ATM Hack Gives Attackers Cash And Account Data

The vulnerabilities are coming thick and fast at this year’s Black Hat security conference in Las Vegas.

This time researchers from Rapid7 revealed that they had discovered serious vulnerabilities with next generation ATM cash machines.

Rapid7’s researcher Weston Hecker spent the past year analysing and testing new methods that ATM manufacturers are using, and he discovered that attackers could bypass “anti-skimming/anti-shimming methods” introduced with the latest generation ATMs.

Shimming Device

He also revealed how an attacker could perform EMV (Europay, MasterCard and Visa) and NFC long-range attacks that allow real-time card communication from over 400 miles away.

The researchers found that modern ATMs can be compromised by the installation of a skimming or shimming device. These devices are often tiny and can be inserted into the card reader slot of the ATM (it sits between the chip in the card and the ATM reader).

It then harvests card and account data (including PINs) when people insert their cards into the machine.

The attacker retrieves the device and can then setup fake accounts or create a cloned card. The attacker can then withdraw money. The firm was also able to use a smartphone to download data wirelessly from the stolen card, and then recreate that same card in any ATM.

“The modifications on the ATM are on the outside,” Tod Beardsley, security research manager for Rapid7 explained to the BBC. “I don’t have to open it up. It’s really just a card that is capable of impersonating a chip. It’s not cloning.”

Rapid7 have not gone into too much detail about the flaw, but said they have notified banks and makers of ATMs.

ATM Security

The security of ATMs have been studied for a while now. Two years ago a Polish banking services provider rolled out Europe’s first cash dispensing machines to use vein pattern recognition to identify clients, using a Hitachi technology called VeinID.

Symantec has previously warned that cyber-attackers had developed a technique for robbing ATMs of cash using a piece of code that can be activated simply by sending a text message.

That technique targetted a particular brand of ATM that Symantec didn’t identify, but the company warned that such techniques are part of a wider problem: the fact that older generations of ATMs run the ancient Windows XP operating system.

Quiz: What do you know about cybersecurity in 2016?

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

X’s Community Notes Fails To Stem US Election Misinformation – Report

Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…

1 day ago

Google Fined More Than World’s GDP By Russia

Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…

1 day ago

Spotify, Paramount Sign Up To Use Google Cloud ARM Chips

Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…

2 days ago

Meta Warns Of Accelerating AI Infrastructure Costs

Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…

2 days ago

AI Helps Boost Microsoft Cloud Revenues By 33 Percent

Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…

2 days ago