Researcher Discovers ATM Hack, Gets Silenced 229
Al writes "A researcher working for networking company Juniper has been forced to cancel a Black Hat presentation that would have revealed a way to hack into ATMs. The presentation focused on exploiting vulnerabilities in devices running the Windows CE operating system, including some ATMs. The decision to cancel was made to give the vendor concerned time to patch the problem, although the company was notified 8 months ago. The article mentions a growing trend in ATM hacking: In November 2008 thieves stole nearly $9 million from more than 130 cash machines in 49 cities worldwide. And earlier this year, the second biggest maker of ATMs, Diebold, warned customers in an advisory that certain cash machines in Eastern Europe had been loaded with malicious software capable of stealing financial information and the secret PINs from customers performing ATM transactions."
If it's an exploit for ATM *Machines*... (Score:5, Funny)
...it must be pretty abstract, since an "automated teller machine machine" is apparently running in emulation anyhow.
Re:If it's an exploit for ATM *Machines*... (Score:5, Funny)
...it must be pretty abstract, since an "automated teller machine machine" is apparently running in emulation anyhow.
No. It has to be an "ATM Machine" to in order to be able to enter a "PIN number".
Re: (Score:2)
It has to be an "ATM Machine" to in order to be able to enter a "PIN number".
I wonder - how much RAM memory those is in those ATM machines to be able to hold all those PIN numbers?
And what kind of NIC card do they have?
Anyone want a peanut? :)
Re: (Score:2)
Re:If it's an exploit for ATM *Machines*... (Score:4, Informative)
The 'C' in NIC stands for 'Controller', not 'Card'.
some [techtarget.com] people [wisegeek.com], including 3Com [3com.com] and Cisco [cisco.com], disagree [abdn.ac.uk] with [about.com] you. [computerhope.com]
Re: (Score:3, Funny)
in order to be able to enter a "PIN number".
So what your saying is, I have to enter a PI number... Damn, this is gonna take a while
3.1415....
Re: (Score:3, Funny)
I hope the keypad isn't connected to the computer via the USB bus
Re:If it's an exploit for ATM *Machines*... (Score:4, Funny)
Oh, just STFU up.
Re:If it's an exploit for ATM *Machines*... (Score:4, Informative)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
So clearly there someone should invent the "automated teller machine machine machine," the machine that automatically builds the machine that automatically builds the ATM.
The inventor would make a bundle.. at least until some invented the "automated teller machine machine machine machine."!
Re: (Score:3, Interesting)
Re: (Score:2, Interesting)
I like how the article you reference states that they're designing a "Proto-prototype".
So! By that logic, they have developed a proto-prototype of a generalized machine maker machine that can be used to construct proto-nano-pin-number-generating-atm-machines using proto-nano-assemblers running on AC current.
This is worse than spaceballs: the video tape.
Now became then, just now. ...everybody got that?
Ridiculous (Score:5, Insightful)
So they've had 8 months warning, and now suddenly when researchers want to publish they now want time to fix it? Not indicative of a company that gives a flying fuck about security. They don't deserve time.
Re:Ridiculous (Score:5, Interesting)
No, they don't... but it depends on the hack.
If it gives out free money, only harming the company which didn't seem to care, then no, don't give them any more time.
If the hack gives them access to innocent people's account details, and they'd be out money, and/or time fighting the bogus withdrawals, then yes, give them time to fix it.
Re:Ridiculous (Score:5, Insightful)
Actually, they HAD time to fix it. It still is highly problematic- but the big problem with all this thinking that bars people from disclosing this stuff at the stage it's at right now is the highly flawed thinking that disclosing a vulnerability discloses it to potential attackers which will use it.
It's a bad thing to think the bad guys don't already know what you're showing off and presume that they're not doing it. Depending on the hack, they may be prepping for it or already screwing you over with it and you just don't know it yet. If a white/grey hat found it, I can assure you a black hat either has already found it or will shortly.
Re:Ridiculous (Score:5, Insightful)
You've made the classic mistake of assuming corporations have any motivation to do the right thing, as opposed to the profitable thing. They don't give a rat's ass who is using this hack. All they care about is the price of their shares. If keeping a dangerous vulnerability semi-secret for a few more months will help their share price, they don't really care how many people get screwed over. Think of it this way: if their ATMs were electrocuting people at random, they would do a cost benefit analysis to figure out the likely damages awarded at trials, and compare that to the cost of fixing the problem. If fixing the problem were more expensive, the company would happily go on killing people. You think they care about your freaking finances?
Re: (Score:2)
Maybe in some regards, but the electrocuting ATM isn't a great example.
There exist numerous product safety laws that could affect the criminal culpability of decision makers in a company who refuse to address serious known safety concerns in their products.
Re: (Score:3, Informative)
Maybe in some regards, but the electrocuting ATM isn't a great example.
Oh, I dunno, it's not like there hasn't been precedent for companies systematically ignoring lethal electrocution hazards in their work. [go.com]
There exist numerous product safety laws that could affect the criminal culpability of decision makers in a company who refuse to address serious known safety concerns in their products.
As of 2008, with the passing of the Consumer Product Safety Improvement Act of 2008 [cpsc.gov], the criminal penalty for "kno
Re:Ridiculous (Score:4, Insightful)
What i think this guy should do is to publish the name of the problematic bank and/or ATM vendor, and give their users a month to withdraw all of their assets from that bank (since they clearly don't care about their customers' finances) and move to another one (of their own choosing). I'm sure as hell they would fix the problem ipso facto. My 2 cents.
Re: (Score:3, Insightful)
The one and only thing that makes them fix it is the near certain knowledge that the vulnerability will be exposed far and wide after a deadline. It is reasonable to give an extension if it's really a hard problem to solve, but they must feel nearly certain that the problem will come out in public.
I do agree that it's not a good idea to assume that only the good guys know about the vulnerability.
Re: (Score:2)
Aside from its meat entities, a corporation has no cares, thoughts, or motivations. I could have been more clear, but by 'share price' I meant both the price of the shares, and the dividends provided to shareholders, which equate with profits. The corporation does not care about profits, it's shareholders care about profits, which they receive through dividends and increased share price. The corporation is simply a mechanism to allow the shareholders to profit without feeling personally responsible for the
Re:Ridiculous (Score:5, Insightful)
Companies only move upon losses and public fiascos. Politeness should be gone by 8 months. Honestly, "this can slash your profits to 0 or below" doesn't sound like a cause for concern?
I'm sure departments within the company can make that same argument for losses but those are harder to take care of than simple software fixes that people are nice enough to be willing to tell them what the issue is. I mean how much easier can you get than someone else doing the job for you, that you didn't do originally? etc etc.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
You're making the assumption that it's a simple software fix. There isn't always someone who knows the software, understands the problem and can figure out how to resolve it in the code.
A lot of companies hire the cheapest people they can to implement ill-defined code which is duct taped together and released as a product. Once the product is released, all of the expensive ($10/hr) programmers are fired and the product is supported by a group of people who have a script to follow and get paid $2/hr. Once
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
We're talking Diebold here, why are you surprised?
Wrong! (Score:2)
Not sure where you see that. As far as I know Diebold, Wincor, and NCR only put out drivers for Win XP for their ATMs. This is a Win CE bug, it's probably a white-label machine.
no Diebold CHose to use WinCE as a cheap platofrm. Prior to that they had another platform that was not windows based. they chose Wince and its cause multiple problems precisely because they willing delegated the security.
Re:Ridiculous (Score:5, Insightful)
Re:Ridiculous (Score:4, Insightful)
You're right they don't deserve it - but giving information to criminals to make it easier for them to steal - thus hurting society as a whole - is not the answer. Unfortunately the security of ATM's is greater then these researches desire to present their work.
Releasing the hole does not hurt society, however, it does hurt Diebold customers and partners.
