Britain’s NCSC, the cybersecurity arm of GCHQ, has taken heed of a recent alert regarding a concerning cyber threat. According to reports from media outlets, criminals have developed malware specifically targeting ATMs, with the potential to generate a minimum profit of $30,000 per infected machine.
This malicious software, currently attributed to a known cybercrime actor, purportedly claims to have already infiltrated 60% of ATMs across Europe, with intentions to expand its reach further.
Alarming reports suggest that this malware is capable of infecting ATMs worldwide, including those manufactured by prominent companies such as GRG, Hitachi, BCR, Hyosung, Bank of America, Hosing Oki, and Diebold.
What sets this malware apart is its distribution model, which operates on a subscription basis and even entertains requests for profit sharing from jackpotting campaigns.
Amidst the multitude of financial scams and lesser-known frauds that occur annually, these attacks not only jeopardize the integrity of the banking sector but also erode public trust in digital banking, potentially leading to increased instances of theft and cybercrime.
Given its success thus far, threat actors are reportedly considering expanding the reach of this malware to ATM infrastructures in other Western nations such as the United States, Canada, and Australia.
The methods by which this malware is introduced into ATM systems remain shrouded in mystery, as both media publications and the threat actors themselves have provided scant details.
For the public, exercising vigilance when using ATMs is paramount. It’s crucial to remain alert to your surroundings, as ATMs could be compromised by hidden cameras or other surveillance devices.