Tuesday, October 27, 23:59
Home inet The Dark Web is full of hacking tools for ATM machines

The Dark Web is full of hacking tools for ATM machines


With more and more tools and units being sold at Dark web lately, even a beginner hacker could crash an ATM machine in 15 minutes.

Η CloudSEK found that while in the past someone had to have the knowledge needed for such a tool, nowadays dark web vendors are promoting newer tools such as malicious cards and malware USB for ATMs to crack such machines, making the job simple for anyone.

“Although it has been a little more difficult up until now, with the new ones techniques anyone can manage these machines, ”says CloudSEK security researcher Rakesh Krishnan, who represented the buyer to get in touch with dark web vendors and learn the latest news about ATM hacking.

One of the vendors provided him with an ATM Malware Card that included a PIN Descriptor, Set Off Card and instructions on how to withdraw money from the machine.

Another common technique for stealing money from ATM machines is to infect them by using a USB drive that hosts a software malware.

These malicious programs primarily target programs that work on Windows XP Home. In addition, Krishnan explains that most of these units work worldwide on ATM machines and most of the time do not require modifications for different areas. "ATM machines around the world use specific methods and software, so these malicious programs work everywhere," he says.

Gautam Kumawat, an expert on cyberspacesays that many of these cheap tools available on the dark web are easily accessible on worldwide e-commerce sites with instant ordering capabilities.

In addition there are some other additives to these tools that do not need to be in direct contact with the machinery. One recently discovered technique, for example, uses malicious software Ploutus-D, which manages the hardware, thereby allowing anyone to remove all money from a machine.

Krishnan also states that many of the dark web vendors are providing the latest techniques hacking marketed such as POS Terminals, Upgraded Antenna, Custom Skimmers ATM, RFID Reader / Author and the like. These techniques are priced around $ 1400. Card cloning is another basic cyber-hacking technique.

Her experts Cybersecurity point out that, moreover, ATM machines are not updated, which makes them even weaker.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement


Among Us: players were hit by a spam attack

InnerSloth, creator of the popular game Among Us, faced an attack that affected its players last week. More specifically, some ...

Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...