Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

ATM Scammers Emptying Machines with Malware

by The Gurus
September 25, 2015
in News, Videos
Share on FacebookShare on Twitter

Hackers are using a new strain of malware, dubbed GreenDispenser, to infect ATMs and then drain the machine of all its cash, researchers at ProofPoint have revealed.
Once Installed, the malware displays an ‘out of service’ message on the ATM. However these clever attackers can still enter a specific PIN and take the cash and the erase all trace of the malware by using a “deep delete” process, leaving little trace of how the machine was robbed.
Evidence suggests that GreenDispenser, which so far has only affected ATMs in India and Mexico, has to be installed manually. But ProofPoint believes it is only a matter of time before these techniques are abused across the globe. It has the ability to target ATM hardware from multiple vendors using the XFS standard, widely adopted by various ATM vendors.
In a blog posting, the researchers said that the “initial malware installation likely requires physical access to the ATM, raising questions of compromised physical security or personnel. The malware seems to be operated by hackers with the help of a mobile application, using a QR reader to generate a PIN that is then use to access the machine”.
More IT Security News at www.itsecurityguru.org
@IT_SecGuru

FacebookTweetLinkedIn
Tags: atmattackBreachcash machineCyberCyber SecuritycybersecuritydataEncryptionFlawfraudgreendispenserHackhackedHackerHackershackingindiainformation securityinfosecinfosecurityit securityMalwaremexicopinproofpointrisksecurityThreatVulnerabilityxfs standard
ShareTweetShare
Previous Post

Infographic – Phishing and Spear Phishing: What do you need to know?

Next Post

Mobile advertising DDoS JavaScript drip serves site with 4.5 billion hits

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information