Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security The Almighty Buck

Kids With Operators Manual Alert Bank Officials: "We Hacked Your ATM" 378

An anonymous reader writes "Two 14-year-olds hacked a Bank of Montreal ATM after finding an operators manual online that showed how to gain administrative control. Matthew Hewlett and Caleb Turon alerted bank employees after testing the instructions on an ATM at a nearby supermarket. At first the employees thought the boys had the PIN numbers of customers. 'I said: "No, no, no. We hacked your ATM. We got into the operator mode,"' Hewlett was quoted as saying. Then, the bank employees asked for proof. 'So we both went back to the ATM and I got into the operator mode again,' Hewlett said. 'Then I started printing off documentations like how much money is currently in the machine, how many withdrawals have happened that day, how much it's made off surcharges. Then I found a way to change the surcharge amount, so I changed the surcharge amount to one cent.'"
This discussion has been archived. No new comments can be posted.

Kids With Operators Manual Alert Bank Officials: "We Hacked Your ATM"

Comments Filter:
  • Not surprising. (Score:5, Insightful)

    by Z00L00K ( 682162 ) on Monday June 09, 2014 @02:48PM (#47197351) Homepage Journal

    I'm not even mildly surprised that this was possible.

  • Hacked? (Score:3, Insightful)

    by Anonymous Coward on Monday June 09, 2014 @02:48PM (#47197355)

    So....
    they had the manual with passwords....

    this is hacked.... how?

    • by Shatrat ( 855151 )

      The default passwords shouldn't be used, and without a key someone shouldn't be able to gain management access to the device.

      • it is insane how many devices out there are still using default passwords. It seems to me that th eonly items im seeing ship with unique PWs by default these days are cheap WIFI routers surprisingly. I cant tell you how many coke machines out there can be taken over by simple keypresses. My best friend was a cooke distributer, and none of their machines were on a different default PW, always made getting a coke trivial for him however
        • Re:Hacked? (Score:5, Insightful)

          by PopeRatzo ( 965947 ) on Monday June 09, 2014 @03:29PM (#47197845) Journal

          I cant tell you how many coke machines out there can be taken over by simple keypresses.

          I notice you're not sharing the password with us thirsty readers.

          C'mon, bro.

        • I've seen one discussion after another discussing passwords and button press combinations on soda machines, but have never, ever, seen one work.

          I call shenanigans.

          Soda machines are mostly electro-mechanical rather than computer controlled. Either the switch is active to allow button presses to dispense soda, or they're not. You don't program them from the outside. You set the DIPs to the vend prices per column (if it's multi-price) and lock it back up.

          • Which is interesting, because even the old "electromechanical" machines would suffer from hiccups. There was an old machine at my school that, quite reliably, after you paid for one, would give you two Dr. Peppers when you pushed the button for it. It also would give you as many diet cokes as you cared to own, assuming you kept pressing the button as quickly as possible after you fed it your change; if you stopped, it would reset and lock out. If you pushed the Dr Pepper button and the Diet Coke button at
        • I'm surprised such changes can be made from the front panel of the machine. I'd say that any administrative mode should only be accessible by a switch or keypad inside the machine's strongbox.
      • Exactly.
        This is another device, but the principles involved are the same. Where I work we have a coin sorting machine, sort of like a coin star. This particular model dispenses cash instead of a receipt that you take to the counter to cash in, the way a lot of the bigger chains are. With our machine, there is a keyed lock that opens a little flipper door that houses a separate physical keypad that controls all the admin functions. Public user access to the machine is restricted to a touch screen with a ex
    • Hacked? (Score:3, Informative)

      by Anonymous Coward

      It's "hacked", because they did something that (in theory) only administrators are supposed to be able to do. That's really all the definition anyone needs.

      Similarly, if an admin leaves the root passwords as "admin:admin", and someone logs in, that someone has hacked the system.

      • Re:Hacked? (Score:5, Funny)

        by Richy_T ( 111409 ) on Monday June 09, 2014 @03:04PM (#47197539) Homepage

        That's the password on my luggage.

      • by laird ( 2705 )

        True, it's a "hack" but it's a pretty trivial hack.

        • Re:Hacked? (Score:5, Insightful)

          by Yakasha ( 42321 ) on Monday June 09, 2014 @03:17PM (#47197695) Homepage

          True, it's a "hack" but it's a pretty trivial hack.

          They are the ultimate script kiddies. Kids, using a script published by the manufacturer.
          Even putting "trivial" in front diminishes the glory of hacking.

          • by unrtst ( 777550 )

            True, it's a "hack" but it's a pretty trivial hack.

            They are the ultimate script kiddies. Kids, using a script published by the manufacturer.

            Even putting "trivial" in front diminishes the glory of hacking.

            Isn't this all very similar to the phreaking of the 70's/80's, or hacks resulting from simply reading IBM manuals or the rainbow series? Or is everyone too old to remember that?
            FWIW, I do think this is trivial, and it's simply a poorly setup ATM, but taking advantage of obscure weaknesses is a time honored tradition AFAIK, and I bet the kids even learned a fair bit from doing this (unlike a script kiddie that just downloads and blindly executes other peoples work).

