ATM Hack Gives Cash On Demand 193
angry tapir writes "Windows CE-based ATMs can easily be made to dole out cash, according to security researcher Barnaby Jack. Exploiting bugs in two different ATMs at Black Hat, the researcher from IOActive was able to get them to spit out money on demand and record sensitive data from the cards of people who used them. Jack believes a large number of ATMs have remote management tools that can be accessed over a telephone. After experimenting with two machines he purchased, Jack developed a way of bypassing the remote authentication system and installing a homemade rootkit, named Scrooge."
Interesting Hacks... (Score:5, Interesting)
Originally delayed to let the companies patch. Interested to see if he can live up to his claims to be able to find similar issues in other brand ATMs as well.
Re: (Score:3, Interesting)
Patchless ATM "hack" (Score:4, Insightful)
There is no patch for social engineering except user education. Here's a way to "hack" any ATM. This "hack" doesn't require any computer skills, and the bank is not out any money -- the bank's customer is.
This procedure was used on me. Education can be expensive.
Here's how it works: simply watch someone enter the PIN number, then steal their card. If they're drinking, tired, or simply thinking about some problem on their mind it's easy to get their PIN.
When I was victimized, the theif also stole checks, and forged and cashed them. The bank reimbursed me for the obviously forged checks, but if someone has you PIN, no matter how they get it, they are authorized to use the card!
I no longer use a debit card. Nowdays I use cash whenever possible.
Re:Patchless ATM "hack" (Score:4, Insightful)
They stole your card so they can probably steal your cash which will also not get refunded by the bank.
Better to use a debit card and keep a low value of funds in the account that it can access. Top up as necessary from a different account or a different bank entirely which is not accessible in any way through the card.
Now you get a bit of added security the card offers over cash but you also limit your losses in the event of theft because it is treated like cash (balance limited to typical daily use).
Re: (Score:2)
Re:Patchless ATM "hack" (Score:4, Interesting)
Banks will often not even look at a signature on a cheque, let alone make any attempt to verify it. As an example, I once accidentally grabbed my wife's chequebook and used it (signing my own name) to purchase goods. I realised my mistake a couple of days later and attempted to go into the shop to replace my presumably dodgy cheque with cash, but the bank had already paid up on it. Now in this case, it was an honest enough mistake, but it has made me a lot more careful about where we store our chequebooks since.
At least with credit cards, there is always the option of a chargeback.
Re: (Score:2)
Re: (Score:2)
Actually, the signature is nothing more than an approval to a contract, not for comparison purposes. The signature panel on the back of your credit card signifies that you agreed to the cardholder agreement. The signature on the slip signifies that you are agreeing to pay the amount specified as a valid debt. The signature on the cheque indicates that you're agreeing to pay the amount specified on the note. A cheque can be written on anything as long as it contains the payee details (name), payer details (name, account number), the amount to be paid, the date and a signature indicating approval of the transaction. You could write this all on a piece of paper and it would be valid - it's how banks give you generic cheques where you have to fill in all the details yourself while your customized ones arrive later.
What bank is this? (So I know to avoid business with them.)
Having worked in a bank opening new accounts (not by choice!) I can verify that at least that banks policy was not just for contractual agreements, but for verifying the signer. For example:
) Someone walks in with a check. They wish to cash it. It's $60.
) The teller pays it because its $60.
) Someone later that day returns with a check for $260. The teller says hang on a sec while I verify the funds.
) The teller gets up, and if local, obt
Re: (Score:3, Interesting)
Consumers are no more liable for debit/check card fraud than they are credit card fraud. This is a very common fallacy.
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
How the hell are they to know it isn't you? Just because you say so? You know that there are people who would lie to defraud them. I don't see why the bank should be responsible for your loss of control of your card and PIN any more than they are for your loss of control of your cash.
Re: (Score:2)
How the hell are they to know it isn't you? Because it is not you who is on the video tape(s) made by the ATM and in the room where the ATM is installed. Often as well you can prove you where elsewhere during that particular time.
angel'o'sphere
Re: (Score:2)
For 4 digit PINs, there is a 0.3% chance of an attacker randomly entering the PIN and succeeding. So is a 0.3% chance of losing all your money in your debit card account acceptable (which can be partially mitigated using EMV smartships on debit cards)?
Re: (Score:2)
Sorry.. I meant 0.03%
Re: (Score:2)
The chance of losing all your money in your debit card account is not .03%. It is .03% times the probability of a thief acquiring possession of your card and using it before you discover that it is gone and cancel it.
