Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Cash machines hacked to spew out card details

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
Nihil Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 04:36 AM
Original message
Cash machines hacked to spew out card details
Source: New Scientist

What he has discovered is a devious piece of criminal coding that has been quietly at work in a clutch of cash machines at banks in Russia and Ukraine. It allows a gang member to walk up to an ATM, insert a "trigger" card, and use the machine's receipt printer to produce a list of all the debit card numbers used that day, including their start and expiry dates - and their PINs. Everything needed, in fact, to clone those cards and start emptying bank accounts. In some cases, the malicious software even allows the criminal to eject the machine's banknote storage cassette into the street.
...
After months poring over the Windows-based software in the bank's ATMs, Henwood and his team were astonished. They found a 50-kilobyte piece of malware disguised as a legitimate Windows program called lsass.exe. In a PC, this helps the Microsoft operating system cache session data - so users don't have to re-enter their passwords every time they get a new email, for example.
...
Once installed, the malware implements a "card data harvesting" routine, SpiderLabs said in an alert to banks issued at the end of May. When a customer inserts their card, the malware records to hard disc its account number, start date, expiry date and three-digit security code, as well as the PIN entered.
...
Equally ingenious is how the crooks harvest their stolen data - by using the ATM's receipt printer. Inserting a trigger card into the machine's slot causes the malware to launch a small window on the screen, with a variety of options. The first is to print out a list of all recently used cards. The data on the printout is encrypted, so crime bosses could enlist low-level accomplices to visit ATMs to retrieve the printouts, safe in the knowledge that they cannot use the data to clone cards themselves.
...

Read more: http://www.newscientist.com/article/mg20227135.700-cash-machines-hacked-to-spew-out-card-details.html?full=true



:wow:
Printer Friendly | Permalink |  | Top
RandomThoughts Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 04:45 AM
Response to Original message
1. another reason not to have electronic voting machines.
Since they have 1/10 the security of ATM's
Printer Friendly | Permalink |  | Top
 
muriel_volestrangler Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 04:46 AM
Response to Original message
2. You have to hope the bank security is better in western countries
It says it all depends on them getting access to the machines to install the programs. You also wonder whether the banks would say "well, you must have told someone your PIN - this is your fault, so we're not going to pay for it" to anyone who is hit by it.
Printer Friendly | Permalink |  | Top
 
tomreedtoon Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 06:06 AM
Response to Original message
3. I was shocked to see an Atlanta SunTrust ATM boot into Windows.
I knew that something like this would happen, because the lazy programmers would use Windows which can be easily hacked.

On the other hand, I once found a clutch of Disney's IT people and asked what their elaborate fingerprint-reading entry terminals used - Windows or Linux. They said "machine language." They programmed something that would be very difficult to hack.

I would have expected the ATM manufacturers to do something like this, but I guess they are as lazy and corrupt as the people who make touch-screen voting machines.
Printer Friendly | Permalink |  | Top
 
w4rma Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 06:11 AM
Response to Reply #3
4. Diebold makes both. And they cut corners on both to pocket more profits. (nt)
Printer Friendly | Permalink |  | Top
 
hootinholler Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 07:18 AM
Response to Reply #3
6. OH! It's the lazy programmer's fault.
Talk to the execs of Diebold and IBM about how that deign decision was made before you accuse the programmers of laziness.

-Holler
Printer Friendly | Permalink |  | Top
 
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 09:03 AM
Response to Reply #3
10. I've Seen That At A Local Utility Office
Where people go to pay their electric bill.
Printer Friendly | Permalink |  | Top
 
northernlights Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 06:14 AM
Response to Original message
5. when my identity was stolen 3 years ago
(by an id theft ring operating out of HP and using insider info to do so) the police told me there are 3 major groups trying to do the sort of thing above: the regular mafia, the russian mafia and al qaeda. It's just a matter of time...
Printer Friendly | Permalink |  | Top
 
peacetalksforall Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 08:53 AM
Response to Reply #5
9. HP? I immediately think Hewlett-Packard (whose printer stinks -I'm about to go out to rent a
Edited on Thu Jun-18-09 08:53 AM by peacetalksforall
sledge hammer). Never more.

