Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Researcher Discovers ATM Hack, Gets Silenced 229

Al writes "A researcher working for networking company Juniper has been forced to cancel a Black Hat presentation that would have revealed a way to hack into ATMs. The presentation focused on exploiting vulnerabilities in devices running the Windows CE operating system, including some ATMs. The decision to cancel was made to give the vendor concerned time to patch the problem, although the company was notified 8 months ago. The article mentions a growing trend in ATM hacking: In November 2008 thieves stole nearly $9 million from more than 130 cash machines in 49 cities worldwide. And earlier this year, the second biggest maker of ATMs, Diebold, warned customers in an advisory that certain cash machines in Eastern Europe had been loaded with malicious software capable of stealing financial information and the secret PINs from customers performing ATM transactions."
This discussion has been archived. No new comments can be posted.

Researcher Discovers ATM Hack, Gets Silenced

Comments Filter:
  • Re:Ridiculous (Score:5, Interesting)

    by Anonymous Coward on Friday July 10, 2009 @11:15AM (#28650249)

    No, they don't... but it depends on the hack.

    If it gives out free money, only harming the company which didn't seem to care, then no, don't give them any more time.

    If the hack gives them access to innocent people's account details, and they'd be out money, and/or time fighting the bogus withdrawals, then yes, give them time to fix it.

  • No surprise here... (Score:3, Interesting)

    by Svartalf ( 2997 ) on Friday July 10, 2009 @11:24AM (#28650403) Homepage

    It is quite unsurprising, really. We see the same thing going on in the SCADA security space. The book, Hacking Scada: Industrial Network Security From the Mind of the Attacker [hackingscada.com] , has been held up for at least a year past it's original planned publication date for similar thinking.

  • by Peter Simpson ( 112887 ) on Friday July 10, 2009 @11:33AM (#28650529)

    It's an ATM.

    It reads a card, checks your balance and pokes money out a slot.

    What increased functionality is there?

    (well, yes, it takes in deposits, too, but...)

    Really, why aren't these things running the most limited OS possible?
    Running WinXP on them is just silly. I would have thought WinCE would
    be more locked down, but apparently not.

    The comment about OS/2 machines being more secure is interesting.
    I'd rather have IBM running my cash machines than Microsoft.

  • by 2gravey ( 959785 ) on Friday July 10, 2009 @11:40AM (#28650623)
    For those of you who aren't aware, the Black Hat tradition for vulnerability presentations which have been similarly blocked due to court orders, etc. is to offer BH a replacement safe/bland presentation and then deliver the banned exploit demonstration regardless. This action typically results in a large lawsuit against the researcher's employer, subsequent termination of the researcher, and a short-lived rock star notoriety for the researcher making the afore mentioned termination totally worth it.
  • Re:Ridiculous (Score:5, Interesting)

    by compro01 ( 777531 ) on Friday July 10, 2009 @11:44AM (#28650705)

    Being as the exploit is already in the fucking wild and being actively exploited, preventing the information from being presented is completely and totally pointless.

  • Re:Ridiculous (Score:5, Interesting)

    by Talderas ( 1212466 ) on Friday July 10, 2009 @11:50AM (#28650797)

    Not really. Despite the exploit being out there, there is likely only a few malicious people that know about it. If the hack requires physical access to the machine, this means the number of machines that are exploited is less. As other people have mentioned.... once the exploit is significantly more public, that will increase the number of malicious people that know about it and increases the number of exploited machines.

    There's a lot of people who can apply exploits. There aren't as many that can discover them.

  • by jonwil ( 467024 ) on Friday July 10, 2009 @12:04PM (#28651025)

    One big reason to update from OS/2 to Windows is that its a lot easier to add new functionality to the Windows version of the ATM software than it is to add new functionality to the older OS/2 ATM software.

    Examples of new functionality ATM operators may want or need to add:
    1.Advertising (for loans, credit cards etc) whilst the ATM talks to all the computers and you wait for your money to come out
    2.Prepaid credit vouchers of various kinds (e.g. for prepaid mobile phones)
    3.Changes in the law (this last one happened recently here in Australia where there is now a new rule where if you use an ATM that doesn't belong to your bank, the owner of the ATM charges you the fee and not the bank where your account is. Also, the ATM is required to display the cost of this new "direct charge")
    4.Better accessibility for disabled people (e.g. deaf or blind)

  • by idontgno ( 624372 ) on Friday July 10, 2009 @12:04PM (#28651037) Journal
    Done. [azonano.com]
  • Re:Ridiculous (Score:2, Interesting)

    by Brian Edwards ( 1429281 ) on Friday July 10, 2009 @12:28PM (#28651305)
    The vendor in question is likely Microsoft:

    "The presentation focused on exploiting vulnerabilities in devices running the Windows CE operating system, including some ATMs. The decision to cancel was made to give the vendor concerned time to patch the problem, although the company was notified 8 months ago."

    My guess is that Microsoft is not excited about fixing bugs in CE, and would rather just extend their "security through obscurity" strategy to include censoring researchers.
  • by DeusExMach ( 1319255 ) on Friday July 10, 2009 @12:32PM (#28651353)

    I like how the article you reference states that they're designing a "Proto-prototype".

    So! By that logic, they have developed a proto-prototype of a generalized machine maker machine that can be used to construct proto-nano-pin-number-generating-atm-machines using proto-nano-assemblers running on AC current.

    This is worse than spaceballs: the video tape.

    Now became then, just now. ...everybody got that?

  • How it works. (Score:4, Interesting)

    by mbarkhau ( 1137557 ) on Friday July 10, 2009 @12:44PM (#28651483)
    I only read this on another forum so take with a grain of salt.

    The hack is based on the assumption that if you make a withdrawal from an ATM and don't take the money you forgot to take it, so the machine takes the money back and refunds the amount to your account.

    The thing is that the machine doesn't have a way to count how much bills it takes back, so you can just take the bills from the middle and you will get a full refund.

    Supposedly this also works if you take the money right before the ATM pulls back in the money.
  • Re:Ridiculous (Score:3, Interesting)

    by Nikker ( 749551 ) on Friday July 10, 2009 @06:40PM (#28655725)
    I would like to apologize for being an asshole, I did go over the top. The reason I feel concerned is the element of scale. The only difficult part is figuring out the vulnerability once that is done they can out source because the money is there. There may not be a planet of computer elites with the ability to take advantage of this or any exploit for that matter but if the money is there to be made especially in the millions of dollars there is incentive to perfect the process. With that kind of money you could engineer something as simple as a 'mod chip' and with a hand full of people distribute your process, likely not even having to explain really what they are doing. As long as there is ROI people will do it without asking questions so they might not even know who is behind all of this.

    I do agree that publicizing this is not the ideal solution, the sad thing is that Diebold / Sequoia was aware of the issue almost a year now and coming from a company with security minded products why is it I as the person the situation affects cannot do anything to avoid this situation? Is there a visual appearance of these particular machines I can use to determine if I want to take the risk or not? Maybe a visual screen layout? If so then I'm happy to let them do what they please but now that I am informed I want to make a decision based on that. The chance to do so is all I'm asking.

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...