UPDATED 22:15 EDT / AUGUST 13 2018

INFRA

FBI warns cybercriminals are planning a global ‘ATM cash-out’ attack

The Federal Bureau of Investigation has issued a warning that cybercriminals are planning a global attack on financial institutions that involves hacking systems and stealing millions of dollars via automatic teller machines.

Dubbed “ATM cash-out,” the attack is said to involve unnamed criminals compromising a financial institution with malware to access customer card information, alter account balances and disable maximum ATM withdrawal amounts and transaction limits.

“The FBI has obtained unspecified reporting indicating cybercriminals are planning to conduct a global ATM cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation,’” a confidential alert from the FBI obtained Sunday by security researcher Brian Krebs stated.

The warning noted that small-to-medium size financial institutions were more likely to be targeted “due to less robust implementation of cybersecurity controls, budgets, or third-party vendor vulnerabilities.” It also said that after hacking or phishing their way into targeted networks, the cybercriminals remove fraud controls just prior to the withdrawal stage.

“The cybercriminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores,” the FBI noted. “At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.”

Cybercriminals targeting ATM networks are not new. Skimming operations, which involve placing hardware on top of an ATM to capture card details or implanting malicious code in an ATM, are fairly common. Where this appears to be different is that the attack is also a global campaign targeting banking systems to maximize the potential haul from the attack.

The FBI is encouraging banks to implement improved security procedures both to prevent an attack and to detect one if and when it occurs. Recommendations include implementing strong password requirements, the use of two-factor authentication and enhanced network monitoring and auditing.

Photo: Pexels

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.