Feeds

Online manuals enable ATM reprogramming scam

Money for nothing and your gas for free

Choosing a cloud hosting partner with confidence

Reprogramming an ATM to dispense more cash than it ought to is far easier than anyone imagined.

Last week CNN screened a video of a man suspected of reprogramming an ATM to dispense $20 bills that it thought were $5 notes, so fraudsters and the unscrupulous were able to withdraw four times more money than was debited from their accounts.

The suspected perp didn't reprogram the Virginia gas station machine after he pulled off the scam, so it continued to dispense more money than it should have for nine days, until some honest individual pointed out the problem. The suspect used a pre-paid debit card to make withdrawals, making it harder for police to track him down. These difficulties prompted investigators to go public on the scam, which was carried out last month, in the hope of identifying the suspect from CCTV footage.

The hack was far from sophisticated. Security researchers have discovered that ATM manuals for the Tranax Mini-Bank 1500 Series, the machine involved in the Virginia scam, can be easily located online using nothing more fancy than a Google search query, eWeek reports. These manuals explain how to switch ATMs into diagnostic mode, where its possible to reprogram ATMs in the way carried out in the Florida gas-station hack, for example.

Would-be fraudsters would still need a PIN code in order to be able to access functions normally only available to installation engineers but the manual lists typical factory-set default passwords. So unless machines have been set up properly, they are wide open to abuse. It seems the hack is limited to Tranax's line of mini-bank terminals, though that's unclear. Tranax has delivered 70,000 ATMs, self-service terminals and kiosks across the US. Many of these installations involve the Mini-Bank 1500 machine that was the target of the Virginia hack, so the potential for abuse is clearly high.

We can only hope that the wave of publicity over the scam will prompt Tranax into action so that the scam is nipped in the bud. At the very least it ought to pull the copies of its manual offline. In theory these manuals are only available to authorised distributors or service providers though at least one Canadian-based reseller of Tranax terminals has left this information easily available to all and sundry. The Virginia hack shows at least some crooks already have their hands on this information. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.