Re: (Score:2)
Re: (Score:2)
If they watch you enter the PIN they don't have to guess.
Re:Patchless ATM "hack" (Score:4, Interesting)
In the early 90's, I had a 10 digit pin with Wells Fargo. It was great for security, but it was a pain when all of the POS terminals didn't expect it. They only allowed for 4 digit input.
Also, my current bank (name withheld) offers the two account approach. One account has card access and the other has the money. You transfer periodically to cover the other. If your card is ever compromised, you stop the transfers and limit the losses. Of course, you still also get the protection you would normally get with your card.
Re: (Score:2)
The size of wallet isn't a problem, since it's easier to secure it in a single bag than in one of many pockets in your clothing.
I don't carry bags unless I'm on my way home from shopping. Most men don't. Women carry bags because they need them a week out of every month, hard to carry three or four kotexes in a pocket. And it's a lot harder to pick my left front pocket than it is to snatch your purse.
Re:Interesting Hacks... (Score:4, Insightful)
It is conceivable that fewer corners were cut back in the day, or that a substantially greater percentage of ATMs were on bank premises, not being connected over public phone lines; but it would be surprising if OS/2 alone would save you from those design mistakes.
Re:Interesting Hacks... (Score:5, Informative)
Re: (Score:3, Interesting)
Let's start at the beginning. This hack requires that a machine be connected to the outside via phone. This is increasingly going away. I would guess that 40% of the machines I work on are connected via internet now, as opposed to 15% a year ago.
But does that really help matters any? wouldn't being connected to the internet be even MORE risky? surely the same "dial-in" access is still there, just over TCP/IP instead of dialup, and with exposure to the internet you have even more capacity for abuse by millions of hosts.
Now I work as a tech for a local telco, and the ATM machines I've worked with have mostly been connected by ADSL, but my understanding was that although it was still a TCP/IP connection, they were actually on a special logical connect
Re:Interesting Hacks... (Score:4, Interesting)
But does that really help matters any? wouldn't being connected to the internet be even MORE risky? surely the same "dial-in" access is still there, just over TCP/IP instead of dialup, and with exposure to the internet you have even more capacity for abuse by millions of hosts.
Maybe yes, maybe no. The first part of this answer is that when you're connected to the internet, you remove the bandwidth problem of a modem connection. AND, because you're not tying up a phone line anymore, you have more flexibility with your communications.
So, machines that are hooked in via TCP/IP do not have the option to accept remote connections initiated from anywhere other than the machine. The communication HAS to start with the machine, and the data is encrypted 19 ways from Sunday. To start with, you have the master keys that allow the machine to communicate with the processor. After they are input, they're encrypted and stored in epoxy buried chips in the keypad, and any interruption of electrical power to those chips (which runs through fry wires from a battery also stored within the epoxy matrix) kills the keys.
So your communication starts with the machine opening a connection with a dedicated IP server on one of 3 possible ports. During handshake and authentication a unique time-based one time key is transmitted back to the machine. This super-encrypts the keys, which are then sent, followed by the transaction information, and the transmission is closed out. These machines are also usually programmed to auto-connect every 15 or 30 minutes with a machine status update (thereby eliminating the need to dial in remotely).
Now, as all this information is going out over the general internet, it's possible to intercept the packets, but I don't know what good they'd do for you, as there's no way to get to the original master keys assuming you could get past the super encryption, thereby securing the first level.
Now I work as a tech for a local telco, and the ATM machines I've worked with have mostly been connected by ADSL, but my understanding was that although it was still a TCP/IP connection, they were actually on a special logical connection back to the bank that kept their data away from the internet? wouldn't this make more sense? (from the stand point of a telco tech, these machines do not connect to our usual DHCP servers, and I believe their entire logical connection is separate, though what the end point is I don't know as I don't handle that end of the connection)
The machines that are located at gas stations and bars and whatnot use a standard internet connection. The only requirement is that the location has to have a static IP. You have to remember, these machines only cost $2K - $5K, and the owner only makes $100 - $500 per month on the machine. Not to mention, they're not doing that many transactions.
Would the solution you propose make more sense? Absolutely. But it's cost prohibitive, and beyond the scope of 99% of the owners, and 75% of the service techs. If these proposals were to be codified, you'd see fees go through the roof to make up the difference.
Also:
...and the ATM machines I've worked with...
Pet peeve.
