At the Black Hat conference, a hacker showed a new way to hack ATMs

    image

    Actually, the word "hacker" is used here in a positive context, without implying a computer geek. It’s just the opposite - Jack Barnaby, a network security specialist, learned how to crack ATMs in order to tell developers the main vulnerabilities of the system. In general, Jack found a simple way to learn how to crack ATMs (which every second teenager probably dreams of) - he simply bought two ATMs from two different manufacturers, Tranax Technologies and Triton, at an auction.

    According to Jack, after he spent a whole year studying the software and hardware of these devices. Now he can extract banknotes he studied from any ATMs until they end at the ATM itself. In general, outwardly, all this looks even simpler than in the movie “Terminator 2” (yes, I know that this is just a director’s ploy, you can’t hack an ATM in this way). So, the hacker introduced two methods of hacking ATMs - the first allows you to log into the system using a telephone modem, and the second method allows you to extract banknotes without having to enter a password for a credit card.

    Jack assures that the vulnerabilities found by him are very critical, but information about them has already been transferred to the manufacturers.

    In the case of ATM from Tranax, the hacker found a critical remote access vulnerability that allows you to gain full access to the system without having to enter a password. To exploit the vulnerability, an appropriate exploit was written, which was called Dillinger. Accordingly, for the second type of ATMs, another exploit was written - Scrooge.

    The first exploit allows exploiting the vulnerability in remote access technology to an ATM. The second is a rootkit that introduces a backdoor into the system, which is not shown in the list of running applications. You can call it by entering a combination of button presses or a specially made card.

    By the way, Triton ATMs do not have remote access vulnerabilities (at least the hacker did not find it). But the hardware of this device is standard, and the motherboard, which provides access to money, is protected by a standard key purchased by Jack for $ 10 on the Web. In general, all this allowed the hacker to install backdoor in the system as a system update.

    Unfortunately, more detailed information is not available, the hacker has not shared his best practices. By the way, after his appeal to manufacturers, Triton management reacted quickly by quickly installing updates that cover the vulnerability. But Tranax is still silent.

    By the way, Jack was supposed to speak at the last conference, but his speech was canceled at the last minute as a result of some technical overlap there.

    Interestingly, most ATMs of these manufacturers, which are installed in public places, do not have protection against the vulnerabilities found by Jack. But the new ATMs are already delivered with closed "holes".

    Source .

    Also popular now: