Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Kaspersky
A look at the ATM/PoS malware landscape from 2017-2019
Message
<blockquote data-quote="Bot" data-source="post: 875875" data-attributes="member: 52014"><p><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/12/07085340/abstract-atm2-990x400.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p>From remote administration and<a href="https://securelist.com/malware-and-non-malware-ways-for-atm-jackpotting-extended-cut/74533/" target="_blank"> jackpotting</a>, to malware sold on the <a href="https://securelist.com/atm-malware-is-being-sold-on-darknet-market/81871/" target="_blank">Darknet</a>, attacks against ATMs have a long and storied history. And, much like other areas of cybercrime, attackers only refine and grow their skillset for infecting ATM systems from year-to-year. So what does the ATM landscape look like as of 2020? Let’s take a look.</p><p></p><p><span style="font-size: 18px"><strong>The world of ATM/PoS malware</strong></span></p><p></p><p></p><p>ATM attacks aren’t new, and that’s not surprising. After all, what is one of the primary motives driving cyber criminals? Money. And ATMs are cash hubs—one successful attack can net you hundreds of thousands of dollars. In the past, even high-profile <a href="https://securelist.com/apt-style-bank-robberies-increase-with-metel-gcman-and-carbanak-2-0-attacks/73638/" target="_blank">threat actors</a> have made ATMs their prime target.</p><p></p><p>However, attacking ATMs is a bit different from traditional financial-related threats, like phishing emails or spoofed websites. That’s because ATMs operate in a unique space in the tech world: they’re still connected to the corporate networks but at the same time must be accessible to anyone that passes by. The resulting technical differences means the attack methods differ from those used for traditional endpoints.</p><p></p><p>ATMs also share several common characteristics that make them particularly vulnerable to attacks:</p><p></p><ul> <li data-xf-list-type="ul">Traditional software that is part of the warranty offered by the vendors → If major changes occur that are not approved by the ATM vendor, including installing AV software, then sometimes this warranty is lost.</li> <li data-xf-list-type="ul">Regular use of outdated operating systems and the apps its runs on</li> <li data-xf-list-type="ul">Locations chosen in a way that provide access to as many customers as possible, including those in remote regions → These isolated locations often lack any reasonable physical security</li> </ul><p></p><p>Old software means unpatched vulnerabilities—ones criminals can exploit—and isolated areas makes it easier for criminals to gain physical access to the internal ports of the motherboard. This is especially typical for the old ATM machines located in many regions with low resources and no budgets for ATM upgrades. When combined, ATMs become not only a highly profitable target—but an easy one.</p><p></p><p>From 2017 to 2019, there has been a marked increase in ATM attacks, due to a few families being particularly active. These target systems around the globe, regardless of the vendor, and have one of two goals: either stealing customers’ information or funneling funds directly from the bank.</p><p></p><p>Considering all of the above, we decided to delve further into what has been happening in the world of ATM/PoS malware for the last few years.</p><p></p><p><span style="font-size: 18px"><strong>ATM/oOS malware attacks: by the numbers</strong></span></p><p></p><p></p><p>To gain a closer look at ATM malware worldwide, we utilized the statistics processed by Kaspersky Security Network (KSN) over the course of the past three years globally.</p><p></p><p></p><p></p><p><strong><em><p style="text-align: center"><em>Number of unique devices that encountered ATM/PoS malware, 2017-2019 <a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22111058/sl_atmmalware_01-en-atm-malw-act.png" target="_blank">(download)</a></em></p><p></em></strong></p><p>The results showed that the number of unique devices protected by Kaspersky that encountered ATM/PoS (point-of-sale) malware at least once experienced a two-digit growth in 2018—and this number held steady, even increasing slightly, in 2019.</p><p></p><p></p><p></p><p><strong><em><p style="text-align: center"><em>Geography of unique devices that encountered ATM/PoS malware, 2017 <a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22111104/sl_atmmalware_02-en-users-country-2017.png" target="_blank">(download)</a></em></p><p></em></strong></p><p><strong>TOP 10 countries by number of unique devices that encountered ATM/PoS malware in 2017</strong></p><p></p><table style='width: 100%'><tr><td><strong>Country</strong></td><td><strong>Devices</strong></td><td></td>