gabe@gabegold.com
Date: Thu, 16 Nov 2017 14:07:16 -0500
How simple life was three years ago when we last wrote about ATM
malware. Back then, security researchers classified ATM attacks into two
broad categories: ones that used skimming hardware devices attached to the
outside of card readers, and ones that used various techniques to open ATMs'
cabinets and cash drawers. The skimmers were crude but effective in
collecting credit and debit card numbers from customers. The latter methods
exploited vulnerabilities created by the ATMs' outdated operating systems
(OS) and their functionality. In one case, some criminals blew up the ATMs
themselves, as The Daily Mirror reported. Crude, but certainly effective.
https://securityintelligence.com/how-are-atms-exploited-an-update-on-atm-malware-methods/