Reverse ATM attack used to steal nearly $4 million in cash
ADon’t know what is a reverse ATM attack? You are about to find out
As banks and financial services are attempting to beef up security in order to preserve funds as much as possible, the level of sophistication with how money is being stolen from these institutes have also increased. Starting from last year, criminals in Russia have found a way to steal nearly 252 million Rubles, which translates into $3.8 million US dollars from five unnamed banks.
They have managed to achieve this feat by using a process called reverse ATM attack. According to the Russian digital intelligence firm Group-IB, reverse ATM attack is able to exploit weaknesses in the international transfer system, allowing criminals to withdraw bundles full of cash with ease. However, according to the security agency, these criminals could have ran away with more cash if they had been more patient, signifying how effective the reverse ATM attack method is when malice is your only intent.
According to Forbes, here is how the process works:
Mules or simple depositors working for these criminals would deposit sums of 5,000, 10,000 and 30,000 Rubles into verified accounts, and after that, they would withdraw the amount from the ATM machine. Afterwards, they take a receipt from the ATM, which details a payment reference number as well as the amount withdrawn by them.
After this process has been successfully carried out, the information is later sent to hackers who then use the data and gain access to thousands of point of sale terminals, which are located in abundance in the US and the Czech Republic. By doing this, they are able to create a ‘reversal operation’ on a terminal that fools the bank into believing the withdrawal of funds had been cancelled.
At the point of sale terminal, this looked as though goods were returned or a payment declined, while to banks it looks like the ATM withdrawal had been cancelled. Funds are returned to the account, though the crooks had already taken the cash and are probably celebrating their payday over a successful, clever and clandestine heist.
The process is continued until there are no physical notes remaining in that particular ATM. This process is then repeated at various locations, which explains how the criminals had been able to steal so much cash in a small amount of time. Group-IB has currently not stated its plans to bring these hackers to justice nor has it specified any other information to the public. However, if we have an update, we will publish it accordingly.
No comments:
Post a Comment