Cyber â€‹â€‹criminals to steal cash from ATM without credit and debit cards have developed a new method. A new variety of malicious malware Tyupkin offender to withdraw large sums of money simply by typing in a code discovered belief.
Tyupkin Malware Is Used To Hack ATM Machines
Kaspersky Lab (1034431Z 🙂 forensic investigation in Eastern Europe, following a request from a financial services company called to ask about using a code first came to light the prevalence of ATM machines are empty.
Over the past few years, we are using the ATM skimming devices and malicious software attacks, have played a major uptick. World Bank report on the financial information of the hijacking follows skimmers, we are led to the arrest and prosecution of cyber criminals is an international law enforcement crackdown. We are now moving up the chain of cyber criminals and the threat to the natural evolution of the financial institutions with the goal of seeing. By directly infecting the ATM, or directly against the Bank advanced persistent threat (APT) attacks are done. Tyupkin malware attackers moving up the chain, and one such example is to find the weaknesses of ATM infrastructure, “said Kaspersky Labs.
Once the malware is empty ATM cash cassettes to a CD using ATMs installed is to look at the attackers. However, a 2-step process. Gaining physical access to the ATM firs ,. Second, a unique code – randomly generated by an algorithm in a remote location – and dispense cash to unlock the machine. After reboot, the mean ATMs are in control and can not recall a time of 40 notes.
Kaspersky during the investigation, Tyupkin malware was active in Eastern Europe and possibly for more than 50 ATMs, and other neighboring countries, including India and China, has spread, is well known. ATM physical security review and consider the safety of their investments Kaspersky bank has warned.