PDA

View Full Version : Text message command makes infected ATMs spew cash



Teh One Who Knocks
03-25-2014, 04:37 PM
PC World


http://i.imgur.com/qiAyeLj.png

A group of enterprising cybercriminals have figured out how to get cash from a certain type of ATM—by text message.

The latest development was spotted by security vendor Symantec, which has periodically written about a type of malicious software it calls “Ploutus” that first appeared in Mexico.

The malware is engineered to plunder a certain type of standalone ATM, which Symantec has not identified. The company obtained one of the ATMs to carry out a test of how Ploutus works, but it doesn’t show a brand name.

Ploutus isn’t the easiest piece of malware to install, as cybercriminals need to have access to the machine. That’s probably why cybercriminals are targeting standalone ATMs, as it is easy to get access to all parts of the machine.

Early versions of Ploutus allowed it to be controlled via the numerical interface on an ATM or by an attached keyboard. But the latest version shows a remarkable new development: it is now controllable remotely via text message.

In this variation, the attackers manage to open up an ATM and attach a mobile phone, which acts as a controller, to a USB port inside the machine. The ATM also has to be infected with Ploutus.

“When the phone detects a new message under the required format, the mobile device will convert the message into a network packet and will forward it to the ATM through the USB cable,” wrote Daniel Regalado, a Symantec malware analyst, in a blog post on Monday.

Ploutus has a network packet monitor that watches all traffic coming into the ATM, he wrote. When it detects a valid TCP or UDP packet from the phone, the module searches “for the number “5449610000583686 at a specific offset within the packet in order to process the whole package of data,” he wrote.

It then reads the next 16 digits and uses that to generate a command line to control Ploutus.

So, why do this? Regalado wrote that it is more discrete and works nearly instantly. The past version of Ploutus required someone to either use a keyboard or enter a sequences of digits into the ATM keypad to fire up Ploutus. Both of those methods increase the amount of time someone spends in front of the machine, increasing the risk of detection.

Now, the ATM can be remotely triggered to dispense cash, allowing a “money mule,” or someone hired to do the risky job of stopping by to pick up the cash, to swiftly grab their gains. It also deprives the money mule of information that could allow them to skim some cash off the top, Regalado wrote.

“The master criminal knows exactly how much the money mule will be getting,” he wrote.

Symantec warned that about 95 percent of ATMs are still running Windows XP, Microsoft’s 13-year-old OS. Microsoft is ending regular support for Windows XP on April 8, but is offering extended support for Windows XP embedded systems, used for point-of-sale devices and ATMs, through January 2016.

Still, Symantec warned that “the banking industry is facing a serious risk of cyberattacks aimed at their ATM fleet.”

PorkChopSandwiches
03-25-2014, 04:40 PM
Amazing

Teh One Who Knocks
03-25-2014, 04:42 PM
Symantec warned that about 95 percent of ATMs are still running Windows XP, Microsoft’s 13-year-old OS. Microsoft is ending regular support for Windows XP on April 8, but is offering extended support for Windows XP embedded systems, used for point-of-sale devices and ATMs, through January 2016.

:facepalm:

:fail:

Noilly Pratt
03-25-2014, 05:17 PM
Since its back in the XP era, the magic code is probably "showmethemoney"

Acid Trip
03-25-2014, 06:04 PM
We've got like 30 ATMs still running XP and we aren't concerned. Just need to know what you're doing.

The ATMs are vlan'd off the normal data network, parts of the OS have been set to read only, all USB ports are disabled, and we have a software firewall that only allows traffic to the one IP address the ATM needs (WAN address as it has no internet access), it blocks absolutely everything else.

We also have a small program running that monitors the Windows directory and registry for any changes. Any changes causes the computer to reboot and restore the OS to a predetermined image.

Unless you have the password to decrypt the hard drive and the admin password (both 50 characters long, totally randomized [thanks Excel!]) you can't do diddly squat even if you have physical access to the machine.

FBD
03-25-2014, 07:12 PM
you're insane even having 'em on a network to begin with.

I think what people forget is most of these are point to point dial and are never on the internet. that is exponentially more secure than having these fuggin things be on the internet. (wan, whateva, if its attached...)

Acid Trip
03-25-2014, 08:53 PM
you're insane even having 'em on a network to begin with.

I think what people forget is most of these are point to point dial and are never on the internet. that is exponentially more secure than having these fuggin things be on the internet. (wan, whateva, if its attached...)

They have to be on a network. How do you think they verify funds and return a response? A modem? :lol:

It's a point to point VPN which is technically a network. I used the term WAN (wide are network) since P2P VPN doesn't mean anything to most people.

Noilly Pratt
03-26-2014, 05:12 AM
P2P VPN is how it's done in IBM's internal cloud, too.