Re: (Score:3, Interesting)
when you're connected to the internet, you remove the bandwidth problem of a modem connection. AND, because you're not tying up a phone line anymore, you have more flexibility with your communications.
and that's the problem, on a modem only one machine can attack you at a time, on the internet millions can have a go at once. the flexibility argument also cuts both ways...
So, machines that are hooked in via TCP/IP do not have the option to accept remote connections initiated from anywhere other than the machine. The communication HAS to start with the machine,
So, what you're saying is that dialup connected machines have the facility to receive calls, but internet connected machines only do outgoing connections? that seems odd. It would be just as easy to secure a dialup machine by simply telling it not to answer the phone. I have to believe that if the dialup machine is set to answer phone ca
Re: (Score:2)
Re:Interesting Hacks... (Score:5, Interesting)
That reminds me. A couple of Christmas's ago I was visiting my sister in a small rural town where she lived at the time. Wanted to go draw cash at one point so walked down the main road to the town's only ATM - run by local bank ABSA (yeah - not afraid to mention it). My own bank not having an ATM in town this was the only choice available.
As I stepped up to it... the interface was obscured by a warning message: ...
F-Secure Anti-Virus for Windows has detected a virus in file
Floating around.
Being aware that
1) This bank's ATM's run windows
2) They use F-Secure for virus protection
3) It obviously is connected in such a way that it can still GET infections
I turned around, bummed cash of my sister and paid her bank online - there was just no way I was going to stick my card in that ATM. I am also really glad I'm not a customer of that bank - and despite the nearest ATM to my house being run by them - never use their ATM's - I would rather spend the bit of extra fuel and drive to my own bank (which may not be better - but at least I haven't seen with my own eyes that it's THAT bad). Besides the service charge saving I suspect outweighs what I spend on fuel so it's worth it either way.
Re:Interesting Hacks... (Score:4, Funny)
AV on machines that shouldn't need them? yay...
Relevant xkcd [xkcd.com]
Re: (Score:2)
The worst AV in history on the most insecure OS in history on machines that have access to my bank account ?
Number 4 (Score:2, Informative)
4) It had a virus ALREADY INSTALLED as per the message you saw, so malign in fact that even F-Secure could recognize it (which goes back to point #2).
Re: (Score:2)
This !
Re: (Score:2)
... all the ATMs were running OS/2.
There was never a time when all ATMs ran OS/2. Besides, OS/2 had its own problems [wikipedia.org].
Hmmm... if you knew anything about OS/2, you would realize that the COMPUTER (hardware) had a problem - not OS/2. A Trap 000e is generally a RAM error (as in a failed memory module), and the rest of the time, it is a failure of some component that gets mapped as RAM (such as the memory on a video card, or some device being accessed as memory).
So... you may wish to find a better example. Without the correct hardware (like let's say an IBM Netfinity or IBM eServer xSeries) with RAID memory mirroring enabled,
I see what you did there... (Score:4, Funny)
Editorial standards these days... I ask you...
The tip of the iceberg (Score:4, Insightful)
Wait until they can hack payment-enabled smartphones.
All your cash are belong to us
Re: (Score:2)
Worse than that, since the smartphones don't actually have any physical cash.
All your bits-that-provide-access-and-represent-money-in-an-account-that-is-itself-just-a-representation-of-cash-you-could-have-in-your-hand are belong to us. Much more fungible than cash.
Re: (Score:2)
It has begun [hackaday.com].
Really? (Score:4, Insightful)
"After experimenting with two machines he purchased"
Can people just buy ATMs? I figured that they would put some sort of restrictions on them...unlike lab coats [xkcd.com].
Re: (Score:2, Interesting)
Re:Really? (Score:4, Informative)
Here's one of the machines in question [flextouch.ca]
They can be configured for either phone or ip network, and they're not that expensive, especially if you buy it used at a bar or restaurant bankruptcy.
Re: (Score:2)
Many of the people who design these systems just don't know anything else, so they design around what they know while being completely ignorant that they could improve security and save money by using something else.
Re: (Score:3, Interesting)
Because(like commercial scales,
Re:Really? (Score:5, Interesting)
There is at least one precedent for making owning machines illegal. Slot machines are regulated and it is illegal to own one in most states, even if the coin mechanism is disabled to play for free. Of course, that is what makes them l33t to own for rich folks. Kinda like Coors beer in "Smokey and the Bandit", you want it because it is illegal.
Re: (Score:3, Insightful)
Since the gambling in the financial sector tends to be concentrated well away from the retail level, I'd suspect that ATMs would be safe.
Re: (Score:3, Insightful)
Yet another example of a bad law.
Not most states, about 7 of them (Score:3, Informative)
There is at least one precedent for making owning machines illegal. Slot machines are regulated and it is illegal to own one in most states, even if the coin mechanism is disabled to play for free. Of course, that is what makes them l33t to own for rich folks. Kinda like Coors beer in "Smokey and the Bandit", you want it because it is illegal.
I'm not so sure about them being illegal in "most states".
The list of states banning slot machine ownership I found is: Alabama, Connecticut, Hawaii, Indiana, Nebraska, South Carolina, and Tennessee.
I have a slot machine. It accepts quarters or tokens, and I can adjust the payout ratio.
I paid $160 for it at the flea market, at the county fairgrounds one county over. There were Sheriff's deputies everywhere and they didn't give the slot machines a second look.
Re: (Score:2)
> There is at least one precedent for making owning machines illegal.
There many precedents for loony laws making owning all sorts of things illegal. So what?
Re: (Score:3, Informative)
Re: (Score:2, Informative)
I imagine the heavy duty ones that banks use are a little more tricky to get hold of.
Re: (Score:2)
~$500 right now. Hurry! This opportunity won't last long!
http://cgi.ebay.com/Triton-Atm-Machine-Used-/270611229186?cmd=ViewItem&pt=LH_DefaultDomain_0&hash=item3f01afaa02#ht_500wt_1070 [ebay.com]
Re: (Score:2)
Shipping costs is gonna be a bitch on that one.
Yup, they can. (Score:4, Informative)
ATMs are sold 'over the counter'.
They aren't even that expensive, it's possible to get a new ATM for about $2000 (though realistically a good ATM costs about $5000).
Re: (Score:3, Informative)
Well... Bank of America may be a bit angry if you have one of their ATMs in your living room, but getting one of the mass produced brands that companies set up at street events or in convenience stores isn't very difficult.
The regulation isn't so much on who can have one as on the manufacturers to keep the data of the people using it secure, and even they aren't required to do much.
Re: (Score:2)
Re:Really? (Score:4, Interesting)
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Why would they be restricted?
BoA (Score:2, Interesting)
Re: (Score:2)
I was at a Bank of America ATM in NC not long ago and could not use it. It had a large Windows XP error dialog covering the whole screen. I really don't feel confident about even having a debit card with them.
Would you feel more confident with an ATM that didn't post an error dialog?
Pretension (Score:5, Funny)
'ATM machines'? Really?
Re:Pretension (Score:5, Funny)
And he didn't even need a PIN Number
Re:Pretension (Score:5, Funny)
Re:Pretension (Score:4, Funny)
Re: (Score:3, Funny)
Yeah, ATM Machines. Those things that you put your PIN Number into.
woosh! (Score:2)
Re: (Score:2)
Re: (Score:2, Informative)
Re: (Score:3)
Re: (Score:2)
So it's an Automated ATM machine Machine?
Re: (Score:3, Funny)
Re: (Score:2)
What, you never used an Automated Teller Machine Machine before? Where do you think banks get their ATMs from? Queue up in the store? I think not!
Re: (Score:2)
Good call. He should have gone with the better known, "AT Machines".
Re: (Score:2)
Well, to be fair, ATM could be a brand name. Is saying "IBM machines" wrong?
Monopoly (Score:2)
You passed Go, please collect $ from bank, where $ = Amount Input.
no wonder (Score:2, Insightful)
Note the manufacturers. The big 3 of ATMs are Wincor, Diebold, and NCR. Check the ATM for pretty much any financial institution and you'll see one of those logos somewhere. When one of them gets hacked it's a big deal. When a white-label gets hacked it's just another day.
Re: (Score:2)
Well, I do remember this [infosecuri...gazine.com]...
scrooge? (Score:3, Interesting)
he should have called it robin hood
right subject matter (wealth redistribution), wrong direction (down to the lower classes: robin hood, not up to the higher classes: scrooge)
Re: (Score:3, Funny)
open source shot (Score:2)
Quote from TFA: "Criminals could find vulnerable ATMs by using open-source 'war-dialling' software"
Nice. Because closed source software could never be used for criminal activity, right?
Re: (Score:2)
Nope. all the closed source war dialing apps have a list of all phone numbers to all the ATM's and refuse to dial them. They also have regular popups that ask you to confirm that you are not wardialing to do illegal activities...
Microsoft Bob was re purposed for this use. Microsoft BobDialer 6 is the most popular in the in crowd of casual wardialing.... Ohh BRB Mine has found a fax machine for me to listen to!
