Raise money on the ATM? Spaniards warn of the burla that manipulates boxes and terminals (and does not use codes or cards)

by Andrea
0 comments
The law protects who? Government transfers € 400,000 by mistake to the account of a woman who spends him in hours and ends up detained

Organized criminals networks continue to explore vulnerabilities at the ATM terminals, despite improvements in safety systems. In Spain, a particular technique has often reappeared, generating alerts with the authorities.

Old method again gain prominence

The method is called Jackpotting and has gaining ground again in several Spanish regions, according to the 20 Minutes newspaper. It is a computer attack that requires the ATM to dispense with large amounts of money without a card or code.

Demonstration in 2010 made technique known worldwide

The term gained notoriety after the presentation by Barnaby Jack, a cybersecurity expert at an international conference in 2010. At the time, it demonstrated how it was possible to manipulate a terminal for this releasing all available notes.

Damage exceeded one million euros in Germany

Shortly after the technique was released, the first actual attacks began to emerge. Germany was one of the most affected countries, registering losses greater than one million euros caused by this type of intrusion.

Malicious software requires machine to dispense with money

At the base of the scheme is the introduction of malware into the terminal system. The program, such as the well -known Cutler Maker, forces the machine to distribute notes uncontrollable, without leaving legitimate survey operations.

Although not a recent practice, Jackpotting has resurfaced in recent months, coinciding with physical and technical changes in automatic terminals, which may have facilitated the work of attackers.

Criminals use disguises to avoid lifting suspicions

To execute the plan, and according to the same source, criminals need to physically access the terminal. They use disguises such as fake uniforms or discreet behaviors, not to raise suspicions with customers or banking employees.

Once by the machine, the attackers insert a USB Pen containing the necessary malware. Among the programs used is also Winpot, which transforms the terminal display into an interface similar to a slot machine.

We recommend:

Terminal Control allows you to issue direct commands

With the virus installed, strikers directly control the crowd and run commands that lead to the exit of money. This step requires physical presence and speed in operation, requiring coordination between those involved.

Ordinary people are used to collect money

The collection of notes is rarely done by those who install the software. For this, the heads hire accomplices that are undergoing normal users, minimizing the risk of detention during operation.

These “human mules” act at the right time, seeming only to raise money like any client. The separation of functions makes the scheme more difficult to track through security forces.

Alerted banks and technicians for suspicious movements

The authorities reinforced the alerts with the banks and the maintenance technicians. According to, users are also advised to report any unusual situation.

Outdated terminals become easy targets

These attacks show how the lack of terminal update can become an open door to sophisticated schemes. Continuous surveillance is fundamental to avoid damage.

Prevention remains the best instrument. Bank institutions, security technicians and citizens play an essential role in the early identification of these frauds and the protection of equipment.

Also read:

You may also like

Our Company

News USA and Northern BC: current events, analysis, and key topics of the day. Stay informed about the most important news and events in the region

Latest News

@2024 – All Right Reserved LNG in Northern BC