Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

ATM Malware Heist Suspects Arrested by UK Police

Law enforcement authorities in the United Kingdom have arrested three individuals suspected of being part of an eastern European criminal organization that uses malware to steal money from ATMs.

Law enforcement authorities in the United Kingdom have arrested three individuals suspected of being part of an eastern European criminal organization that uses malware to steal money from ATMs.

The suspects were arrested last week by officers of the London Regional Fraud Team (LRFT), a unit formed of detectives from the Metropolitan Police Service, the City of London Police, and the British Transport Police.

On Thursday, a 37-year-old man from Portsmouth was taken into custody. Officers later arrested two other suspects, a woman from Portsmouth and a man from Edmonton, who have been released on bail.

The criminal ring is believed to have stolen £1.6 million ($2.5 million) from a total of 51 ATMs located in London, Liverpool, Portsmouth, Doncaster, Blackpool, Brighton, and Sheffield. The attacks took place over the May bank holiday weekend.

According to authorities, the crooks physically broke into the targeted ATMs and infected them with malware. The malware allowed them to withdraw large amounts of cash, after which it deleted itself to make it more difficult to determine the cause of the attack. Due to the physical nature of the attack, no customer data was compromised, police said.

“An extensive, intelligence led investigation has uncovered what we believe is an organised crime gang systematically infecting and then clearing cash machines across the UK using specially created malware,” said Dave Strange, the head of the LRFT. “Cyber-enabled crime presents a major threat to our public and private sectors and to an increasing number of citizens. The only way to tackle this is by law enforcement and counter fraud agencies working in alliance, which is exactly what the London Regional Fraud Team and National Crime Agency have done over several months culminating in today’s arrest.” 

The National Crime Agency (NCA), which recently announced that it’s looking for cybercrime fighters, also contributed to the law enforcement operation.

 “The NCA provides specialist support to partners to present a collaborative response to serious and organised crime. This operation represents a significant disruption against a sophisticated criminal enterprise who used specialist malware to target cash points and steal large quantities of cash,” said Nigel Kirby, Deputy Director for the NCA’s Economic Crime Command.

Advertisement. Scroll to continue reading.

Malware designed to allow the manipulation of ATMs is not new, but it can still be highly efficient. Earlier this month, Kaspersky reported identifying a new piece of malware that can be used to empty ATM cash cassettes. The threat, dubbed Backdoor.MSIL.Tyupkin, targets ATMs from a major manufacturer running 32-bit versions of Microsoft Windows.

The malware was identified during Kaspersky Lab’s research on over 50 ATMs in eastern Europe, but infections have also been spotted in the U.S., India and China.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...