Re: (Score:3, Insightful)
Releasing the hole does not hurt society, however, it does hurt Diebold customers and partners.
1) Diebold customers/partners did not cause this issue
2) If you use an ATM you are a diebold customer
3) Diebold will pass the cost to companies which use ATMs and they will pass the cost to you
4) It does hurt society as a whole to enable criminals. Just because you are not directly effected does not make you immune to the effects.
Re:Ridiculous (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Insightful)
Releasing the hole does not hurt society, however, it does hurt Diebold customers and partners.
I'd have to know more details. The manufacturer is not the one who will feel the direct repercussions of this hack - the ATM owners will. It might have been more effective for the researcher to inform some of the larger customers rather than the company. I'd bet that a big bank leaning on Diebold would have been more effective than this researcher disclosing a secret exploit.
Re: (Score:2)
Re:Ridiculous (Score:5, Insightful)
Current situation: society as a whole does not know the vulnerability or it's scope, criminals might or might not know the vulnerability and might or might not be actively exploiting it.
Full disclosure:anyone with enough brains and guts can exploit the vulnerability, society at large can take steps to minimize the risk since it is now known what exactly the risk is.
Re: (Score:2)
Current situation: society as a whole does not know the vulnerability or it's scope, criminals might or might not know the vulnerability and might or might not be actively exploiting it. Full disclosure:anyone with enough brains and guts can exploit the vulnerability, society at large can take steps to minimize the risk since it is now known what exactly the risk is.
Society as a whole does not know of the vulnerability. You are correct. Full disclosure of the vulnerability will allow those who have the desire/means to exploit it. No it won't be as easy as walking into a 7-11 with a shotgun, but there are plenty of computer geeks who would exploit such a loophole to make some cash.
Since we can't setup a security guard/cop by every ATm unit 24/7 until a patch is released criminals will be able to rob the machine...as simple as going to the unit at 4 Am with a ski ma
Re: (Score:2, Insightful)
Re: (Score:2, Insightful)
Re:Ridiculous (Score:5, Interesting)
Being as the exploit is already in the fucking wild and being actively exploited, preventing the information from being presented is completely and totally pointless.
Re:Ridiculous (Score:5, Interesting)
Not really. Despite the exploit being out there, there is likely only a few malicious people that know about it. If the hack requires physical access to the machine, this means the number of machines that are exploited is less. As other people have mentioned.... once the exploit is significantly more public, that will increase the number of malicious people that know about it and increases the number of exploited machines.
There's a lot of people who can apply exploits. There aren't as many that can discover them.
Re: (Score:2)
Your a fucking idiot. This is a computer exploit it's not like they have to be actively standing in front of the machine after each use. Once it gets hacked any person who walks up to it is giving their information to both their bank as well as the person who hacked the box. Your information may be next. The only thing that prolonging the disclosure does is keep those who do know in a captive market making money off me and you. If it does get out then banks will eventually lose more to insurance claims
Re: (Score:2)
Your a fucking idiot.
I'll use it right back at you. I'll say "You're a fucking idiot."
I never claimed that you have to be right there after each ATM usage. That would be ludicrous and insane. I was stating that if the hack required physical access, you gain physical access, implement the hack and reap the benefits.
As such, if people who know the hack lives in Salt Lake City, ATMs in Salt Lake City, San Francisco, and Seattle, then ATMs in those cities and nearby are only at risk. ATMs in Chicago, New York City, Boston, and many
Re: (Score:3, Interesting)
Re: (Score:2)
The argument being made isn't that people should get hacked, so this should be released. The argument being made is that by withholding this information corporate complacency will allow whoever is ALREADY using this exploit to continue to do so (as it has for the past 8 months). Your argument falls down from the point of view that releasing the information will force the company to promptly issue a fix for the vulnerability. In fact, your point of view is only valid if the company cannot or will not patc
8 Months Is Not Enough Time (Score:2)
Do you have any idea what the QA procedure would be for a release of baking software?
The QA cycle on it alone would be 6-12 months. Then you would need 6-12 months to roll it out to all the ATMs globally.
Re: (Score:2)
Man, I didn't think that setting a temperature and a time was that hard.
Oh I dunno (Score:2)
Oh, wait....you meant time to fix the problem. My bad
Re: (Score:2, Interesting)
"The presentation focused on exploiting vulnerabilities in devices running the Windows CE operating system, including some ATMs. The decision to cancel was made to give the vendor concerned time to patch the problem, although the company was notified 8 months ago."
My guess is that Microsoft is not excited about fixing bugs in CE, and would rather just extend their "security through obscurity" strategy to include censoring researchers.
Re: (Score:2)
Lets jump to a conclusion that it is an easy to fix problem.
And creating and deploying this would be cake.
They may have the fix but have to manually go to the systems to fix them.
Re: (Score:2)
WinCE when you say that (Score:4, Insightful)
Re:WinCE when you say that (Score:5, Informative)
I can't believe that people use WinCE for a real world application that requires security and reliability. The morons who built these systems are reaping the reward for their ignorance.
A lot of ATM's were previously running IBM OS/2 and were pretty stable. Not only are these ATMs now exploitable but they are also much slower than before they were "upgraded" to WinCE.
Upgrades are supposed to improve functionality or improve performance but the text UI actually got about 2X slower to respond.
They got the ability to talk though (Score:5, Informative)
They are now much easier for the disabled to use. While it was possible for someone who was blind to use an OS/2 ATM, it relied more or less on memorizing what to do. The buttons had braille on them but there wasn't really any feed back other than beeps. So it was a situation of memorize the key presses to do what you want. New ATMs have headphone jacks and can give audio feedback, allowing those with vision problems to use them much easier.
Re: (Score:2)
Seems to me that that type of functionality could have been added to the OS/2 versions. Was it really necessary to completely replace the OS to get that type of functionality? I know that IBM gave up on supporting OS/2 but couldn't an experienced programmer do this without IBM's help?
Re: (Score:2)
That's not what he means.
To get the headphone jack upgrades, they needed new ATMs. Retrofitting old ones would have been very costly in terms of manpower.
OS/2 does not run on those new ATMs.
Re: (Score:2)
Was it necessary for them to break OS/2 compatibility when they added the headphone jack?
Re: (Score:2)
Headphone jacks are hardware, not software. You don't really think that OS/2 is incapable of sound, do you?
Re: (Score:2)
New post-OS/2 ATMs have the headphone jacks. To put OS/2 on new hardware would be non-trivial.
Re: (Score:2)
OS/2 v 1.1? Ya, might well be. It was incapable of graphics, I don't know that it would be capable of sound either. This wasn't even a new OS/2 they were running, it was an extremely old version, even by OS/2 standards.
I'm not blind, but... (Score:2)
Improve functionality? (Score:3, Interesting)
It's an ATM.
It reads a card, checks your balance and pokes money out a slot.
What increased functionality is there?
(well, yes, it takes in deposits, too, but...)
Really, why aren't these things running the most limited OS possible?
Running WinXP on them is just silly. I would have thought WinCE would
be more locked down, but apparently not.
The comment about OS/2 machines being more secure is interesting.
I'd rather have IBM running my cash machines than Microsoft.
Re: (Score:3, Funny)
New from microsoft.
Windows 7 ATM edition. now with richer multimedia and features! giveyour customers access to a media center while they wait for their money!
Dont laugh, Somewhere a manager in microsoft though of this and pitched it.
Re: (Score:2)
What increased functionality is there?
Bill payments & Pre-pay phone top-ups. Although in theory all they would need to be is additional UI options, because the actual processing would be taken care of at the server.
Re: (Score:2)
A large number of upgrades/changes in infrastructure & platform are actually driven with the primary goal of decreasing cost base.
This is especially true in a poor economy, such as right now.
