Raise money on the ATM? Spanish authorities warn of the burla that manipulates terminals (and does not use codes or cards)

by Andrea
0 comments
Raise money on the ATM? Spanish authorities warn of the burla that manipulates terminals (and does not use codes or cards)

ATM Terminals remain one of the main targets of criminal networks looking to deceive users and remove money illicitly. Even with advances in safety systems, certain multibanco-associated fraud techniques remain active and are once again gaining ground in various zones of Spain.

Old method again gain prominence

Recently, and according to 20 minutes, the reports of burlas have been multiplied through the technique known as jackpottinga form of computer attack that obliges terminals to release large amounts of money. Although not a new method, the Spanish authorities have been worrying again.

Name jackpotting It emerged in 2010 after a demonstration by Barnaby Jack, a cybersecurity expert during an international conference. At the time, Jack showed how it was possible to manipulate a multibanco to free all the money he contained, without using cards or codes.

First cases generated high damage

Shortly after this presentation, Germany recorded several similar attacks, resulting in damage greater than one million euros, according to the same source. The robbers used malicious software called Cutler Makerwhich became a reference in this type of crimes.

This technique is based on the introduction of malware in the ATM system, forcing the machine to distribute money uncontrollably. Instead of resorting to copies of cards or direct robberies, criminals bet on this more sophisticated method and difficult to detect immediately.

Reappearance coincides with changes in terminals

Although the first cases occurred over a decade, the truth is that the jackpotting He returned hard, according to the same source, affecting several banking institutions in Spanish territory. This resurgence coincides with recent changes in the structure of the automatic terminals.

Disguises and tricks help access the system

To execute the plan, attackers need to physically access the ATM. They use subtle strategies not to raise suspicions, such as disguises or false pretexts to approach the equipment without alarming anyone.

USB devices install malware on the system

Once access is guaranteed, criminals install a USB device with the necessary malware. Among the most used programs are the mentioned Cutler Maker and also the WinPotwhich simulates a casino -style gaming machine.

We recommend:

Commands allow you to access the machine money

With the software installed, robbers can control the crowd and issue commands that cause the machine to distribute the money. In most cases, this operation must be done in person, which requires a certain level of organization and speed.

Money collection is made by discreet accomplices

Usually, direct people who are in the installation of malware are not the same ones that collect the money. For this part of the operation, people are recruited who pass by ordinary customers and who work at the right time to collect the notes.

These “human mules” appear to be raising money like any user, but they are actually executing orders from the true heads of the criminal network. This division of tasks makes the scheme more difficult to track the authorities.

Authorities reinforce surveillance at terminals

However, police forces reinforced the alerts with banks and maintenance technicians, asking for attention to suspected behaviors with the terminals. According to the, also users are advised to report any strange movement with the multibancos.

This type of crime underlines the importance of constant surveillance and frequent updates of terminal operating systems. The vulnerability of the terminals can become an invitation to new vacancies of similar attacks.

Prevention is the best medicine against this silent crime

At a time when digital crime is growing, it is up to banking institutions to reinforce their security protocols. Cooperation between authorities, technicians and customers will be critical to locking this type of highly organized scans.

We recommend:

You may also like

Our Company

News USA and Northern BC: current events, analysis, and key topics of the day. Stay informed about the most important news and events in the region

Latest News

@2024 – All Right Reserved LNG in Northern BC