FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。好的,我先快速浏览一下文章内容。 文章主要讲的是FBI警告美国ATM抢劫事件增加,2025年损失超过2000万美元。从2020年以来有1900起事件,去年700起。DoJ提到从2021年以来损失4073万美元。犯罪分子利用恶意软件Ploutus感染ATM,通过物理和软件漏洞,使用通用钥匙打开ATM,然后用恶意软件让ATM吐钱。他们有两种部署方式:替换硬盘或者连接电脑复制。这些恶意软件直接与硬件交互,绕过安全控制。Ploutus于2013年在墨西哥出现,通过XFS层控制ATM。 FBI建议加强物理安全、安装传感器、摄像头、更换锁芯、审计设备、更改默认凭证、设置自动关机模式、设备白名单和日志维护。 好的,现在需要把这些信息浓缩到100字以内。重点包括:FBI警告ATM抢劫增加,损失金额,犯罪手段(恶意软件Ploutus),以及建议措施。 总结的时候要简洁明了,不使用“文章内容总结”之类的开头。 可能的结构:FBI警告ATM抢劫事件增加,损失严重;犯罪分子利用恶意软件Ploutus通过物理和软件漏洞感染ATM;建议加强物理安全和系统防护。 这样应该可以控制在100字左右。 </think> 美国联邦调查局警告称,ATM抢劫事件激增,2025年损失超2000万美元。犯罪分子利用恶意软件Ploutus感染ATM并盗取现金。建议加强物理安全和系统防护以应对威胁。 2026-2-20 08:5:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Financial Crime / Banking Security

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025.

The agency said 1,900 ATM jackpotting incidents have been reported since 2020, out of which 700 took place last year. In December 2025, the U.S. Department of Justice (DoJ) said about $40.73 million has been collectively lost to jackpotting attacks since 2021.

"Threat actors exploit physical and software vulnerabilities in ATMs and deploy malware to dispense cash without a legitimate transaction," the FBI said in a Thursday bulletin.

The jackpotting attacks involve the use of specialized malware, such as Ploutus, to infect ATMs and force them to dispense cash. In most cases, cybercriminals have been observed gaining unauthorized access to the machines by opening an ATM face with widely available generic keys.

There are at least two different ways by which the malware is deployed: Removing the ATM's hard drive, followed by either connecting it to their computer, copying it to the hard drive, attaching it back to the ATM, and rebooting the ATM, or replacing it entirely with a foreign hard drive preloaded with the malware and rebooting it.

Regardless of the method used, the end result is the same. The malware is designed to interact directly with the ATM hardware, thereby getting around any security controls present in the original ATM software.

Because the malware does not require a connection to an actual bank card or customer account to dispense cash, it can be used against ATMs of different manufacturers with little to no code changes, as the underlying Windows operating system is exploited during the attack.

Ploutus was first observed in Mexico in 2013. Once installed, it grants threat actors complete control over an ATM, enabling them to trigger cash-outs that the FBI said can occur in minutes and are harder to detect until after the money is withdrawn.

"Ploutus malware exploits the eXtensions for Financial Services (XFS), the layer of software that instructs an ATM what to physically do," the FBI explained.

"When a legitimate transaction occurs, the ATM application sends instructions through XFS for bank authorization. If a threat actor can issue their own commands to XFS, they can bypass bank authorization entirely and instruct the ATM to dispense cash on demand."

The agency has outlined a long list of recommendations that organizations can adopt to mitigate jackpotting risks. This includes tightening physical security by installing threat sensors, setting up security cameras, and changing standard locks on ATM devices.

Other measures involve auditing ATM devices, changing default credentials, configuring an automatic shutdown mode once indicators of compromise are detected, enforcing device allowlisting to prevent connection of unauthorized devices, and maintaining logs.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/fbi-reports-1900-atm-jackpotting.html
如有侵权请联系:admin#unsafe.sh