Re: (Score:2)
It's something that seems to be getting more and more common in a subset of security-related articles. With my less cynical hat on I'm tempted to believe that they're trying to imply that the software is free and freely available and thus has a low barrier to entry for people who want to try and replicate the exploit, however, my less cynical hat doesn't fit me very well.
video from the talk (Score:2, Informative)
Security Week posted has some videos of the presentation [securityweek.com] that they uploaded to youtube.
Why go through all that trouble of hacking? (Score:3, Interesting)
The types of ATMs being talked about are the non-bank machines that you see in many smaller stores in New York City. They're installed and sold by third party vendors to connect to the main banking networks.
A salesman goes into a store, and tells the owner that if they had an ATM in their store, their sales will go up because people will stop in to get cash. The store owner buys or leases the machine. However, they don't change the default service password that's listed in the owners manual. A manual you can buy on line.
There have been several incidences of someone coming into a small store, typing in the series of key presses to get to the service menu, entering the default password, and wham, the machine gives them all the cash! It's quick and easy with no messing hacking necessary.
Re:Why go through all that trouble of hacking? (Score:5, Informative)
The store owner buys or leases the machine. However, they don't change the default service password that's listed in the owners manual. A manual you can buy on line.
Well, I guess if I'm going to criticize, I'll start here. No PCI-compliant machines allow you to go through the configuration process without inputting 3 different levels of new password. The attack you describe above might have worked 2 years ago. No longer. Sorry. And you don't have to buy the manual, they're (mostly) available for free.
There have been several incidences of someone coming into a small store, typing in the series of key presses to get to the service menu, entering the default password, and wham, the machine gives them all the cash! It's quick and easy with no messing hacking necessary.
No there haven't. The only exploit that could be executed in person was the following:
1. Thief buys prepaid $200 visa card with PIN.
2. Thief accesses the service menu of the machine (using default or socially engineered password).
3. Thief changes the machine's internal systems to think it's holding $5 bills instead of $20 bills.
4. Thief exits service menus.
5. Thief puts in card and withdraws $200. Since the machine thinks it's holding $5's, it dispenses 40 total $20 bills ($800). The thief makes off with a net of $600.
However, this exploit is no longer possible, as the master keys that allow an ATM to communicate with the processor are now erased when you change the denomination of bills the ATM dispenses.
The process you describe has never worked. There is an option in a service menu called "test dispense," but it kicks the bill into the reject bin, not into the cash pickup.
Please try again.
'M' is for Machine (Score:3, Funny)
The summary refers to 'ATM machines.'
I haven't read TFA article, but I wonder if you need a PIN number, or if the exploit uses a VM machine?
Has someone notified the federal FBI bureau?
Inside Man (Score:3, Insightful)
Does not one need to be inside the bank to use said key? If the criminal has already physically broken into the bank, theft of the few grand inside the ATM is the least of the banks' worries.
Re: (Score:2)
Many ATMs are not inside, nor even on the premises of, a bank.
Re: (Score:2)
Re: (Score:2)
Does not one need to be inside the bank to use said key? If the criminal has already physically broken into the bank, theft of the few grand inside the ATM is the least of the banks' worries.
So don't interfere with one at a bank. Show up in a uniform with an armoured van to a convenience store.
My head hurts (Score:2)
I wonder who had that brilliant idea...
Re: (Score:3, Funny)
Re: (Score:2)
Re:Redundancy (Score:5, Funny)
But who makes the ATMMs?
It's machines all the way down!
Re: (Score:2)
and who made the first machine? a giant turtle?
Re: (Score:2)
"Well, I never... machines making machines!" -CP30
Re: (Score:3, Funny)
Re: (Score:2)
> I'm all for security research but publicly displaying these exploits will ... If proof-of-concept code gets out on the net, watch out!
> bring ATM mischief to the next level.
Right, because criminals could never figure this out by themselves.
> A lot of little banks and vendors are going to be sorry. And good luck
> trying to patch all the millions of machines around the world.
They bought cheap crap. Too bad. So sad.
Re: (Score:2)
Yes, but you are ignoring the critical point here: what happens next? There are relatively few options that obviously need to be clearly explained:
Re: (Score:2)
I would hope ATM implemented call-back security on in-production devices.
Not on the ones in bars and restaraunts; in many places I've been in you couldn't use the ATM when someone was on the phone, meaning they had a single phone line, meaning the phone would have rang everytime someone used the ATM.
Re: (Score:2)
"Security through obscurity" was debunked long ago. Welcome to slashdot!