both, malware and physical access.
These are:
• Direct attacks on the peripherals and low-level hardware protocols
• Hacker movie-style hardware drops in bank offices
• Carbanak-like software attacks on ATM software layer
• Bluetooth HID dongles implanted in ATMs instead of black boxes
We will provide details about each of these cases and present a cheap and simple hardware design that (when applied with a bit of physical labor) can empty one of the most popular ATM models in the world.

https://sas.kaspersky.com

Twitter @KasperskySAS

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...