ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New ATM Hack Can Steal $50,000 in 15 Minutes!

New ATM Hack Can Steal $50,000 in 15 Minutes!

You might recall getting a notice from your bank that you’ve been issued a new debit and credit card, one with a chip built into it for enhanced security. There are ATMs out there created specifically for use with these chips, but the same technology created to protect user credentials is now being used to steal them for fraudulent withdrawals.

Weston Hecker, a senior security consultant at the cybersecurity firm Rapid7, spoke at the Black Hat conference in Las Vegas, and demonstrated the technique. It can reportedly steal up to $50,000 out of a single ATM in under 15 minutes. While there had been problems with ATMs running older operating systems, like Windows XP, this is an entirely different problem. The reasoning: these ATMs are brand spanking new, and designed to take advantage of the latest chip-security technology. So, you can understand why there’s such a cause for concern in this case.

The exploit requires a $2,000 kit to install, but compared to the potential gains, this is a small price to pay. Hackers can alter an ATM by adding a device to the terminal. Specifically, it’s placed in between the ATM user’s card chip, and the roof of the area where the card is inserted. This data is then read--including the PIN--and transferred to the criminal, who could be hundreds of miles away. The hacker can download this data to their smartphone and use the card details to withdraw money from any ATM system.

Once this has happened, the hacker can order the machine to constantly withdraw funds to steal an exorbitant sum. Granted, they have to do this near an unattended machine, or one which is remote enough that nobody would notice (or care) that someone was messing with it, but the point stands that the hacker can steal huge amounts of money with relatively little effort.

There are some drawbacks to this method, though. For one, a hacker probably won’t be able to use the spoofed credentials for a very long time; at least, not until the user has caught on to their scheme and thwarted it by contacting their bank. Second of all, the hacker needs to find a way to bypass the security cameras that are inevitably located within each and every ATM they’ll encounter, and that’s not mentioning all of the other security cameras in the area that are monitoring the ATM.

Still, despite the challenges, hackers could have a field day with this vulnerability. Rapid7 has fully disclosed the details of the vulnerability to the manufacturers, but hasn’t made the details public, out of fear that the details could put more people at risk. The idea is to give the manufacturers time to resolve the issue, before hackers find a way around these fixes.

In general, it’s a good practice to always monitor your bank accounts, and to report any suspicious behavior to your bank. Additionally, it’s important that you never hand over your banking credentials to anyone for any reason--particularly a sketchy email from your “bank” asking you to confirm your credentials. These are known as phishing scams, and they try to use your trusting nature against you.

Additionally, never input credentials into unsecured websites. Any websites that you need to use your credit card credentials on should have encryption protocol in place to hide your information from hackers. You need to be very deliberate about avoiding websites that look like they may be trying to steal your data.

