ATM malware alert! 29 lakh debit cards attacked in 2016; here’re 5 malware, infecting machines everywhere

As many as 29 lakh debit cards came under malware attack in India last year through ATMs that were connected to a switch provided by Hitachi Payment Services, according to the country’s finance ministry.

Commercial banks operating in India have reported that 2.9 million debit cards were used at various ATMs that were connected to the Hitachi switch which was subjected to malware attack, Santosh Kumar Gangwar, the minister of state for finance, revealed in a report submitted to the parliament on Friday.

However, he also said that the number of compromised debits cards as reported to the Reserve Bank of India (RBI) was only 3,291.

“RBI has informed that Hitachi Payment Services (HPS) appointed SISA Infosec for PCI forensic investigation. The final report suggested that the ATM infrastructure of HPS was breached and the data between May 21 and July 11, 2016 were compromised, but not the POS (point of sale) infrastructure,” Press Trust of India quoted Gangwar as saying.

Related Top posts:-  Oneplus 2 full Specifications

Meanwhile, the RBI is said to have advised banks to take adequate measures to improve customer awareness with regard to cyber security, including educating customers on the downside risk and consequences of sharing their login credentials with others.

According to Gangwar, the central bank set up a Cyber Security and IT Examination cell within its Department of Banking Supervision in 2015, and had also issued a comprehensive circular in June last year covering best practices to better defend against cybercrimes.

Despite all the efforts by authorities worldwide, cybercriminals continue to deploy malicious software to steal money from ATMs. With over 432,000 ATMs installed worldwide, the risk is growing even further.

Here’re five ATM malware families that enable crooks to launch both physical and remotely coordinated attacks on cash machines:
Skimer

First discovered in 2009, Skimer is believed to be the first malware to target ATMs. Once successfully installed, it infects the core of an ATM, giving cybercriminals full control over the machines to withdraw all the funds or collect confidential data from cards used in the infected machines, including customers’ bank account numbers and PIN codes.

Related Top posts:-  Xiaomi Mi MIX 2 to have a whooping 93% screen-to-body ratio, let's analyse this

According to Russia’s Kaspersky Lab, 49 modifications of the Skimer malware have been identified so far. The most recent version was discovered in May last year.

Here’s a video of Kaspersky Lab illustrating the Skimer malware in action.

Suceful

Believed to be created in August 2015, Suceful is equipped with some shocking features that are not found in any other ATM malware. It targets cardholders, and can save debit card details on infected ATMs, disable alarms, and even read the debit card tracks.
Attackers can use Suceful to read data from a card’s chip, and even steal physical cards by commanding the machine to retain the card.
Ploutus

First discovered in 2013, Ploutus malware requires the attackers to have physical access to the ATM to connect a keyboard to it. The malware can also allow money mules to withdraw cash using SMS messages.
In January, a new variant of the Ploutus ATM malware was identified. Dubbed Ploutus-D, the new variant targets ATMs running on Windows 10, Windows 8, Windows 7 and XP. It has a different interface and features a “Launcher” that can identify and terminate security monitoring processes.
Alice

Related Top posts:-  Xiaomi redmi note 4 review:- worth the price??

Believed to have been around since 2014, Alice enables criminals with physical access to the ATM to make the machine spit out cash. The crooks first get access to one of the ATM’s USB or CD-ROM slots to install the malware. After that they connected a keyboard to interact with the ATM’s software.
Unlike other malware families, Alice targets the ATM’s cash dispenser module. Since it doesn’t connect to other ATM-specific hardware, criminals cannot issue any commands via the PIN pad.
Tyupkin

During a forensics investigation into cyberattacks targeting ATMs in Eastern Europe, Kaspersky Lab discovered a piece of malware that was in use 

(Visited 1 times, 1 visits today)

Have a Query? Ask Here, we will get back to you!