NetMag Global
Jackpotting: ATMs are spitting out cash like slot machines

Jackpotting: ATMs are spitting out cash like slot machines

Jackpotting: ATMs are spitting out cash like slot machines. Diebold Nixdorf Inc and NCR Corp have warned that cyber criminals were targeting US cash machines with tools that force them to spit out money in hacking schemes known as ‘jackpotting’.

The hacking scheme Jackpotting has been rising all around the world in recent years, though it is not clear how much cash has been stolen because victims & police often do not disclose the details regarding the issue.

The warner are the two of the world’s largest ATM makers that did not identify any victims nor these ATM makers say how much money had been lost due to Jackpotting.

Earlier on Saturday, the attacks of Jackpotting were reported by the security news website Krebs on Security, which said they had begun the previous year in Mexico.

The companies have confirmed that they had sent out the alerts to their clients. According to NCR the cases were the 1st confirmed “jackpotting” losses in the United States ( The US).

NCR also said in a Friday alert that its equipment had not been targeted in the recent attacks. Instead, it was still a concern for the entire ATM industry, as the attacks of such kind could work anywhere and criminals have no association of kindness to anyone.

The hack alert also does say that this attack should be treated by all ATM deployers as a call to action to take some appropriate steps si that their ATMs are protected against these forms of attack.

Must Read: Indian junior team washed out Pakistani junior players in U- 19 

Diebold Nixdorf in a separate Friday alert says that US authorities had warned the company that hackers had been targeting one of its ATM models. This model is known as Opteva. Opteva went out of production many years ago.

According to a confidential US Secret Service alert sent to banks,  the hackers could target stand-alone ATMs that were typically located in pharmacies, big box retailers & drive-through ATMs.

Diebold Nixdorf’s alert has also described steps that were being used by the criminals to compromise ATMs.

Additionally, they said that gaining physical access, replacing the hard drive & using an industrial endoscope to depress an internal button that is required to reset the device.

Back in 2016, according to the reports of Russian cybersecurity firm Group IB, the cyber criminals had remotely attacked cash machines in more than a dozen countries across Europe in 2016.

Similar kind of attacks had also been reported in 2016, in Thailand and Taiwan.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *