
Atm jackpotting attacks are on the rise, with a significant increase in reported cases worldwide.
The FBI reports that atm jackpotting attacks have resulted in over $1 million in losses for financial institutions in 2023 alone.
These attacks often involve the use of skimming devices and other malicious tools to compromise atm systems.
Skimming devices can be installed on atms by attackers to steal sensitive information from cardholders.
In 2024, we can expect to see more sophisticated attacks that utilize advanced technologies such as AI-powered malware.
Advanced technologies like AI-powered malware can make atm jackpotting attacks more difficult to detect and prevent.
Financial institutions must stay vigilant and implement robust security measures to protect their atms and customers.
What Is ATM Jackpotting?
ATM jackpotting is a type of cyberattack that targets automated teller machines (ATMs). This attack utilizes three main methods: malware, black box, and man-in-the-middle (MiTM) devices.
Malware is a significant cybersecurity threat used in ATM jackpotting, with specific malware like CutletMaker and Ploutus D causing over $450 million in global losses.
Black box attacks involve connecting a device to the ATM's internal cash dispenser, prompting it to release cash. Research indicates that 69% of ATMs are vulnerable to black box attacks.
Man-in-the-Middle (MiTM) attacks compromise authentication protocols, encryption measures, and overall information-systems security, resulting in data breach and financial loss.
Types of ATM Attacks
ATM jackpotting attacks come in three main flavors: malware, black box, and man-in-the-middle (MiTM) attacks. These methods require physical access to the ATM and the use of rogue hardware tools.
Malware is a significant cybersecurity threat that can infiltrate and exploit systems, instructing the ATM to dispense cash. Ploutus malware, first seen in Mexico in 2013, has caused over $450 million in global losses.
Black box attacks involve connecting a device to the ATM's internal cash dispenser, sending commands to release cash. Research indicates that 69% of ATMs are vulnerable to black box attacks.
Man-in-the-middle (MiTM) attacks compromise authentication protocols, encryption measures, and overall information-systems security, resulting in data breach and financial loss.
Here are the three main types of ATM jackpotting attacks:
The use of malware, black box attacks, and MiTM attacks makes ATM jackpotting a severe threat to the financial industry, with grave consequences for targeted institutions, customers, and companies.
Preventing and Protecting Against ATM Jackpotting
ATM jackpotting attacks have become a global threat, with a 269% increase in logical attacks between 2019 and 2020, according to the European Association for Secure Transactions (EAST). These attacks can result in direct monetary loss, as well as reputational damage and loss of customers.
To prevent jackpotting, it's essential to implement basic security controls, such as ATM monitoring. Routine monitoring can help identify suspicious activities like multiple failed login attempts that might indicate a criminal trying to launch a jackpotting attack.
Regularly updating the ATM with security patches and software upgrades is also crucial. This includes installing updated security software, such as firewalls, antivirus software, and antimalware. Disabling the ATM's auto-start and auto-boot functions can also close a door on this type of crime.
Electronic surveillance systems are another vital security measure for ATMs. Video cameras, motion sensors, intruder alarms, and access controls can provide reliable 24/7 surveillance, allowing banks to detect and prevent jackpotting attacks.
As a customer, you can take precautions by using only ATMs belonging to famous financial institutions and avoiding those owned by regular businesses, malls, and retail outlets. You should also cover the keypad when inputting your PIN and check your bank statements monthly for unauthorized transactions.
Banks can take additional precautions by ensuring antivirus programs and other security software on the ATM are up-to-date, disabling the "auto-start and boot" functions, and monitoring the ATM for unusual activities. Having security personnel at ATMs outside the bank and taking physical measures like adding locks and alarms to the ATM's cabinet can also help prevent jackpotting.
Here are some key strategies to prevent ATM jackpotting:
- Implement ATM monitoring to identify suspicious activities
- Regularly update the ATM with security patches and software upgrades
- Install updated security software, such as firewalls, antivirus software, and antimalware
- Disable the ATM's auto-start and auto-boot functions
- Use electronic surveillance systems, such as video cameras and motion sensors
- Take physical measures, such as adding locks and alarms to the ATM's cabinet
Understanding the Risks and Consequences
Atm jackpotting attacks can lead to significant financial losses for banks and financial institutions.
The average cost of an atm jackpotting attack is estimated to be around $50,000.
These attacks can also compromise the security of the entire atm network, putting countless customers at risk.
In 2024, hackers have been using a combination of social engineering and physical access to target atm machines.
The use of skimming devices and other malicious tools has become increasingly common in atm jackpotting attacks.
Banks and financial institutions must take proactive measures to protect their atm networks from these types of attacks.
Implementing robust security protocols, such as regular software updates and secure communication channels, can help prevent atm jackpotting.
Safeguarding Against ATM Jackpotting
ATM jackpotting attacks have become a significant threat, with a 269% increase in logical attacks between 2019 and 2020, according to the European Association for Secure Transactions (EAST).
To combat these attacks, it's essential to understand the methods used by attackers. There are three main methods: malware, black box, and man-in-the-middle (MiTM) attacks. All require physical access to the ATM and the use of rogue hardware tools.
Malware is a significant cybersecurity threat, with attackers inserting a USB device containing malware, such as CutletMaker or Ploutus D, into the ATM's USB port. This malware instructs the ATM to dispense cash, which the attacker collects.
Black box attacks involve connecting a device, often a Raspberry Pi, to the ATM's internal cash dispenser, prompting it to release cash. Research indicates that 69% of ATMs are vulnerable to black box attacks.
Man-in-the-middle (MiTM) attacks compromise authentication protocols, encryption measures, and overall information-systems security, resulting in data breach and financial loss.
To safeguard against these attacks, solutions such as antivirus software, locking USB ports, and encryption of hard drives can protect the ATM from some variants of malware. However, these measures may not be effective against attacks that target peripherals, such as card readers or cash dispensing systems.
Here are some key safeguards to consider:
- Implement firmware updates regularly to prevent exploitation of known vulnerabilities.
- Lock USB ports to prevent unauthorized access.
- Encrypt hard drives to protect sensitive data.
- Use secure communication protocols to prevent MiTM attacks.
By understanding the methods used by attackers and implementing effective safeguards, financial institutions can reduce the risk of ATM jackpotting attacks and protect their customers' sensitive information.
Dealing with Problems and Communications
ATM providers and their subcontractors develop debugging services to diagnose ATM hardware, including the electromechanical systems responsible for withdrawing cash. These services include tools such as ATMDesk and RapidFire ATM XFS.
These services allow detecting anomalies and enhancing the security of ATM systems, thus reducing the possibility of such attacks. However, a hacker can try to withdraw cash without going through the checks provided by the service’s manufacturer by simply replacing a few bytes in the service’s code.
Access to such services is usually limited to special codes and only works when the ATM safe door is open. Thieves install these modified services on single-board microcomputers that connect directly to the banknote dispenser.
Communications between the ATM and the processing center can also be a vulnerability. The "last path" of communication includes wired and wireless technologies that can serve as an entry point for attackers.
Communications Analysis
The ATM system communicates with its peripherals through standard interfaces like USB, RS232, or SDC, making it easy for attackers to plug in their devices and send commands.
These standard interfaces don't require special drivers, allowing attackers to bypass the central ATM system with ease.