Re: (Score:3, Interesting)
One big reason to update from OS/2 to Windows is that its a lot easier to add new functionality to the Windows version of the ATM software than it is to add new functionality to the older OS/2 ATM software.
Examples of new functionality ATM operators may want or need to add:
1.Advertising (for loans, credit cards etc) whilst the ATM talks to all the computers and you wait for your money to come out
2.Prepaid credit vouchers of various kinds (e.g. for prepaid mobile phones)
3.Changes in the law (this last one ha
Re: (Score:2)
Secondly, why would any customer support advertising in an atm when they already pay to use it?
The same reason you watch commercials on cable TV you already pay to use. They ram it down your throat because a) your eyeballs are temporarily being held captive, and b) they love additional revenue streams.
Re: (Score:2)
I agree, they should have kept using OS/2 [wikipedia.org].
MS doesn't recommend WinCE either . . . (Score:3, Informative)
. . . from TFA:
The operating system used in the affected system, Windows CE, poses hurdles to a quick fix. Microsoft recommends that Windows CE is used for "low-end cash-dispensing ATMs," while Windows XP Embedded and Windows XP Professional are used on more full-featured ATMs, according to a white paper on kiosk and ATM operating-system platforms issued by the software maker. Windows XP Embedded, the latest version of which is Windows Embedded Standard 2009, and Windows XP Professional are more secure because they are easier to update, the software giant says.
Re: (Score:2, Funny)
Uh, no. Now WE'RE reaping the reward for their ignorance.
Release it anyway (Score:5, Insightful)
You don't need a conference to publicize a security problem. Post it on the internet, and the vendor will have plenty of incentive to implement a fix immediately.
Re: (Score:2)
Re: (Score:2)
Step 2) Test fix in test environment to make sure it doesn't cause other problems....duration days to months
Step 3) Implement fix in all ATM's....duration weeks to months
In the meantime criminals are stealing billions of dollars over the course of that time. It's easy to say "boo who sucks to be you" but allowing criminals to steal is abhorant. Even if the money stolen does not affect the consumer pocket-book in the end the cost of this will trickle down t
Re:Release it anyway (Score:5, Insightful)
You don't think these ATMs will stay up if an exploit is published do you?
The sequence of events goes something like this:
Bank buys shitty ATMs
Exploits are developed
People start stealing from ATMs
Someone gives the ATM manufacturer the exploit and tells them to fix their problem
People continue to steal from ATMs
Someone (publicly) threatens to publish
ATM company says, "hold on give us a minute to fix it"
People continue stealing from ATMs
scenario A
ATM company fixes the problem
Banks and consumers never know their assets were exposed
scenario b
ATM company stalls
people continue to steal from ATMs
someone publishes
a whole lot of money is suddenly stolen in a very short time period
Banks shut down all vulnerable ATMs
Customers notice their ATMs don't work - maybe ask questions
Banks sue ATM manufacturer, become a little more careful about who they do business with in the future
Re: (Score:2)
They've had 8 months to fix their ATMs. For all we know now criminals have been stealing billions of dollars over that time. The responsible thing for this company to do is to shut down every affected ATM now until a fix is applied. They haven't done so, and clearly need a greater incentive.
Re: (Score:2, Insightful)
Too much pr0n (Score:4, Funny)
Everytime I see "ATM" these days I think "Anal to Mouth".
I need to stop surfing the Diabolic site....
Re: (Score:3, Funny)
Re: (Score:2)
And everytime someone says "ATM machine" I think "Ass to mouth machine" and think about one might look like.
Is this an overstated problem? (Score:2)
If we estimate that world wide, only 8 million dollars was stolen out of ALL of the ATMs that are out there, I would think that that's actually a success, more than a liability.
I mean, people steal more than that in cars, in what, every few hours?
Re: (Score:2, Funny)
I'm pretty sure the proper /. unit for theft/time is the Madoff. Guessing that he stole about 25 billion dollars over 30 years (this is just an off the cuff estimate, the actual value of the Madoff may vary), 9 million dollars per month (I think that's what the summary says) is a rate of about 0.13 Madoffs.
