ATM Terminals remain one of the main targets of criminal networks looking to deceive users and remove money illicitly. Even with advances in safety systems, certain multibanco-associated fraud techniques remain active and are once again gaining ground in various zones of Spain.
Old method again gain prominence
Recently, and according to 20 minutes, the reports of burlas have been multiplied through the technique known as jackpottinga form of computer attack that obliges terminals to release large amounts of money. Although not a new method, the Spanish authorities have been worrying again.
Name jackpotting It emerged in 2010 after a demonstration by Barnaby Jack, a cybersecurity expert during an international conference. At the time, Jack showed how it was possible to manipulate a multibanco to free all the money he contained, without using cards or codes.
First cases generated high damage
Shortly after this presentation, Germany recorded several similar attacks, resulting in damage greater than one million euros, according to the same source. The robbers used malicious software called Cutler Makerwhich became a reference in this type of crimes.
This technique is based on the introduction of malware in the ATM system, forcing the machine to distribute money uncontrollably. Instead of resorting to copies of cards or direct robberies, criminals bet on this more sophisticated method and difficult to detect immediately.
Reappearance coincides with changes in terminals
Although the first cases occurred over a decade, the truth is that the jackpotting He returned hard, according to the same source, affecting several banking institutions in Spanish territory. This resurgence coincides with recent changes in the structure of the automatic terminals.
Disguises and tricks help access the system
To execute the plan, attackers need to physically access the ATM. They use subtle strategies not to raise suspicions, such as disguises or false pretexts to approach the equipment without alarming anyone.
USB devices install malware on the system
Once access is guaranteed, criminals install a USB device with the necessary malware. Among the most used programs are the mentioned Cutler Maker and also the WinPotwhich simulates a casino -style gaming machine.
We recommend:
Commands allow you to access the machine money
With the software installed, robbers can control the crowd and issue commands that cause the machine to distribute the money. In most cases, this operation must be done in person, which requires a certain level of organization and speed.
Money collection is made by discreet accomplices
Usually, direct people who are in the installation of malware are not the same ones that collect the money. For this part of the operation, people are recruited who pass by ordinary customers and who work at the right time to collect the notes.
These “human mules” appear to be raising money like any user, but they are actually executing orders from the true heads of the criminal network. This division of tasks makes the scheme more difficult to track the authorities.
Authorities reinforce surveillance at terminals
However, police forces reinforced the alerts with banks and maintenance technicians, asking for attention to suspected behaviors with the terminals. According to the, also users are advised to report any strange movement with the multibancos.
This type of crime underlines the importance of constant surveillance and frequent updates of terminal operating systems. The vulnerability of the terminals can become an invitation to new vacancies of similar attacks.
Prevention is the best medicine against this silent crime
At a time when digital crime is growing, it is up to banking institutions to reinforce their security protocols. Cooperation between authorities, technicians and customers will be critical to locking this type of highly organized scans.
We recommend: