ATM Jackpotting Losses Cross $20M as Malware Targets U.S. Cash Machines
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住主要信息。 文章主要讲的是FBI警告美国ATM jackpotting事件激增。自2020年以来,超过1900起事件,2025年就有700多起,损失超过2000万美元。攻击者利用恶意软件Ploutus,通过物理和软件漏洞控制ATM吐钞。 Ploutus恶意软件主要针对XFS软件层,绕过银行授权系统。攻击者常用通用钥匙打开ATM面板,替换硬盘或连接外部设备。FBI还提到这些攻击很难通过传统网络安全监测发现。 执法部门将这些事件与有组织犯罪联系起来,最近起诉了几十人,涉及从63台ATM盗取540万美元。FBI建议金融机构加强物理和技术防御措施。 总结下来,关键点包括:FBI警告、事件激增、恶意软件Ploutus、物理访问、有组织犯罪、安全建议。我需要把这些信息浓缩到100字以内。 可能的结构:FBI警告ATM jackpotting激增,损失严重;利用恶意软件和物理漏洞;与有组织犯罪有关;建议加强安全措施。 现在试着组合句子:FBI警告美国ATM jackpotting激增,损失超2千万美元;攻击者利用Ploutus恶意软件和物理漏洞;与有组织犯罪有关;需加强物理和技术防御。 检查字数是否在100字以内,并确保涵盖所有关键点。 </think> FBI警告美国ATM jackpotting激增,损失超2千万美元;攻击者利用恶意软件Ploutus和物理漏洞实施犯罪;案件与有组织犯罪有关;需加强ATM硬件和网络安全防护。 2026-2-23 09:4:30 Author: thecyberexpress.com(查看原文) 阅读量:11 收藏

The Federal Bureau of Investigation (FBI) in a new warning cautioned a sharp increase in ATM jackpotting incidents across the United States.

According to the FBI advisory, more than 1,900 ATM jackpotting incidents have been reported since 2020, with over 700 cases occurring in 2025 alone, resulting in losses exceeding $20 million.

The agency stated threat actors are exploiting both physical and software vulnerabilities in ATMs to deploy malware that forces machines to dispense cash without legitimate transactions.

Unlike traditional banking fraud, ATM cyberattacks of this kind bypass customer accounts entirely, allowing attackers to extract cash within minutes.

Ploutus Malware Driving New Wave of ATM Jackpotting Attacks

The FBI identified ATM jackpotting malware, particularly the Ploutus family, as a major driver behind the surge in attacks. The malware targets the eXtensions for Financial Services (XFS) software layer, which controls ATM hardware functions.

Once installed, Ploutus malware allows attackers to send commands directly to the cash dispenser, bypassing bank authorization systems.

report-ad-banner

Security researchers and agencies have tracked this malware for years. Experts previously noted that Ploutus is “one of the most advanced ATM malware families” observed in financial cybercrime campaigns.

First detected in 2013 by Symantec, the malware was initially used in large-scale attacks across Mexico before its global expansion. Over time, attackers have adapted the tool to work across multiple ATM vendors, including systems from Diebold Nixdorf.

The FBI noted that these attacks focus on the ATM hardware itself rather than bank networks, making them harder to detect through traditional cybersecurity monitoring.

Physical Access Still a Key Entry Point in ATM Jackpotting

One of the most concerning findings in the FBI alert is how often attackers rely on physical access to deploy ATM jackpotting malware.

Threat actors commonly:

  • Open ATM panels using widely available generic keys
  • Remove or replace hard drives with infected versions
  • Connect external devices such as USB drives or keyboards

Because many ATMs still run Windows-based environments, attackers can execute malicious files directly after gaining physical access.

The FBI also listed several indicators of compromise, including unauthorized remote access tools such as AnyDesk or TeamViewer and suspicious executable files placed on ATM systems.

This highlights a recurring issue in ATM security vulnerabilities, cyber defense alone is not enough without strong physical controls.

Law Enforcement Links ATM Jackpotting to Organized Crime

The FBI warning comes shortly after the United States Department of Justice indicted dozens of individuals connected to a coordinated ATM jackpotting scheme targeting credit union ATMs.

According to the indictment, between February 2024 and December 2025, attackers stole at least $5.4 million from 63 ATM machines, with another $1.4 million in attempted theft blocked.

Investigators found that attackers surveyed ATM locations in advance, testing alarm systems before launching malware-based cash-out operations. In one case, a credit union in Kearney, Nebraska, reportedly lost nearly $300,000.

These cases reinforce that ATM jackpotting is no longer a niche cybercrime tactic but part of organized financial crime networks.

Surge in ATM Jackpotting Demands Stronger Security Controls

The FBI emphasized that institutions must strengthen both physical and technical defenses to counter rising ATM cyberattacks. Recommended mitigation steps include hardware monitoring, device whitelisting, disk encryption, and strict audit logging.

A key recommendation is maintaining a verified “gold image” baseline for ATM software to quickly detect unauthorized changes—a method increasingly considered essential against Ploutus malware campaigns.

The increase in ATM jackpotting incidents reflects a broader shift in cybercrime strategy. Instead of attacking complex banking systems, threat actors are targeting simpler but overlooked endpoints like ATMs.

As malware becomes easier to deploy and physical vulnerabilities persist, financial institutions face a growing reality: ATM security is now a frontline cybersecurity challenge, not just an operational concern.


文章来源: https://thecyberexpress.com/fbi-flags-rise-in-atm-jackpotting-attacks/
如有侵权请联系:admin#unsafe.sh