Jackpotting malware | Infosec (2024)

Malware analysis

Introduction

Jackpotting malware is not well known because it exclusively targets automated teller machines (ATMs). This means it usually doesn’t directly affect a large number of people. However, this type of malware may seriously harm the reputation and the financial stability of the banks owning the hacked ATMs.

For example, between February and November 2017, at least 10 jackpotting attacks were conducted in the German state of North Rhine-Westphalia. As a result of those attacks, hackers stole 1.4 million EUR (about $1.5 million).

Before proceeding with the examination of jackpotting malware, we need to clarify the term “jackpotting malware.” In simple words, it means malware which allows fraudsters to force ATMs to dispense cash without reflecting the withdrawal transactions in any bank accounts.

In this article, we will examine two of the most widely known types of jackpotting malware, Ploutus and Cutlet Maker. We will also look at the operation of jackpotting malware and provide recommendations on how banks can protect against it.

Ploutus and Cutlet Maker

Ploutus was first discovered in Mexico in 2013. The first version of Ploutus had to be installed on an ATM machine by inserting a CD in the ATM’s CD-ROM. The 2014 version, called Backdoor.Ploutus.B, relied on distribution through a mobile phone. Such a distribution is also known as USB tethering.

In 2016, the creators of Ploutus released a new version called Ploutus-D. Ploutus-D can be installed by gaining physical access to the top portion of the respective ATM. Ploutus-D exists in various modifications that allow it to run on machines of 41 different ATM vendors in 80 countries. A representative of the security firm FireEye called Ploutus-D “one of the most advanced ATM malware families we’ve seen in the last few years.”

Cutlet Maker was originally sold on the internet, but later became freely available. It infects ATMs through a USB memory stick. The stick and an external keyboard need to be attached to an ATM for it to be infected.

The malware is not complex. A specific characteristic of Cutlet Maker is that, after being installed on an ATM, the following message will appear on the display of the hacked machine: “Ho-ho-ho! Let's make some cutlets today!” The message includes a cartoon image of a chef and a piece of meat.

The operation of jackpotting malware

The first step towards the successful operation of jackpotting malware is gaining physical access to the targeted ATM. To do so, fraudsters often dress like ATM technicians in order to avoid attracting attention. In some cases, criminals also use an endoscope, an instrument that allows physicians to look inside the human body, to find computer ports within the targeted ATM.

The second step is the activation of the jackpotting malware. This is usually done by using the keyboard of the hacked ATM machine or by sending SMS commands to it. The latter method is much more convenient because it works almost instantly and provides criminals with the opportunity to perform their malicious operations without the need to expose themselves publicly.

The third step relates to taking the stolen money from the hacked ATM. This is usually done by money mules, individuals who perform high-risk operations upon the instructions of criminals. Many money mules may be young individuals who are usually not well aware of the consequences of their actions. For example, a report of the UK police indicates that 36% of the money mules participating in money laundering were individuals under the age of 21.

Money mules can be divided into three categories, unknowing mules, witting mules and complicit mules. Unknowing mules do not know at all that they are engaged in criminal activities. Witting mules have noticed signs (e.g., warning messages from banks) indicating that they are engaged in criminal activities but have nevertheless decided to proceed further. Complicit mules are well aware of their participation in criminal schemes.

Protection against jackpotting malware

Banks willing to protect their ATM machines against jackpotting malware need to take at least the following measures:

  1. Installing and maintaining up-to-date anti-malware software
  2. Locking down ATM systems in order to prevent the uploading of unauthorized programs
  3. Disabling auto-run and boot features
  4. Making sure that the ATM machines do not include default passwords. Default passwords can be found in instruction manuals that are usually publicly available
  5. Enhancing the physical security of ATM machines by, for example, installing security cameras next to ATM machines and hiring security officers to monitor those cameras

Conclusion

The number of cyberattacks relying on jackpotting malware has increased in recent years. In this article, we examined only two types of jackpotting malware, namely, Ploutus and Cutlet Maker. However, many other types currently exist (e.g., WinPot, Tyupkin virus and Prilex). All these malware applications have the potential to quickly empty a large number of ATMs.

As shown above, the operation of jackpotting malware is rather simple. It consists of three steps: installing the malware, activating the malware and collecting the criminal proceeds. The most effective method to avoid infections with jackpotting malware is to prevent criminals from completing the first step. This can be done by taking both application and physical security measures.

Sources

  1. ATM Jackpotting: How to Protect Your Machines, PaymentsJournal
  2. ATM Hacking Has Gotten So Easy, the Malware's a Game, Wired
  3. EU: ATM jackpotting attacks earn crooks less than €1,000 in the first half of 2019, ZDNet
  4. Malware That Spits Cash Out of ATMs Has Spread Across the World, Vice
  5. I was a teenage 'money mule', BBC Money News
  6. First ‘Jackpotting’ Attacks Hit U.S. ATMs, Krebs on Security
  7. Ploutus, NJCCIC
  8. Cutlet Maker, NJCCIC
  9. New Variant of Ploutus ATM Malware Observed in the Wild in Latin America, FireEye
  10. New malware hacks ATMs to spit out free cash, TechRadar
  11. Lewis, T., ‘Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation’, John Wiley & Sons, 2019
Jackpotting malware | Infosec (2024)

FAQs

Jackpotting malware | Infosec? ›

Before proceeding with the examination of jackpotting malware, we need to clarify the term “jackpotting malware.” In simple words, it means malware which allows fraudsters to force ATMs to dispense cash without reflecting the withdrawal transactions in any bank accounts.

