Yesterday, during a flashy presentation at the Black Hat security conference in Las Vegas, a computer security expert showed several ways to break into ATMs.
Barnaby Jack, who is director of research at IOActive Labs, made cash pour from a machine for minutes on end. After studying four different companies’ models, he said, “every ATM I’ve looked at, I’ve found a ‘game over’ vulnerability that allowed me to get cash from the machine.” He’s even identified an Internet-based attack that requires no physical access.
The same talk was supposed to take place at last year’s Black Hat conference, but it was pulled at the last moment. In his presentation, which did not reveal the exact details of how he performed the attacks, Jack named two vendors–Triton and Tranax–and said he had been in contact with both about fixing the problems.
Jack demonstrated the attacks on two ATMs that he bought online and drove to Las Vegas from his company’s headquarters in San Jose. The hardware kit that he used in the demonstration cost less than $100 to make.
In one part of his presentation, he demonstrated a way for a thief to gain physical access to the ATM made by Triton. The device’s main circuit, or motherboard, is protected only by a door with a lock that is relatively easy to open (Jack was able to buy a key online). He then used a USB port on the motherboard to upload his own software, which changed the device’s display, played a tune, and made the machine spit out money.
An attack was also performed on the Tranax device, which is designed to accept software upgrades over an Internet phone link. Jack showed that a vulnerability in the machine’s software allowed him to bypass its authentication system and break in remotely.
Jack said it is possible to find ATMs by using a computer to call one phone number after another; he was able to locate numerous machines within a couple of hours by searching through a 10,000-number exchange. An attacker could then exploit the software vulnerability to install control software known as a rootkit. To withdraw money, the attacker would visit the ATM later with a fake card or steal information from other users.
Jack urged manufacturers to improve the physical locks protecting ATM motherboards and disable the ability to upgrade firmware remotely. He also suggested that the devices’ code be reviewed thoroughly. “I want to change the way people look at devices that are seemingly impenetrable,” he said.
Bob Douglas, vice president of engineering at Triton, said the company has developed a defense against Jack’s attack. The fix was released in November of last year, but Douglas couldn’t say what percentage of customers had implemented it. He added that the company plans to review its code and does sell ATMs with the option for a higher-security lock. Jack said he’s also been in touch with Tranax about the vulnerabilities he found in its machines.
This is the real story of the Afghan biometric databases abandoned to the Taliban
By capturing 40 pieces of data per person—from iris scans and family links to their favorite fruit—a system meant to cut fraud in the Afghan security forces may actually aid the Taliban.
The covid tech that is intimately tied to China’s surveillance state
Heat-sensing cameras and face recognition systems may help fight covid-19—but they also make us complicit in the high-tech oppression of Uyghurs.
How Amazon Ring uses domestic violence to market doorbell cameras
Partnerships with law enforcement give smart cameras to the survivors of domestic violence. But who does it really help?
Why you should be more concerned about internet shutdowns
Governments are turning off the internet to silence dissenters at an ‘exponential’ rate—and threatening civil society, says the chief operating officer of Google’s Jigsaw project.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.