Hacker News new | past | comments | ask | show | jobs | submit login
ATM Hackers Have Picked Up Some Clever New Tricks (wired.com)
109 points by fortran77 on Aug 15, 2020 | hide | past | favorite | 50 comments



I wonder how they get access to a communication line or access port or whatever to load their malware onto the ATM. I would think that's the tough part - once you get that, it's probably easy to compromise.


A lot of ATMs sit in places like convince stores or strip clubs or other places where you might need quick cash. They are profit centers for those places, because those places get to keep some of the fees collected.

They are also very very insecure. You can literally just walk around behind them and attach stuff without anyone really noticing.

I was renewing my registration at a DMV kiosk, which is like an ATM that spits out registration tags instead of money. The machine was broken, and the supermarket said to just call the number on the side. I did so, and they told me to unplug it and plug it back in. So I went around the back and did exactly that. No one questioned me.

Then they remotely logged in, messed around on it (which I could watch them do on the display) and it was fixed.

But my point here is that no one questioned me when I went around back, no one questioned a mouse moving around on a touch screen, no one questioned random control panels coming up, and the people who owned it (the DMV) didn't seem to care about the information leaks they were providing me.


Still, though, what sort of data lines do ATMs use? Ethernet? If so, how would you exploit it?

It seems like the ATM's software might work like this: on bootup, connect to server atm.foobar.com at port xyz.

Oh, right. In that case, you'd write an MITM server. You could sneak a raspberry pi so that it goes ATM <-> RPI <-> ethernet, and then set up the RPI to broadcast all the network traffic via a wifi dongle to your laptop.

But... certificate pinning would trivially subvert that. I guess ATM manufacturers might not have done any pentests though, so perhaps they don't do cert pinning.

Assuming cert pinning, is there still a way?


The number of times I've heard people in the tech community mention certificate pinning as a valuable security mechanism is like the amount of times I've heard about zombies, despite the fact that they just don't exist.

I've worked on a team that reverse engineered and did security audits on a lot of commercial and consumer applications. We've seen cert pinning implemented correctly was maybe like once or twice a year by companies large enough to where their security team was larger than most software companies entire payroll.

Basically, it's not a thing that exist because it is really hard to implement properly. The threat model for being MITM'ed with cert spoofing is pretty exotic. In the end, cert pinning means your application is not working if something goes wrong with the certs, which EVERYONE at some point forgets to renew, or, worse, you CA inadvertently gets hosed.


What's it take, to implement it correctly? What are the most common implementation mistakes?


Would love some pointers too, I've run into it once implement in a way j could t circumvent and was blown away. I'd love to develop the skills to do the same myself.


The kind of ATM I see at gas stations usually seem to involve a legacy ethernet cable of some sort (I've been told it's probably RJ12) and/or a small antenna magnet-mounted to the top of it. Not sure if they both serve the same communications purpose.

The few times I've used one they also take a ridiculous amount of time to connect/return anything, on the order of 30s-1m.


This comment makes me feel old. The 2/3 sized cat5 jack is actually an RJ11 - what we used to call a 'phone jack'


Lol yeah "legacy ethernet cable" cracked me up, it's a phone jack :)


RJ12 is a thing: https://en.wikipedia.org/wiki/Registered_jack#RJ12

The jacks official name for the jack is Modular connector[1]. 6P6C for RJ14, 6P2C for RJ11 and 8P8C for RJ45 (what you described as cat5 jack)

[1]:https://en.wikipedia.org/wiki/Modular_connector


Many of these even now remain on dial-up, so they just have a modem and the cable is a phone jack. If you have a favorite bodega ATM that always takes 15 seconds to respond after you type your PIN, it's probably dialing. Newer ATMs almost certainly use wireless modems, if they aren't just connected to the Internet.

Fun fact, the modems still negotiate at 2400 or 9600 baud, because the extended negotiation times of higher-speed protocols more than negate time saved in transferring the small payload.

They even make gateways to bridge old dial-up ATMs to IP: https://atmpartmart.com/wireless-atm-modems/systech-box-ipg-...


Depending on the age it's either a Cat-3 cable or just a telephone cable in a round shield. It could also just be a serial cable.


For remote attacks what usually happens is the malicious actor will first get access to a banks network and from there pivot to the ATMs. Often times they have some remote tool to shoot off commands and so forth. The malware itself is rather basic and easy to understand-the security layer once remotely accessed is rather moot. Depending on the malware strain they can than program the ATM to be “cashed out” during certain time or even if certain cards will be inserted.


This was my exact question as well, and I wish the article did a better job answering it. There was a linked article that explained how it worked with physical access, i.e. popping the top of the ATM panel (it said the physical lock that keeps this down is like a "bathroom lock" and easily picked), and then there are USB or SIM card ports you can interface with.

For the remote attacks, though, like the one where it said could result in many ATMs at the same time being hacked, I don't begin to understand where the attack vector starts.


ATMs generally connect to a management system to retrieve configuration and report status. Like many back-end systems, these are often poorly designed and don't receive extensive security review. So if you can compromise one, there's an opportunity to potentially deliver a malicious configuration to a large number of machines at once.

Similarly, there are several ways that attackers can find ATMs on the internet or telephone system in bulk. Although the situation has improved, ATMs historically had very poor authentication for remote management (some likely still do) which made them vulnerable to malicious reconfiguration over the internet or telephone modem.


I'm now genuinely curious if it's possible to purchase an old atm to hack around with (solely educationally of course)

Was shocked to recently find semi-modern (mid-2000s) gas-pumps for sale cheap on eBay so who knows.


