News: 1771526344

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Crims hit a $20M jackpot via malware-stuffed ATMs

(2026/02/19)


Thieves stole more than $20 million from compromised ATMs last year using a malware-assisted technique that the FBI says is on the uptick across the United States.

They are doing this through ATM jackpotting - a cyber-physical attack in which crooks exploit physical and software vulnerabilities in ATMs to deploy malware that instructs the machine to dispense cash on demand without bank authorization. Of the 1,900 such incidents reported since 2020, more than 700 occurred in 2025 alone, according to a Thursday [1]security alert [PDF].

Crims typically gain initial access via generic keys that open the ATM face, and then infect the machine with malware, either removing the ATM's hard drive and copying malware onto it before putting it back into the machine, or simply replacing the hard drive with one that's preloaded with ATM jackpotting code.

[2]

Ploutus malware, which is commonly used in these attacks, exploits eXtensions for Financial Services (XFS), an open-standard API that ATMs, POS terminals, and similar devices that run banking applications use. It allows the banking software to work across different vendors' hardware and instruct the ATM what to do - for example, send this transaction to the bank for authorization, and then dispense cash to the customer.

[3]

The malware, however, allows the attackers to issue their own commands to XFS, bypass bank authorization, and instruct the ATM to dispense cash on demand.

[4]ATM flashes a port or two for the enterprising hacker

[5]ATM takes a kicking yet keeps on ticking

[6]Manchester ATM ups PIN requirement to full Windows login

[7]ATM maintenance tech broke the bank by forgetting to return a key

While these attacks don't hurt banking customers - unlike skimming, which steals people's card data and PINs - ATM jackpotting does cost financial institutions tens of millions of dollars in losses. Plus, these incidents are difficult to detect until after the cash is withdrawn.

In its Thursday alert, the FBI lists several digital indicators of compromise on ATMs running Windows OS, so give those a read as they include multiple executables along with associated files and scripts. There are also several physical indicators, such as event IDs that may appear when USB storage devices are inserted into a compromised ATM, and things like no cash indicators, unauthorized devices plugged into the ATM, or removed hard drives.

As always, if you see suspicious activity or any indication of ATM jackpotting, report it to your local FBI field office at www.fbi.gov/contact-us/field-offices or the FBI Internet Crime Complaint Center at [8]www.ic3.gov . ®

Get our [9]Tech Resources



[1] https://www.ic3.gov/CSA/2026/260219.pdf

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aZeWDBDWmm5mFOdf0fxGuQAAA5A&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZeWDBDWmm5mFOdf0fxGuQAAA5A&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://www.theregister.com/2026/01/28/atm_flashes_a_port_bork/

[5] https://www.theregister.com/2026/01/21/atm_bork/

[6] https://www.theregister.com/2026/01/20/manchester_atm_bork/

[7] https://www.theregister.com/2026/01/19/who_me/

[8] http://www.ic3.gov

[9] https://whitepapers.theregister.com/



You just know they skimped on the security

Anonymous Coward

because it was getting "too expensive".

Re: You just know they skimped on the security

BartyFartsLast

Business expense and tax write off I guess, $20M is probably peanuts compared to the cost of making it all secure because it sounds like there's physical security changes needed as well as the ongoing maintenance and patching, plus the US, I think, has a whole raft of different ATM services which compete for locations in places like bodegas, gas stations and pretty much anywhere they can

Re: You just know they skimped on the security

DS999

Because it is too easy to build your ATM on a Windows platform.

While these attacks don't hurt banking customers

Neil Barnes

Um, yes. Yes they do.

Any theft - whether it's money from 'the bank', cheating on taxes, shoplifting, stealing parcels from people's doorsteps - has a knock on effect throughout society. It may be only a few cents here and there, maybe only fractions of a penny... but there are such a lot of them. That's your pension that's not paying as well because the bank shows a lower profit and has a lower share price and dividend payout.

It still hurts you - and me - somehow. It's never a victimless crime.

Of course, whether its comparable to losses caused by a 'self-made' multi-billionaire is another question. It might be a defensible claim that people gave their hard-earned money to billionaire voluntarily. I mean, it's 'free' to use the 'services' that such parasites have created, right?

Victimless crime.

Anonymous Coward

As far as I'm concerned, banks aren't victims, they're perpetrators. This is just retrieving a few pennies from the billionaires.

Unlike robbing a bank with a gun, there is no harm to anyone innocent.

It is only by risking our persons from one hour to another that we live
at all. And often enough our faith beforehand in an uncertified result
is the only thing that makes the result come true.
-- William James