What is jackpotting? ›

ATM jackpotting definition. ATM jackpotting is a fraudulent act where cybercriminals cash out automatic teller machines using extremely sophisticated malware. To pull off this illegal payday, criminals avoid using brute force to dispense cash.

What is ATM malware? ›

ATM malware is malicious software designed to compromise automated teller machines (ATMs) by exploiting vulnerabilities in the machine's hardware or software. ATM malware is used to commit a crime known as “jackpotting” in which attackers install malware that forces ATMs to dispense large amounts of cash on command.

What is the ploutus d ATM jackpot? ›

ATM Malware

In a ATM Jackpotting attack, the attacker inserts a USB device ridden with ATM specific malware, such as CutletMaker or Ploutus D, into the ATM's USB port. The malware instructs the machine to dispense cash which the attacker later collects.

What is tyupkin? ›

Tyupkin is a piece of malware that allows cyber criminals to empty cash machines via direct manipulation. This malware, detected by Kaspersky Lab as Backdoor.

What does ATM stand for in texting? ›

abbreviation for at the moment: used for example on social media and in text messages: I'm busy atm.

What is skimming ATM? ›

Skimming occurs when devices illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps capture data or record cardholders' PINs. Criminals use the data to create fake debit or credit cards and then steal from victims' accounts.

What is a malware that locks you out of your device? ›

Ransomware is malware designed to lock users out of their system or deny access to data until a ransom is paid.

How do I know if my device has malware? ›

Find more signs of malware
  1. Alerts about a virus or an infected device.
  2. Anti-virus software you use no longer works or runs.
  3. A significant decrease in your device's operating speed.
  4. A significant, unexpected decrease in storage space on your device.
  5. Your device stops working properly or working altogether.

What does malware do to your cell phone? ›

What can viruses and other malware do to Android phones? Malware is designed to generate revenue for cybercriminals. Malware can steal your information, make your device send SMS messages to premium rate text services, or install adware that forces you to view web pages or download apps.

What is ploutus? ›

Ploutus is a type of ATM malware that is designed to allow attackers to physically control ATMs, bypass security measures, and steal large amounts of money. This malicious software is one of the most sophisticated and advanced types of ATM malware currently in circulation.

What is another term for ATM? ›

Other terms include any time money, cashline, tyme machine, cash dispenser, cash corner, bankomat, or bancomat. ATMs that are not operated by a financial institution are known as "white-label" ATMs.

What is an ATM used for? ›

ATMS, or automated teller machines, are banking outlets where you can withdraw cash without going into a branch of their bank. Some ATMs only dispense cash, while others allow transactions such as check deposits or balance transfers.

What is the full meaning of ATM? ›

Definition of ATM

ATM stands for an “Automated Teller Machine”. An ATM is a computerized device that enables individuals to conduct various banking transactions without the need for a human teller. It provides a convenient way to access and manage our bank accounts, even outside the banking hours.

Top Articles
PJ Strategy op LinkedIn: #strategie #leiderschap #teamontwikkeling #andersdenken #academy
This Week in DPPA: 8 - 14 June 2024
Funny Roblox Id Codes 2023
Www.mytotalrewards/Rtx
San Angelo, Texas: eine Oase für Kunstliebhaber
Golden Abyss - Chapter 5 - Lunar_Angel
Www.paystubportal.com/7-11 Login
Steamy Afternoon With Handsome Fernando
fltimes.com | Finger Lakes Times
Detroit Lions 50 50
18443168434
Newgate Honda
George The Animal Steele Gif
Nalley Tartar Sauce
Chile Crunch Original
Teenleaks Discord
Immortal Ink Waxahachie
Craigslist Free Stuff Santa Cruz
Mflwer
Costco Gas Foster City
Obsidian Guard's Cutlass
Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
Sprinkler Lv2
Uta Kinesiology Advising
Kcwi Tv Schedule
Nesb Routing Number
Olivia Maeday
Random Bibleizer
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Receptionist Position Near Me
Gopher Carts Pensacola Beach
Duke University Transcript Request
Nikki Catsouras: The Tragic Story Behind The Face And Body Images
Kiddie Jungle Parma
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
The Latest: Trump addresses apparent assassination attempt on X
In Branch Chase Atm Near Me
Appleton Post Crescent Today's Obituaries
Craigslist Red Wing Mn
American Bully Xxl Black Panther
Ktbs Payroll Login
Jail View Sumter
Thotsbook Com
Funkin' on the Heights
Caesars Rewards Loyalty Program Review [Previously Total Rewards]
Marcel Boom X
Www Pig11 Net
Ty Glass Sentenced
Michaelangelo's Monkey Junction
Game Akin To Bingo Nyt
Ranking 134 college football teams after Week 1, from Georgia to Temple
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 6288

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.