- Back to Home »
- Using just a good old fashioned saw and a USB stick full of malicious software, criminals are able to deplete cash machines of their highest value bills. December 31, 2013 5:42 PM PST USB drives. (Credit: CBS Interactive) Robbing ATMs is nothing new. There's the everlasting stick-em-up, the bogus card scheme, ATM phishing, and more. But, it appears new ways are being invented to pull off successful cash machine heists. It was recently revealed that thieves were able to access loads of ATM money by injecting machines with malware using USB drives, according to the BBC. These break-ins involved both low- and high-tech techniques. Apparently, the criminals manually cut holes in the machines to plug in USB sticks that then installed malware on the system. Once the machines were infected, the robbers would patch the holes on the dispensers. Related stories Bots now running the Internet with 61 percent of Web traffic Apple aims to clobber Web page spoofers Pair said to have illegally minted $1M worth of Bitcoins Malware jumps 'air gap' between non-networked devices New zero-day bug targets IE users in drive-by attack When the money first started disappearing from machines in Europe in July, banks were perplexed at how the ATMs were being depleted despite security mechanisms. Surveillance cameras finally were able to capture the criminals' use of USB drives. According to the BBC, researchers presented the details of the robberies during the recent Chaos Computing Congress in Hamburg, Germany. These researchers explained that the malware allowed the thieves to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawal and also showed the criminals the amount of money and each bill denomination inside the machines. This meant the thieves could save time by only taking the highest value bills. It's unclear which banks were hit and how much money the criminals were able to nab.
Using just a good old fashioned saw and a USB stick full of malicious software, criminals are able to deplete cash machines of their highest value bills. December 31, 2013 5:42 PM PST USB drives. (Credit: CBS Interactive) Robbing ATMs is nothing new. There's the everlasting stick-em-up, the bogus card scheme, ATM phishing, and more. But, it appears new ways are being invented to pull off successful cash machine heists. It was recently revealed that thieves were able to access loads of ATM money by injecting machines with malware using USB drives, according to the BBC. These break-ins involved both low- and high-tech techniques. Apparently, the criminals manually cut holes in the machines to plug in USB sticks that then installed malware on the system. Once the machines were infected, the robbers would patch the holes on the dispensers. Related stories Bots now running the Internet with 61 percent of Web traffic Apple aims to clobber Web page spoofers Pair said to have illegally minted $1M worth of Bitcoins Malware jumps 'air gap' between non-networked devices New zero-day bug targets IE users in drive-by attack When the money first started disappearing from machines in Europe in July, banks were perplexed at how the ATMs were being depleted despite security mechanisms. Surveillance cameras finally were able to capture the criminals' use of USB drives. According to the BBC, researchers presented the details of the robberies during the recent Chaos Computing Congress in Hamburg, Germany. These researchers explained that the malware allowed the thieves to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawal and also showed the criminals the amount of money and each bill denomination inside the machines. This meant the thieves could save time by only taking the highest value bills. It's unclear which banks were hit and how much money the criminals were able to nab.
Using just a good old fashioned saw and a USB stick full of malicious software, criminals are able to deplete cash machines of their highest value bills.
(Credit: CBS Interactive)
Robbing ATMs is nothing new. There's the everlasting stick-em-up, the bogus card scheme, ATM phishing, and more. But, it appears new ways are being invented to pull off successful cash machine heists.
It was recently revealed that thieves were able to access loads of ATM money by injecting machines with malware using USB drives, according to the BBC.
These break-ins involved both low- and high-tech techniques. Apparently, the criminals manually cut holes in the machines to plug in USB sticks that then installed malware on the system. Once the machines were infected, the robbers would patch the holes on the dispensers.
Related stories
- Bots now running the Internet with 61 percent of Web traffic
- Apple aims to clobber Web page spoofers
- Pair said to have illegally minted $1M worth of Bitcoins
- Malware jumps 'air gap' between non-networked devices
- New zero-day bug targets IE users in drive-by attack
When the money first started disappearing from machines in Europe in July, banks were perplexed at how the ATMs were being depleted despite security mechanisms. Surveillance cameras finally were able to capture the criminals' use of USB drives.
According to the BBC, researchers presented the details of the robberies during the recent Chaos Computing Congress in Hamburg, Germany.
These researchers explained that the malware allowed the thieves to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawal and also showed the criminals the amount of money and each bill denomination inside the machines. This meant the thieves could save time by only taking the highest value bills.
It's unclear which banks were hit and how much money the criminals were able to nab.