Organized criminals networks continue to explore vulnerabilities at the ATM terminals, despite improvements in safety systems. In Spain, a particular technique has often reappeared, generating alerts with the authorities.
Old method again gain prominence
The method is called Jackpotting and has gaining ground again in several Spanish regions, according to the 20 Minutes newspaper. It is a computer attack that requires the ATM to dispense with large amounts of money without a card or code.
Demonstration in 2010 made technique known worldwide
The term gained notoriety after the presentation by Barnaby Jack, a cybersecurity expert at an international conference in 2010. At the time, it demonstrated how it was possible to manipulate a terminal for this releasing all available notes.
Damage exceeded one million euros in Germany
Shortly after the technique was released, the first actual attacks began to emerge. Germany was one of the most affected countries, registering losses greater than one million euros caused by this type of intrusion.
Malicious software requires machine to dispense with money
At the base of the scheme is the introduction of malware into the terminal system. The program, such as the well -known Cutler Maker, forces the machine to distribute notes uncontrollable, without leaving legitimate survey operations.
Although not a recent practice, Jackpotting has resurfaced in recent months, coinciding with physical and technical changes in automatic terminals, which may have facilitated the work of attackers.
Criminals use disguises to avoid lifting suspicions
To execute the plan, and according to the same source, criminals need to physically access the terminal. They use disguises such as fake uniforms or discreet behaviors, not to raise suspicions with customers or banking employees.
Once by the machine, the attackers insert a USB Pen containing the necessary malware. Among the programs used is also Winpot, which transforms the terminal display into an interface similar to a slot machine.
We recommend:
Terminal Control allows you to issue direct commands
With the virus installed, strikers directly control the crowd and run commands that lead to the exit of money. This step requires physical presence and speed in operation, requiring coordination between those involved.
Ordinary people are used to collect money
The collection of notes is rarely done by those who install the software. For this, the heads hire accomplices that are undergoing normal users, minimizing the risk of detention during operation.
These “human mules” act at the right time, seeming only to raise money like any client. The separation of functions makes the scheme more difficult to track through security forces.
Alerted banks and technicians for suspicious movements
The authorities reinforced the alerts with the banks and the maintenance technicians. According to, users are also advised to report any unusual situation.
Outdated terminals become easy targets
These attacks show how the lack of terminal update can become an open door to sophisticated schemes. Continuous surveillance is fundamental to avoid damage.
Prevention remains the best instrument. Bank institutions, security technicians and citizens play an essential role in the early identification of these frauds and the protection of equipment.
Also read: