There appeared a new type of ATM malware that security experts warn about. It is being advertised in the cybercrime underground and specifically designed to target Europe.
A bad actor claimed that the new ATM malware called “EU ATM Malware” has 99% success rate. It can compromise most ATMs in Europe and around 60% of ATMs worldwide, posing a major threat to global banking security. The malware can target ATMs from various leading companies.
Renowned cybersecurity researcher Jeremiah Fowler uncovered a non-password-protected database having over 1.1 million records linked to Conduitor Limited (Forces Penpals)....
"Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall...
The developers of this malware claim that it can generate up to $30,000 per ATM, making it a lucrative tool for cybercriminals. The malware is fully automated, simplifying its deployment and operation. However, it also includes a manual operation mode for those who prefer a hands-on approach reported by daily darkweb.
The malware is being sold with flexible payment options, including:
A monthly subscription.
A test payload option valid for three days.
An initial fee plus a share of the profits from successful jackpotting operations.
The European banking sector, known for its stringent security measures, now faces a formidable challenge in safeguarding its ATM infrastructure against this advanced and pervasive threat.
(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)