Feeds

Online manuals enable ATM reprogramming scam

Money for nothing and your gas for free

Internet Security Threat Report 2014

Reprogramming an ATM to dispense more cash than it ought to is far easier than anyone imagined.

Last week CNN screened a video of a man suspected of reprogramming an ATM to dispense $20 bills that it thought were $5 notes, so fraudsters and the unscrupulous were able to withdraw four times more money than was debited from their accounts.

The suspected perp didn't reprogram the Virginia gas station machine after he pulled off the scam, so it continued to dispense more money than it should have for nine days, until some honest individual pointed out the problem. The suspect used a pre-paid debit card to make withdrawals, making it harder for police to track him down. These difficulties prompted investigators to go public on the scam, which was carried out last month, in the hope of identifying the suspect from CCTV footage.

The hack was far from sophisticated. Security researchers have discovered that ATM manuals for the Tranax Mini-Bank 1500 Series, the machine involved in the Virginia scam, can be easily located online using nothing more fancy than a Google search query, eWeek reports. These manuals explain how to switch ATMs into diagnostic mode, where its possible to reprogram ATMs in the way carried out in the Florida gas-station hack, for example.

Would-be fraudsters would still need a PIN code in order to be able to access functions normally only available to installation engineers but the manual lists typical factory-set default passwords. So unless machines have been set up properly, they are wide open to abuse. It seems the hack is limited to Tranax's line of mini-bank terminals, though that's unclear. Tranax has delivered 70,000 ATMs, self-service terminals and kiosks across the US. Many of these installations involve the Mini-Bank 1500 machine that was the target of the Virginia hack, so the potential for abuse is clearly high.

We can only hope that the wave of publicity over the scam will prompt Tranax into action so that the scam is nipped in the bud. At the very least it ought to pull the copies of its manual offline. In theory these manuals are only available to authorised distributors or service providers though at least one Canadian-based reseller of Tranax terminals has left this information easily available to all and sundry. The Virginia hack shows at least some crooks already have their hands on this information. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.