Find your local liquidation auction house. You'll see a lot more of the types of atms that show up at cash only businesses than bank location style atms, but sooner or later, one will show.


Yes! Look on the DEFCON channel on YouTube and watch several live demos with ATMs that were purchased second-hand.



Just keep in mind that it's very heavy. Very. Like your building's construction code may not allow that much weight per floor area. Shipping or mooving it around would be similarly "fun".


They make motorized hand carts ("dollies") that make it easy for a single person to move large safes. Either with motorized wheels, or a motorized actuator that lifts a second set of wheels up and down which makes it possible to go over curbs and other obstacles.

It would still probably be "fun" (not easy) for someone who hasn't done it before, but not impossible.


Whilst that's true... It doesn't change that the floor you're moving it to is probably not rated for the weight.

Picking it up only solves half the problem, and the easier half.


I had an acquaintance whose side business was running ATM's in convenience stores in California (the fees are outrageously profitable) so I assume it's possible to buy/rent the latest models for personal use and hack it all you want.


Hacking a rented device likely violates the contract and perhaps law.


There is a great youtube video about buying and converting a second hand ATM https://youtu.be/nHDpzczgdo0


> INJX_Pure .. runs a self-crafted HTTP server web interface for its purpose ..

Don't run your ATM under Windows and connected to the Internet. I recall reading an instructional manual that required the visit of two technicians, that installed and configured a black-box that required the entry of two unique codes to be activated. Communication to the back-end being done on private leased-lines. Then they upgraded the ATMs to Windows running over the Internet :o ..


There is no surprise here. The ATM companies making the machines and their software are so old school and simply outdated in terms of cybersecurity.


so old school

I'd go further than that. These companies are, demonstrably, run by total idiots.

I knew someone who worked for an ATM company back in the mid 1980s. Coordinated attacks exploiting weaknesses were routine even then!

That's right. People have been finding hacks to steal cash from ATMs for at least 35 years!

That's 35 freaking calendar years. How much is that in Internet years? :)


If game consoles are any indication, even if the security gets better over time it will never be "hack proof"


I used to read how OS/2 had a niche running ATMs long after the general public had lost interest. Wonder if that's still the case. I almost think I may have seen one crash and display a Windows CE screen once.


I remember when Bluetooth skimmers started to be used on gas station pumps in my country. The attacker would wait inside a car in the signals range and siphon off cc numbers in bulk. Management then put up signs to make sure to jiggle the reader before inserting your card, to ensure that it was real.


I guess I'm out of sync with the times. For some reason, my first thought on seeing the title was that it would be about some clever new tricks with the ANSI ATM standard.


In German the go-to method of "hacking" ATMs is blowing them up. I think they use some kind of gas to funnel inside the chassis and then ignite it. That seems to work exceedingly well, the numbers of that happening are insane. Is that not a thing in the US?


https://whyy.org/articles/money-goes-boom-phillys-history-of...

Seemed to happen in Philadelphia often this year. Many gases could do the job with the right amount of oxygen.

Canada had an interesting duo that used portable welders to cut holes in just the right spot. The travelled around a lot and hit 50 indoor ATMs after-hours (interesting video): https://youtu.be/HWg6GcthZi8?t=44


While you can weld with a torch and they are portable(no electricity), don't really call them 'welders'.


In Ireland, they just use a backhoe to cart the whole thing off:

https://www.youtube.com/watch?v=VTe0cdxdSEo

https://www.youtube.com/watch?v=QTyON6gPTFI

Ah, and here was a failed attempt to do the same in Virginia:

https://www.youtube.com/watch?v=u2TSGyXejls

How much cash does an ATM hold anyway?



600 bigOnes at most.


That sounds like it would certainly blast it open, doesn't it also burn the currency inside? Or is that well-protected enough it doesn't happen?


ATMs generally keep the money in locked boxes that are detachable. This boxes are designed for transport, and offer very little in terms of security.

The blast pops the box out, then the box can be opened with regular worshop tools in a safe house.


I’ve seen ATMs that warn they will release a red dye when tampering is detected that makes the cash unusable. Don’t know if that actually happens.


The trays do blow the red ink, however there are companies that (illegally) remove the unremoveable marking ink. Being part of a research group regarding ATM security was a really nice experience for me. It's a different world, full of unexpected things.


Most ATM’s are cheap Hyosung, tranax, etc. they most certainly do not have dye packs.

Source: I used to operate some ATM’s as a side biz.


They do get stolen by brute force, being dragged onto trucks with winches and chains. But not so much blowing them up.


Problem is the "towables" won't hold as much cash as built-in ones at a branch. And you still need to break into them later.


> And you still need to break into them later.

I would think that after you had physical possession of the ATM this would be a non-issue. You're free to do whatever you want with it, as long as it's hidden well enough it doesn't get tracked down.


How hard would it be though to have a small GPS tracker in the same secured area the money is in? I know there are a few instances of people hauling them off but it doesn't seem that well thought out or any indication this is successful more than other modest robberies.


If they started doing this I'm assuming they would put it inside some sort of faraday bag


I would assume that, as with anything else, unrestricted physical access == game over.

A GPS tracker in the money compartment is an interesting idea, but I would think that it wouldn't be to hard to defeat with either a faraday something or other or just disrupt the GPS signal [0].

That being said, this requires someone to be thinking about it, which may or may not be happening.

[0] https://www.economist.com/international/2013/07/27/out-of-si...


> And you still need to break into them later.

There's not much a few basic power tools can't get into, given enough time to use them.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: