back

Electronic Bank Robberies

Stealing Money from ATMs with Malware

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:56:18
Language
English
Abstract
This talk will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The successful compromise of an ATM can easily result in the loss of several hundred thousand dollars.

Most automated teller machines (ATMs) run regular Windows systems and can be controlled like any other computer. The first public demonstration of an ATM hack was given in 2010 - but how bad is this threat really? It turns out there is a multi-million dollar business behind ATM hacks. This talk reveals how these criminal gangs operate by disclosing information obtained through forensic analysis of a real compromise.

In the analyzed case some malware was used to control the hacked machine that was written specifically for the targeted ATM brand. By reverse-engineering this malware, we gained unique insights into the technologies used by the intruders. The malicious features range from balance monitoring over cash-out commands to the wiping of the machine to cover up traces of the attack. They can be accessed through special number codes that are entered directly via the machine's number pad. Hooking techniques and overlay windows are used to display the status of the system on the ATM monitor.

We will further discuss that operations of this scale can only be performed by professional crime groups that not only have the technical capabilities to develop such special malware, but also have access to insider information about the design of ATMs and who know how the targeted banks operate.

Talk ID
5476
Event:
30C3
Day
1
Room
Saal 2
Start
4 p.m.
Duration
01:00:00
Track
Security & Safety
Type of
lecture
Speaker
tw
sb
Talk Slug & media link
30C3_-_5476_-_en_-_saal_2_-_201312271600_-_electronic_bank_robberies_-_tw_-_sb

Talk & Speaker speed statistics

Very rough underestimation:
138.9 wpm
741.7 spm
While speaker(s) speak(s):
142.7 wpm
762.2 spm
152.2 wpm
812.0 spm
122.2 wpm
654.6 spm
100.0% Checking done100.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
0.0% Nothing done yet0.0%
  

Work on this video on Amara!

Talk & Speaker speed statistics with word clouds

Whole talk:
138.9 wpm
741.7 spm
While speakers speak:
142.7 wpm
762.2 spm
tw:
152.2 wpm
812.0 spm
sb:
122.2 wpm
654.6 spm