Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New ATM Hack Can Steal $50,000 in 15 Minutes!

New ATM Hack Can Steal $50,000 in 15 Minutes!

You might recall getting a notice from your bank that you’ve been issued a new debit and credit card, one with a chip built into it for enhanced security. There are ATMs out there created specifically for use with these chips, but the same technology created to protect user credentials is now being used to steal them for fraudulent withdrawals.

Weston Hecker, a senior security consultant at the cybersecurity firm Rapid7, spoke at the Black Hat conference in Las Vegas, and demonstrated the technique. It can reportedly steal up to $50,000 out of a single ATM in under 15 minutes. While there had been problems with ATMs running older operating systems, like Windows XP, this is an entirely different problem. The reasoning: these ATMs are brand spanking new, and designed to take advantage of the latest chip-security technology. So, you can understand why there’s such a cause for concern in this case.

The exploit requires a $2,000 kit to install, but compared to the potential gains, this is a small price to pay. Hackers can alter an ATM by adding a device to the terminal. Specifically, it’s placed in between the ATM user’s card chip, and the roof of the area where the card is inserted. This data is then read--including the PIN--and transferred to the criminal, who could be hundreds of miles away. The hacker can download this data to their smartphone and use the card details to withdraw money from any ATM system.

Once this has happened, the hacker can order the machine to constantly withdraw funds to steal an exorbitant sum. Granted, they have to do this near an unattended machine, or one which is remote enough that nobody would notice (or care) that someone was messing with it, but the point stands that the hacker can steal huge amounts of money with relatively little effort.

There are some drawbacks to this method, though. For one, a hacker probably won’t be able to use the spoofed credentials for a very long time; at least, not until the user has caught on to their scheme and thwarted it by contacting their bank. Second of all, the hacker needs to find a way to bypass the security cameras that are inevitably located within each and every ATM they’ll encounter, and that’s not mentioning all of the other security cameras in the area that are monitoring the ATM.

Still, despite the challenges, hackers could have a field day with this vulnerability. Rapid7 has fully disclosed the details of the vulnerability to the manufacturers, but hasn’t made the details public, out of fear that the details could put more people at risk. The idea is to give the manufacturers time to resolve the issue, before hackers find a way around these fixes.

In general, it’s a good practice to always monitor your bank accounts, and to report any suspicious behavior to your bank. Additionally, it’s important that you never hand over your banking credentials to anyone for any reason--particularly a sketchy email from your “bank” asking you to confirm your credentials. These are known as phishing scams, and they try to use your trusting nature against you.

Additionally, never input credentials into unsecured websites. Any websites that you need to use your credit card credentials on should have encryption protocol in place to hide your information from hackers. You need to be very deliberate about avoiding websites that look like they may be trying to steal your data.

For more information about how to keep your financial records secure, reach out to Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 05 September 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Internet Best Practices Technology Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Google Hosted Solutions Microsoft Upgrade Computer Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Network Security Hardware Ransomware Communication Hacking WiFi Operating System Facebook The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Managed Service Provider Outlook Employer-Employee Relationship History Two-factor Authentication Small Business Wireless Technology Android Phishing App Apple Mobile Computing Big Data communications Safety Best Practice Unified Threat Management Alert Quick Tips Networking Data storage Data Windows Experience Smartphones Firewall Content Filtering Cybercrime Website Mobile Device Management Money Network Society Sports Hacker Automation Google Wallet Spam Running Cable Memory Information Technology Application Windows 8 Internet of Things Customer Service Deep Learning Hosted Solution Windows XP IT Services Documents BDR Artificial Intelligence Tech Support Compliance Vendor Management Drones Router Office 365 Social Printer Browser Analytics Monitors Virtual Desktop Saving Money Wireless intranet Securty Lithium-ion battery Unified Communications Document Management Encryption Displays Law Enforcement SaaS VoIP Social Networking Public Speaking Proactive IT Cortana IP Address End of Support Network Congestion Virtualization Save Money Music Government Augmented Reality Writing Keyboard Cryptocurrency Laptop Search User Hard Drives IBM Remote Computing Google Docs Shortcut Education Cleaning Holiday DDoS Heating/Cooling Black Market Word YouTube Processors Staffing Retail Office Tips LiFi BYOD Downtime Passwords Business Management Streaming Media Help Desk Disaster Managed IT services Micrsooft Visible Light Communication Competition Presentation Business Growth Entrepreneur Data Management Recovery Domains Bluetooth Robot Advertising
QR-Code