out of HP is a country code?
Printer Friendly | Permalink |  | Top
 
paparush Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 08:16 AM
Response to Original message
7. Maybe running XP on these machines isn't such a great idea? Huh, ya think?
I heard a review of this on Steve Gibson's "Security Now" podcast and its seems like it had to be an inside job to load the original lsass.exe-disguised trojan onto each system. Probably a technician employed by the company that services the machines.
Printer Friendly | Permalink |  | Top
 
peacetalksforall Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 08:51 AM
Response to Reply #7
8. When I read the OP the first thought was that their is kick back agreement..
Printer Friendly | Permalink |  | Top
 
izquierdista Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 01:32 PM
Response to Reply #7
19. They should switch to Vista
When the trigger card is inserted, the ATM will crash.
Printer Friendly | Permalink |  | Top
 
NashVegas Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 09:05 AM
Response to Original message
11. Let Me Admit Up Front: I Dig Most Things Online
But if computers all disappeared tomorrow, I suspect most of the world would be better off, excepting those who work in the computer / IT industries.
Printer Friendly | Permalink |  | Top
 
Iggo Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 09:34 AM
Response to Reply #11
12. I hear you...
...and I've said as much to my acquaintances, and they look at me like I'm from fookin Mars.

If computers disappeared tomorrow, yeah, it'd take a lot of the fun stuff out of the current version of my lifestyle, but the world might be better off.
Printer Friendly | Permalink |  | Top
 
digidigido Donating Member (553 posts) Send PM | Profile | Ignore Thu Jun-18-09 10:39 AM
Response to Reply #11
13. Keep them for entertainment and emails, but disallow them for commerce and industry
Printer Friendly | Permalink |  | Top
 
phantom power Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 10:40 AM
Response to Original message
14. I'm going to resist my usual urge to bash MS crappy security...
because they're right -- the real security question is how they got access to install that malware.
Printer Friendly | Permalink |  | Top
 
Deja Q Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 01:01 PM
Response to Reply #14
17. Pretty easily; it needn't be "an inside job"...
...

Printer Friendly | Permalink |  | Top
 
starroute Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 12:52 PM
Response to Original message
15. Did I hear somebody say "Diebold"?
Though somehow the claim in this story from March that the attacks were limited to Russia and the suspects had been apprehended doesn't quite match up with the current New Scientist account of a more widespread attack that is expected to expand to the US and Asia.

http://searchfinancialsecurity.techtarget.com/news/article/0,289142,sid185_gci1351256,00.html

Diebold ATMs in Russia targeted with malware
By Marcia Savage, Features Editor, Information Security magazine
18 Mar 2009

Diebold Inc. issued a security update for its Windows-based ATMs after criminals attacked a number of them in Russia and installed malware designed to steal sensitive data.

North Canton, Ohio-based Diebold alerted customers about the break-ins and the security update in January. The attacks, which were isolated to Russia, involved physical access to ATMs and were not a network-level security compromise, the company said in its notice. The suspects in the case have been apprehended, according to Diebold. . . .

Vanja Svajcer, a principal virus researcher at UK-based antivirus supplier Sophos Plc., this week discovered the malware that targeted the Diebold ATMs. . . .

While Sophos researchers can't test the malware on an ATM, Cluley said it appears that the malware tried to copy an ATM user's card and PIN numbers and then waited until a member of the criminal gang inserted a specially crafted card into the machine. The software would recognize the card and print out the stolen card and PIN numbers onto the paper ATM receipt.

Printer Friendly | Permalink |  | Top
 
Deja Q Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 12:59 PM
Response to Original message
16. Windows, eh? Just wait for "Problem Steps Recorder" to help you out...
Printer Friendly | Permalink |  | Top
 
sarcasmo Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-18-09 01:23 PM
Response to Original message
18. I only take money out at point of purchase places like Target and Walgreens.
Cash back equals ATM fee.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 05:15 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC