FBI: Over $20 million stolen in surge of ATM malware attacks in 2025
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是FBI警告ATM“ jackpotting”攻击激增,导致美国人去年损失超过2000万美元。攻击者使用恶意软件,比如Ploutus,绕过银行授权,直接让ATM吐钱。 接下来,看看具体的数据:去年发生了700多起事件,比2020年以来的总数还多。攻击者通常用通用钥匙进入ATM,安装恶意软件。FBI建议金融机构检查系统异常。 还有提到Tren de Aragua团伙被逮捕,他们利用Ploutus盗取数百万现金。这些信息都是关键点。 现在要控制在100字以内,所以得精简。重点包括FBI警告、攻击激增、损失金额、恶意软件名称、绕过银行授权、犯罪手法以及建议防范措施。 可能的结构:FBI警告ATM jackpotting攻击激增导致损失2000万美元以上。犯罪分子利用恶意软件如Ploutus绕过银行授权,在几分钟内提取现金。建议金融机构加强审计和防护措施。 检查字数是否合适,确保信息完整且简洁。 </think> FBI警告称去年美国因ATM" jackpotting"攻击损失超2000万美元。犯罪分子利用恶意软件如Ploutus绕过银行授权,在几分钟内提取现金。此类攻击通常通过物理接触ATM安装恶意软件。 FBI建议金融机构加强系统审计以防范此类事件。 2026-2-20 10:15:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Bank ATM

The FBI warned that Americans lost more than $20 million last year amid a massive surge in ATM "jackpotting" attacks, in which criminals use malware to force cash machines to dispense money.

According to a Thursday FBI flash alert, more than 700 ATM jackpotting incidents were reported last year alone in a significant spike compared to the roughly 1,900 total incidents reported across the United States since 2020.

These attacks can be carried out in minutes and target the software layer controlling an ATM's physical hardware, using malicious tools such as the Ploutus malware. Most often, they go undetected by financial institutions and ATM operators until the cash is already gone.

Wiz

As the FBI explained, cash machines are designed to verify transactions through their bank before dispensing cash. However, Ploutus bypasses this process entirely, allowing the criminals to issue commands directly to the ATM and trigger withdrawals on demand without a bank card, a customer account, or the bank's approval.

"Ploutus malware exploits the eXtensions for Financial Services (XFS), the layer of software that instructs an ATM what to physically do. When a legitimate transaction occurs, the ATM application sends instructions through XFS for bank authorization," the FBI said. "If a threat actor can issue their own commands to XFS, they can bypass bank authorization entirely and instruct the ATM to dispense cash on demand."

To install the malware, the attackers usually gain physical access to the targeted ATM using widely available generic keys. Once inside, they remove the machine's hard drive, copy malware onto it and reinstall it, or even swap the original drive out entirely for another one preloaded with the malicious software.

To defend against these attacks, the FBI encouraged financial institutions to audit their ATM systems for signs of unauthorized removable storage use and unauthorized processes.

"When combined with gold image integrity validation, this approach enables early identification of physical intrusion and malware staging events that would otherwise evade network-based monitoring," the law enforcement agency added.

FBI's warning comes after a wave of arrests targeting members of the Tren de Aragua (TdA) gang, all linked to a massive ATM jackpotting scheme that used Ploutus malware to steal millions in cash from bank ATMs across the United States.

In total, the U.S. Department of Justice has charged 87 Tren de Aragua members over the past six months, who are now facing maximum prison terms ranging from 20 to 335 years each.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025/
如有侵权请联系:admin#unsafe.sh