Hacker Makes ATMs Puke Money, Shows How

Page 2 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.
[citation][nom]assmar[/nom]Why don't we mount lasers on them and call them AT-AT Machines?[/citation]

this is the most awesome thing i have heard all month. bravo.
 
I've been out of the ATM business for a few years but,
when i left non of the machines had USB ports.
Yes they all do come from the factory keyed with a "standard" key unless you specify otherwise and pay more. Then you have to have unimpeded access to get into the top of the machine. Where it was proprietary PCBs.

Sure you could pull jumpers and use a laptop to load software but you have to have pretty intimate knowledge of the machines. and there were many security checks in place between the communications between the individual components that if one was not right the rest refused to work with it and the security was only getting stronger when i left.

Older machines were even worse when the main boards were old 386s and they were located inside the safe. Sure they keys to get into the top of the machine were the same but to do a software change to them you had to get into the safe.

So while on one hand I think it is possible that this guy could hack one, I find it unlikely that the mfgs got that sloppy on their security as to put a USB port with enough access to the rest of the systems in to their machines.

Unless it was one of the smaller lesser know mfgs , i remember one that just put a whole PC inside (windows 2k I think) but it was a bit player in the market.

The others I dealt with Tidel, Triton, Tranax and a small but growing at the time company out of Ohio whose name escapes me at the moment all were decent as far as security went.

And then there was Diebold, yeah the voting machine diebold, but there weren't too many of them in the Mom&Pop stores/nightclubs/bars where the smaller standalone machines were. I don't remember much of their inner workings but, given the weakness in voting machine security , I wouldn't put it past them.
 
[citation][nom]t0r012[/nom]I find it unlikely that the mfgs got that sloppy on their security as to put a USB port with enough access to the rest of the systems in to their machines.Unless it was one of the smaller lesser know mfgs , i remember one that just put a whole PC inside (windows 2k I think) but it was a bit player in the market. The others I dealt with Tidel, Triton, Tranax [/citation]

If you click on read more it clearly states that it was a Tranax machine, it also states that he had two methods, one by using the USB ports and the other by using remote access over the network.
 
[citation][nom]Enzo Matrix[/nom]You mean upload, right?[/citation]
Actualy I think it's download... it's not like the internet. E.g. on a vehicle control unit or any other embedded device when you "put" a program on the microcontroler it's always called downloading... I think it's also aplicable here. 😛
 
what an idiot, i would "borrow" several ATMs money then dissapear on an island.

Why do that crap, show the biggest thiefs in the world how not to loose cash.
 
[citation][nom]Enzo Matrix[/nom]You mean upload, right?[/citation]
no no, every thing in this day and age is download, download and more download when someone is talking about computers.
 
LMAO selective news on toms. Good read though.

Why no news on the down loadable 100m facebook users data on torrents ?

Data for 100m Facebook accounts published to BitTorrent.

http://www.theregister.co.uk/2010/07/29/facebook_user_data_published/
 
[citation][nom]kooltime[/nom]ATM's have "standard USB slots" on them that are accessible to public?? Never seen an atm with visible USB slots poking around on em.[/citation]

Read the article again please. Using the remote attack "a hacker wouldn't need to break into the ATM cabinet." Where as with the physical USB attack the hacker needed to open the ATM somehow.
 
Status
Not open for further replies.