yitit
Home
/
Computing
/
Secret Service warns of ‘jackpotting’ hackers targeting ATMs in the U.S.
Secret Service warns of ‘jackpotting’ hackers targeting ATMs in the U.S.-February 2024
Feb 12, 2026 7:30 AM

  Image used with permission by copyright holderHackers targeting ATMs are usually relatively subtle. Sometimes they install a “skimmer” that collects hundreds of customer PINs that can be used to drain accounts remotely, or fraudulent cards that bypass security measures and dispense hundreds of dollars, even when there’s no money in the account.

  But what if you could make an ATM simply spew out all the cash it had in a matter of seconds?

  Recommended Videos

  These types of attacks are known as “jackpotting,” and government officials are quietly warning ATM manufacturers and financial institutions that jackpotting hackers have been spotted targeting cash machines here in the U.S.

  Related

  Amazon expands its virtual healthcare service across the U.S. Jeep is launching its first two electric SUVs in the U.S. in 2024 Hackers targeted AMD to steal huge 450GB of top-secret data

  According to a Secret Service memo obtained by Krebs on Security, the agency has received information that cybercriminals are planning to use “cash-out crews” to target ATMs manufactured by Diebold Nixdorf. It cites a series of thefts over the past ten days and warn of possible upcoming attacks across the country.

  “The targeted stand-alone ATMs are routinely located in pharmacies, big box retailers, and drive-thru ATMs,” stated the alert. “During previous attacks, fraudsters dressed as ATM technicians and attached a laptop computer with a mirror image of the ATMs operating system along with a mobile device to the targeted ATM.”

  The Secret Service alert says that criminals can use an endoscope — a device usually inserted into the human body during medical procedures — to look inside the ATM and find a place to connect their laptop to the internal mechanism.

  Once connected, the criminals use a jackpotting malware program called Ploutus.D to remotely control the machine. “In previous Ploutus.D attacks, the ATM continuously dispensed at a rate of 40 bills every 23 seconds,” said the memo. The ATM is then emptied of cash in a matter of minutes.

  The security firm FireEye first reported on Plotus attacks back in 2013 in Mexico, calling it a “technique that had never been seen before.”

  If confirmed, these would be the first “jackpotting” attacks in the U.S. The Russian cyber firm Group IB previously reported similar attacks in Europe in 2016, as well as ATMs targeted in Thailand and Taiwan.

  The ATM manufacturer confirmed to Reuters that it also issued a warning to banks and financial firms, but a Diebold Nixdorf spokesman declined to comment further or go into any detail about specific banks that had been targeted or how much cash had been lost.

Comments
Welcome to yitit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Login to display more comments
Computing
Recent News
Copyright 2023-2026 - www.yitit.com All Rights Reserved