Skip to main content

How one small hack turned a secure ATM into a cash-spitting monster


During a panel titled "Breaking Embedded Devices," IOActive researchers demonstrated how any machine with a chip or internet connection can be compromised. Embedded systems are particularly at risk: These are mass-produced items that have one role in a machine, such as dispensing cash from an ATM or checking how much ink is in a printer, and are therefore overlooked in terms of security, Ng reported.
The ATM—a popular Opteva model from Diebold Nixdorf—contained a security flaw located near its speakers, IOActive found. This spot offered an opening that criminals could loosen to expose a USB port.
"It's a little bit like a magic trick, but no kidding, it took seconds to getting the ATM to open," Mike Davis, the director of embedded systems security at IOActive, told Ng. Davis said he alerted Diebold Nixdorf to the issue, but the company "didn't consider it enough of a security issue to address," as it was not located near the part of the ATM where the cash is stored, and therefore was not a concern.
To prove that it was a major flaw, IOActive's team plugged a netbook into the exposed USB port and added in code to the ATM's Automatic Funds Distributor—a bot in the embedded system that determines how much money to release. They were able to reverse engineer the bot, and lead the machine to empty out all of the cash it contained.
IOActive said that it has tried to work with Diebold Nixdorf to test out security flaws on other machines, but the company declined the help, Ng reported. The machine that was hacked was built in 2008 or 2009, and never received security patches or maintenance, a spokeswoman for Diebold Nixdorf told Ng.
"Like any connected device that does not receive proper maintenance and patching—especially one nearly 10 years old—the risk for it to be compromised increases," the spokeswoman said.The company did not say how many of its ATMs from that time period were still in use. In most cases, the spokeswoman said, it's the job of the financial institution to keep ATM software up to date. It remains unclear if this vulnerability has since been fixed, Ng reported.
A number of connected devices have proven hackable in recent years, including carsdronesrouterssmart home gadgets, and even guns. With Gartner predicting that 8.4 billion connected devices will be in use worldwide this year, security issues abound. It's extremely important for manufacturers to ensure Internet of Things (IoT) devices are secure, and for enterprise and consumer users to have security protocols in place.
istock-506664622.jpg
Image: iStockphoto/selensergen

The 3 big takeaways for TechRepublic readers

1. At a BlackHat 2017 panel, security firm IOActive demonstrated how it was able to hack an ATM to cause it to release all of its cash.
2. The firm was able to do this by exploiting an exposed USB near the ATM's speakers, and using code to reverse engineer the machine's funds distributor bot.
3. This demonstrates how important it is for companies to secure embedded systems and Internet of Things devices.

Comments

Popular posts from this blog

IMPORTANCE AND ADVANTAGES OF SIWES

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) The Industrial Training/Students Industrial Work Experience Scheme, IT/SIWES is a new Directorate under the Vice-Chancellor’s Office.  It was established on 20th April, 2012 The Students Industrial Work Experience Scheme (SIWES) is a skills training programme designed to expose and prepare students of universities and other tertiary institutions for the Industrial Work situation they are likely to meet after graduation.  It is also a planned and structured programme based on stated and specific career objectives which are geared towards developing the occupational competencies of participants (Mafe, 2009).  Consequently, the SIWES programme is a compulsory graduation requirement for all Nigerian university students offering certain courses. The Students Industrial Work Experience Scheme (SIWES), is the accepted training programme, which

How to Reset HP Elitebook 8460p BIOS/Administrator Password

Have you  forgotten HP Elitebook 8460p password , bios or administrator account password? How to do if both of them lost? It seems hard though there may be lots of ways that can solve it. But if we talk about it separately, such as in two parts,  HP elitebook password reset  would be not so difficult. Part 1: Reset HP Elitebook 8460p BIOS password Part 2: HP Elitebook 8460p Administrator password recovery Part 1: How to Reset Forgotten HP Elitebook BIOS Password? Generally, there are two ways to  reset forgotten BIOS password .  One  is forcing BIOS/CMOS to reset itself to its stored defaults by removing all power from it.  The other  is to use a program to either locate or identify the password, and reveal it to you or erasing the password clearly. And the most easiest and convenient method for erasing dynamic BIOS/CMOS settings is to remove battery directly from the motherboard. However, it applies to most motherboards besides HP Elitebook BIOS. Fortunately, HP Eliteb

Ethical Hacking - TCP/IP Hijacking

TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It is done in order to bypass the password authentication which is normally the start of a session. In theory, a TCP/IP connection is established as shown below − To hijack this connection, there are two possibilities − Find the seq which is a number that increases by 1, but there is no chance to predict it. The second possibility is to use the Man-in-the-Middle attack which, in simple words, is a type of network sniffing . For sniffing, we use tools like Wireshark or Ethercap . Example An attacker monitors the data transmission over a network and discovers the IP’s of two devices that participate in a connection. When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS attack and then resume communication by spoofing the IP of the disconnected user. Shijack In practice, one of the best TCP/IP hijack too