<Prev | [Index] | Next>


gabe@gabegold.com
Date: Thu, 16 Nov 2017 14:07:16 -0500

How simple life was three years ago when we last wrote about ATM malware. Back then, security researchers classified ATM attacks into two broad categories: ones that used skimming hardware devices attached to the outside of card readers, and ones that used various techniques to open ATMs' cabinets and cash drawers. The skimmers were crude but effective in collecting credit and debit card numbers from customers. The latter methods exploited vulnerabilities created by the ATMs' outdated operating systems
(OS) and their functionality. In one case, some criminals blew up the ATMs themselves, as The Daily Mirror reported. Crude, but certainly effective.

https://securityintelligence.com/how-are-atms-exploited-an-update-on-atm-malware-methods/


<Prev | [Index] | Next>