A new threat known as WinPot malware is using a slot machine-like interface to empty ATMs at targeted financial institutions.
In 2017 and 2018, threat actors used a toolkit called KoffeyMaker in multiple black box ATM attacks targeting Eastern European financial institutions.
The U.S. Secret Service is investigating a new ATM attack that, unlike previous "cash-out" attacks, uses advanced, custom-build skimmers to steal credit card information and PINs.
Researchers discovered a new ATM fraud scheme that attacks both the front and back ends of ATM networks virtually, making it harder to remediate than traditional schemes that target physical machines.
Banks are already privy to the threat of physical breaches, but many remain unaware of the ATM network security gaps that could enable fraudsters to access their systems.
Researchers revealed how easily ATM security can be thwarted by breaking into a machine and then using malware to take down an entire network.
ATM malware has evolved significantly in three years.
Effective ATM network protection requires a combination of basic and advanced approaches and a strong SIEM solution to monitor anomalous activity.
Cybercriminals have developed and implemented ATM malware designed to withdraw cash directly from ATMs without compromising consumers' debit cards.