The proprietary protocols used by the peripheral and central system to communicate don't require authorization, leaving them vulnerable to interception and attack.
Card users can use network traffic detector software or hardware to collect transmitted data from the ATM's operation, including unrecorded actions like changing the firmware of a peripheral device.
Attackers can gain full control of the ATM using this method, and the presence of a motion detector becomes extremely difficult to detect.
Communications Processing Center
ATMs interact directly with peripherals without communicating with the host, making them vulnerable to hacking techniques. This is one of the most popular methods used by hackers.
Many ATMs can be traced using the Shodan IoT search engine, which can be combined with an attack that compromises the security settings of the affected machine.
The "last path" of communication between the ATM and the processing center includes various technologies that can serve as an entry point for attackers. Cybersecurity awareness experts say this is a major concern.

Wired and wireless communication methods, such as phone lines, Ethernet, Wi-Fi, mobile networks (CDMA, GSM, UMTS, LTE), can be exploited by hackers. Security mechanisms may include VPN-compatible hardware or software, SSL/TLS, encryption, and message authentication.
However, even with these protection mechanisms in place, hackers have effective attacks against them. This means that even if security is PCI DSS compliant, ATMs are still vulnerable.
In fact, many public networks do not provide sufficient protection, leaving sensitive data unencrypted in transit. This makes it easy for hackers to launch a MiTM (Man-in-the-Middle) attack, taking control of the data flows between the ATM and the processing center.
A fake processing center can be created to trick the ATM into issuing cash, even if the card inserted is expired or has a zero balance. This is a serious concern, as thousands of ATMs are potentially vulnerable to this type of attack.
Dealing with Problems
ATM providers and their subcontractors develop debugging services to diagnose ATM hardware. These services include tools such as ATMDesk and RapidFire ATM XFS.

Access to such services is usually limited to special codes and only works when the ATM safe door is open. Thieves exploit this vulnerability by installing modified services on single-board microcomputers that connect directly to the banknote dispenser.
These modified services allow hackers to bypass checks and withdraw cash without authorization.
Sources
- https://sepiocyber.com/resources/whitepapers/atm-jackpotting/
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/remote-jackpot-hacking-atm/
- https://www.techtarget.com/whatis/definition/ATM-jackpotting
- https://www.makeuseof.com/atm-jackpotting-attack/
- https://medium.com/@redfanatic7/atm-jackpotting-with-the-black-box-f4159df39a86
Featured Images: pexels.com