Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Banks Warned of Attacks Targeting ATMs and Card Authorization Systems

ATM security is not just about having strong locks physically locking down the machines. It also requires protecting the IT security of bank networks more generally.

ATM security is not just about having strong locks physically locking down the machines. It also requires protecting the IT security of bank networks more generally.

This is underscored by an advisory that was just issued by the Federal Financial Institutions Examination Council (FFIEC) notifying financial organizations of the risk of what they have dubbed ‘unlimited operations’ attacks. 

“Unlimited Operations are a category of ATM cash-out fraud where criminals are able to withdraw funds beyond the cash balance in customer accounts or beyond other control limits typically applied to ATM withdrawals,” according to the FFIEC. “Criminals perpetrate the fraud by initiating cyber-attacks to gain access to web-based ATM control panels, which enables them to withdraw customer funds from ATMs using stolen customer debit, prepaid, or ATM card account information. A recent Unlimited Operations attack netted over $40 million in fraud using only 12 debit card accounts.”

The attacks typically start with malicious emails sent to employees, according to the FFIEC. Once the malware is installed, the criminals use it to monitor the institution’s network to determine how the bank accesses ATM control panels and obtain employee login credentials. These controls are used to manage the amount customers of money customers can withdraw in a certain timeframe as well as any geographic limits on withdrawals.

Following an attack on an institution’s ATM control panels, criminals use fraudulent debit, prepaid or ATM cards they create with account information and personal identification numbers (PINs) stolen through separate attacks using skimmers or other means. From there, crews of “cashers” are responsible for actually withdrawing the cash. Criminals may conduct their operations during holidays and weekends to take advantage of increased cash levels in ATMs and limited monitoring by financial institutions during non-work hours, according to the FFIEC.

Mike Park, managing consultant at Trustwave, said these types of multi-stage attacks by determined group can be challenging to fight. Still, he added, the attack demonstrate the importance of maintaining a “full and far-reaching security program for all aspects of the ATM environment,” including the ATM network, management interfaces and protocols and the software on the ATM itself.

“PCI DSS compliance is a good start and a good baseline, but it is just that – a baseline,” he added. “To try to achieve the best level of security possible, small and medium sized banks and ATM networks need to proactively test their ATM networks, the physical ATM security and the security of the applications running on the ATM themselves, as well as the security of any backend ATM Management applications. They should also frequently scan applications to help identify vulnerabilities before they become a problem.”

Andreas Baumhof, chief technology officer at ThreatMetrix, agreed, adding that the payment ecosystem is very complex.  

Advertisement. Scroll to continue reading.

“More regulation will certainly help as it sets a clear boundary of things that need to be done,” he said. “It will never be enough though. For this we need regulation that incentivizes companies to do the right thing. Data breach notification is a good example where it is not a regulation to “fix” a problem, but rather makes sure that companies do the right thing.”

“We need to have a more holistic view of all of these things,” he continued. “At the moment a payment processor can say, ‘Hey, I’m doing everything correct to protect my customers, but there is nothing I can do if Target or LinkedIn or anyone else for that matter’. The problem is in between there, and we need a more holistic view to solve it.”

According to the FFIEC, there are a number of steps organizations can take. For starters, they can limit the number of elevated privileges across the institution, including administrator accounts, as well as the ability to assign elevated privileges to critical systems that manage the institution’s card issuer authorizations and ATM management systems. They should also consider updating all credentials and monitoring logs for use of old credentials and consider establishing authentication rules such as time-of-day controls for web-based control panels.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.