For more information about how to keep your financial records secure, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Remote Work Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Workplace Strategy Gadgets Networking Windows Virtualization Blockchain Spam WiFi Server Information Bandwidth Remote Encryption Mobile Device Management App Business Technology Office Apple Two-factor Authentication Information Technology Office 365 Budget Employee/Employer Relationship History Gmail Analytics Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Big Data Hacking Cost Management IT Management Training Remote Computing Document Management Hacker Save Money Patch Management Vendor Compliance Remote Monitoring Employer-Employee Relationship Voice over Internet Protocol Help Desk Hiring/Firing Managed Services Outlook Data loss Password Legal Data storage Money Customer Service Unified Threat Management Firewall Applications Augmented Reality Word Search... Project Management BYOD Vulnerabilities Best Practice IBM Website Computing Vendor Management Retail Hard Drive Alert Mobile Office YouTube Windows 7 Twitter Google Maps User Free Resource Scam Law Enforcement Laptop End of Support How To Printer VPN Chrome Update Sports Travel Social SaaS DDoS Virtual Reality Data Breach Mobile Computing Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Marketing Maintenance iPhone Cleaning Running Cable Education Cortana Robot Content Filtering Windows 11 Monitoring Storage Healthcare Websites Router Mobility Meetings Remote Workers The Internet of Things Automobile Managed Services Provider HIPAA Telephone Virtual Private Network How To Wireless Technology Microchip Flexibility Current Events eWaste Excel Solutions Downtime Tech Terms Hack Safety Identity Theft Integration Images 101 Notifications Managed IT Digital Display Unified Communications Virtual Assistant Virtual Desktop Google Docs PowerPoint Experience Administration Bluetooth Taxes Distributed Denial of Service Employees Office Tips Avoiding Downtime Presentation Specifications Processor Private Cloud Memory IT Consultant Holidays Disaster Physical Security Customer Relationship Management Cooperation Video Conferencing Co-Managed IT Politics Entertainment Machine Learning Settings Lithium-ion battery Virtual Machines Multi-factor Authentication Computer Repair Start Menu Solid State Drive Downloads Computer Care Professional Services Processors Saving Time Vulnerability Chromebook Software as a Service Drones Computers Data Protection Bitcoin Term Google Calendar Financial Data Download Windows 8 Supercomputer Piracy Scams Risk Management Virus IT HTML Nanotechnology Public Speaking Displays Advertising Motion Sickness Google Apps Browsers Relocation Google Play Streaming Media Comparison Telework Upload Work/Life Balance Google Drive Tech Support Software License Microsoft 365 Cables Smartwatch Social Network Communitications Keyboard Data Analysis Knowledge Procurement Screen Reader Hard Drives Corporate Profile Business Owner Security Cameras In Internet of Things Television FinTech Trends Telephony intranet Employer Employee Relationship Mobile Technology Devices Shortcut Network Congestion Cabling Point of Sale CES Customer Resource management Wireless Hacks IT Assessment Fileless Malware Reliable Computing Supply Chain Management Heating/Cooling Writing Tablet Value Environment G Suite Tip of the week Windows XP Mouse Organization Gamification VoIP Cyber security Social Networking Tracking Company Culture Shortcuts Regulations Telephone System Smart Devices Inbound Marketing Directions Scalability Remote Working Backup and Disaster Recovery Web Server Administrator SharePoint AI Content Text Messaging Trend Micro Proactive IT Digital Payment Desktop Be Proactive Accountants Worker Transportation Digital Security Cameras Electronic Medical Records Bring Your Own Device Electronic Health Records Database Access Wasting Time Electronic Payment Time Management eCommerce Music Public Cloud Modem Workplace Strategies Equifax Videos Health IT Staffing Surveillance Audit Tactics IP Address Spyware Managing Costs Hard Drive Disposal Botnet Phone System Username File Sharing SSID Startup Micrsooft Employer/Employee Relationships Freedom of Information Media Rental Service Redundancy Development Navigation Addiction Flash Cache Virtual Machine email scam Reviews Telephone Systems Unified Threat Management Optimization Business Growth Workers Mobile Security Smart Technology Legislation Competition Teamwork News 2FA User Tip Recovery Evernote Printing Data Storage Computer Accessories Network Management Hypervisor CCTV Medical IT LiFi Shopping Banking Touchscreen Entrepreneur Google Wallet Emails Application Deep Learning SQL Server Computer Malfunction Fake News Paperless Proxy Server Documents Messenger Emergency PCI DSS Service Level Agreement Vendor Mangement Licensing Business Intelligence Computing Infrastructure Supply Chain Gig Economy Management Business Metrics Humor Hosted Solution Samsung Device security Internet Service Provider Wireless Headphones Uninterrupted Power Supply Azure Webcam Microsoft Excel Business Communications Securty Books Tech Regulations Compliance Going Green Domains Language Business Mangement Managed IT Service Society Business Cards Workplace Error Memes Tablets Net Neutrality Monitors Visible Light Communication Human Resources Troubleshooting Bookmark Reading

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?