Easily picked CD-ROM drive locks let Mexican banditos nick ATM cash
Who needs an inside man when you've got a boot disc?
Lax security at Mexican banks has allowed cybercriminals to put their own malware-ridden CDs into ATM machines in order to gain control of the easily-compromised cash machines.
The Ploutus malware was installed after "criminals acquired access to the ATM’s CD-ROM drive and inserted a new boot CD into it". The ruse was possible because many ATMs in Mexico use a simple lock that is easily picked, allowing the attackers to gain physical access to the machines.
Attacks involving getting malware onto ATMs are rare but far from unprecedented. Normally all sorts of trickery is necessary before being able to get a trojan onto a target machine.
Malware-based ATM scams have previously involved using corrupt insiders to infect hole-in-the-wall machines. Learning how an ATM machine works by posing as an repair technician is also unnecessary thanks to Ploutus. You don't need a genius security researcher to develop a fiendishly cunning ATM attack, either.
Schoolboy errors made the self-service ATM-pwning tactic all too easy for Mexican crooks. The extent of the resulting scam - either in terms of how much money was lost or how many machines were infected - remains unclear. However details of how the malware itself works are fairly well understood.
Information security firm Trustwave has completed an analysis of the malware after obtaining samples of the malicious code. Infected machines still carry out their normal functions of dispensing cash. But if a particular key combination is input into the compromised device, the attacker will be presented with a hidden GUI, written in Spanish, complete with drop-down menus apparently designed for a touch screen.
Once crooks input a passcode - derived from a fixed four digit PIN combined with the figures for the date and month – they obtain the ability to dispense money from the compromised ATM.
"If you are a bank or the owner/operator of ATMs in Mexico, you will want to examine your machines for evidence of tampering," advises Josh Grunzweig, an ethical hacker in TrustWave's SpiderLabs team. "Banks and ATM owner/operators outside of Mexico could also benefit from an inspection of their ATMs."
"Examples of targeted malware like Ploutus serve as a reminder of the importance of a thorough security review of ATMs and the back-end systems connected to them," he added.
Grunzweig has put together a blog post explaining how the malware works - containing code snippets and a screenshot of the GUI cybercrooks are able to feast their eyes upon once the malware is installed on compromised cash machines - here.
This is ATM fraud without recourse to skimmers to harvest the card details of consumers or other more complex approaches. So far Ploutus-based attacks were targeted against ATMs at off-premise locations, according to self-service device information security software developer SafenSoft.
"The emergence of new malware with ability to directly extract cash from ATMs is a very alarming sign for self-service device security," Stanislav Shevchenko, chief technology officer at SafenSoft, warns. "Malware like this allows the cybercriminals to skip the whole process of cash withdrawal they have to take part in after using traditional ATM trojans and skimmer-like devices to steal the plastic card information.
"Additionally, by spreading malware like that criminals can easily bypass the traditional antivirus-based protection on the ATMs. If that trojan gets massively distributed any bank without specialised protection software on its ATMs will have hard times ahead," he added. ®
Sponsored: Protecting mobile certificates