Re: (Score:2)
But that cost is distributed amongst the the car owners who don't band together for any sort of power as compared with Banks. If, instead, people stole that much in cars straight from dealerships...
No surprise here... (Score:3, Interesting)
It is quite unsurprising, really. We see the same thing going on in the SCADA security space. The book, Hacking Scada: Industrial Network Security From the Mind of the Attacker [hackingscada.com] , has been held up for at least a year past it's original planned publication date for similar thinking.
vote of confidence? (Score:2, Funny)
so diebold's ATMs are as good as their voting machines!
Whenever I hear about ATM hacking.... (Score:2, Funny)
Security holes need to be public (Score:2)
Hiding security holes doesn't mean they aren't there. Everyone knows that a bank has a fairly obvious security hole - most people would rather hand the money over vs. getting shot, so bank robbers tend to burst in guns blazing and then make off with tons of cash. Since that's public knowledge, it's easier to defend against such tactics. Hiding that would make both the bank and its customers more susceptible to gun-toting robber attacks, since they would be unprepared for the unknown.
Another odd device running Windows CE (Score:3, Insightful)
It's unfortunately not too odd to hear that ATMs run Windows (especially with some of the error messages I've seen). But there are even odder devices running Windows.
I work at a somewhat-hated international retailing chain that will go unnamed, and while working there the other night my merchandise scanner, one of the portable hand-held ones used on the floor, froze. Not uncommon, but when I reset it it booted into Windows CE. A normal windows desktop. I tried starting Windows Media Player, but it wouldn't do anything. The funny thing is that when it works properly, it uses minimal ASCII art and no graphics at all.
Why these kind of things need to use Windows is beyond me. Windows, security issues aside, is alright for general purpose machines, but not highly-specialized machines like a scanner or ATM.
Re:Another odd device running Windows CE (Score:4, Insightful)
Sir, you are confusing Desktop Windows with Embedded Windows. While the source base is starting to be shared, their targets and goals are substantially different. Windows CE IS meant to be highly-specialized for highly-specialized machines. You don't even have to build in graphical output. I've seen usable CE images take up ~2MB of memory total.
Re: (Score:2)
Thanks for the info. I thought Windows CE was something like a streamlined Windows Mobile OS. :)
Re: (Score:2)
Why these kind of things need to use Windows is beyond me. Windows, security issues aside, is alright for general purpose machines, but not highly-specialized machines like a scanner or ATM.
Because Microsoft makes it very easy to build apps on a Windows desktop, using Microsoft tools and then move the executable onto another Windows platform. Sure, its possible to develop in a Windows environment for some other target O/S. But it takes extra steps.
Many s/w shops look at app development from the programmers point of view rather than the end user. If the tools and development processes have kewl features ad are cheap, great. If the user or admins have to suffer, well that's not their problem (a
Never fear, BH presentation likely (Score:5, Interesting)
Re: (Score:2)
Not forced! (Score:5, Informative)
The article is transparent in saying that he chose to cancel his own presentation on his own volition, because it hadn't been fixed yet.
Re: (Score:2)
Sensationalist yet completely false headlines? What else do you expect from kdawson?
How it works. (Score:4, Interesting)
The hack is based on the assumption that if you make a withdrawal from an ATM and don't take the money you forgot to take it, so the machine takes the money back and refunds the amount to your account.
The thing is that the machine doesn't have a way to count how much bills it takes back, so you can just take the bills from the middle and you will get a full refund.
Supposedly this also works if you take the money right before the ATM pulls back in the money.
Re: (Score:2)
Got a link?
Re:What I don't get (Score:5, Funny)
Is why everyone cares so much about Money. It's just pieces of paper and little bits of metal. What really matters is Love!
Well, with money anyone can get some temporary love! And permanent herpes.
Re:What I don't get (Score:4, Insightful)
And some more long-term loving aswell. That is, until she has spend all your money.