      • The neither hacked nor cracked it, they used the built in an approved method as outlined in the Operators Manual. The only questionable part was that they were not authorized to do so, except maybe when they demonstrated it to the bank personnel because they were requested to by an authorized person.
        • Re:Hacked? (Score:5, Informative)

          by Pieroxy ( 222434 ) on Monday June 09, 2014 @03:41PM (#47197953) Homepage

          The definition of hacking, the legal one, in many places at least in europe is defined pretty much as the following: Being somewhere you're not supposed to, while knowing you're not supposed to, and then snooping around instead of just leaving. I guess it's the digital alternative of 'breaking and entering'. Just because you found a post-it with the lock of the front door on the ground, it doesn't make it right to go in. Common sense should kick in at some point, so if you do it anyways, justice assumes common sense did kick in and you entered willfully. THAT makes it illegal.

          That's pretty much common sense.

    • Re:Hacked? (Score:4, Insightful)

      by TheCarp ( 96830 ) <sjc AT carpanet DOT net> on Monday June 09, 2014 @02:59PM (#47197491) Homepage

      A better question is: This is secured.....how?

      Having access to a manual shouldn't provide access to the machine if it has been configured properly. Any passwords in the manual should sure as shit not work after the machine is installed and open to the public.

      It may be fair to say these kids are not really much of hackers....but if that is the case then there are a few things the ATM designers or bank administrators (or both) are not either.

      • by geekoid ( 135745 )

        You have 100s of machines, dozens of employees, who need legitimate access. How do you share the passwords on all those machine?
        Is your solution cost effective? Does it account for areas with bad reception?
        Plus, if you made 10K a week keeping your front door open, but you spent 30K a year replacing any stolen item, would you lock your door?

        • by raymorris ( 2726007 ) on Monday June 09, 2014 @03:20PM (#47197747) Journal

          First, dozens of people shouldn't have administrative access to a particular ATM at once. Where I work, most systems have one or two people with passwords. If both people get hit by a bus, you can boot from a USB stick and proceed from there, but only two people have admin accounts.

          Regarding the logistics of controlling who has access to what, every organization with more than a very few employees needs to manage who has access to what, and that's been true for thousands of years. It's very much a solved problem. Most companys use Active Directory for this purpose. Since ATMs already have card readers, an obvious answer for routine maintenance is to have the employee swipe their employee ID card. The ATM then uses its existing network connection to authorize access via AD. Back in the days of Benjamin Franklin, the solution was a key rack held by a designated employee. Other remployees would check out the keys they needed to use that day. It's kind of an interesting problem, but one that has been solved since roughly the Roman empire or so.

          • by matria ( 157464 )
            When I was in the Navy, there was a key rack in the wachstander's office (barracks watch). Oncoming watchstanders called in to base security to report status, including the presence of all keys, at regular intervals. One petty officer who was a good friend of the barracks chief kept the keys to the barracks back door in her room so she could let her boyfriends in. I was always getting in trouble when I stood watch because I refused to falsify my reports. I would report the key missing, and base security wou
        • by AK Marc ( 707885 )

          How do you share the passwords on all those machine?

          The same way they do for WiFi routers (and have done for 10+ years). You put it on the machine. There are doors locked with keys, and you expect them to have the keys to the ATM, so have the password on the inside of the door. Only if someone is already inside can they see it.

          Is your solution cost effective?

          Yes.

          Does it account for areas with bad reception?

          Yes

          Plus, if you made 10K a week keeping your front door open, but you spent 30K a year replacing any stolen item, would you lock your door?

          And if it cost $0 to prevent all theft, how stupid would you have to be to not secure it?

          The typical Slashdot response. "I can't think of an easy way to fix the problem so it must be impossible." No, you are just stupid.

    • Re:Hacked? (Score:5, Funny)

      by Yakasha ( 42321 ) on Monday June 09, 2014 @03:16PM (#47197673) Homepage

      So.... they had the manual with passwords....

      this is hacked.... how?

      Same way I hacked my VCR so it doesn't flash 12:00 anymore!

    • Re:Hacked? (Score:4, Insightful)

      by rogoshen1 ( 2922505 ) on Monday June 09, 2014 @03:17PM (#47197699)

      because if they use the verb 'hacked' the authorities will be able to get the absolute maximum penalty, and throw the book at these kids.
      Oh, Canada -- right, never mind. (Stuff like this would be punishable by 20+ years in the US more than likely.)

    • I recently read Clifford Stoll's Cuckoo's egg and a good many of "Hunter's" exploits were based on nothing more than known service passwords. You'd think that things would have changed since 1989, but apparently the same mistakes are being made.

    • 8B T/yr [hitachiconsulting.com], times $2.22/T [howstuffworks.com].

      I think a problem with a potential downside of $17,760,000,000 is, well, a problem.
  • by JohnnyComeLately ( 725958 ) on Monday June 09, 2014 @02:50PM (#47197367) Homepage Journal
    Here lately, seems their day at school would have been moot as they are led to a waiting black SUV. Then, SWAT would move into their house and take everything that plugs into a wall and has Ethernet capabilities. Think I'm joking?
    • by Anonymous Coward on Monday June 09, 2014 @02:54PM (#47197407)

      They also probably would have shot any of their pets on the way in. Dude isn't joking; this place is a fucking terror state and does this to people every day.

    • by cdrudge ( 68377 )

      Then, SWAT would move into their house and take everything that plugs into a wall and has Ethernet capabilities. Think I'm joking?

      Of course you are. Why would they leave things that don't plug into a wall and/or have Ethernet capabilities? Take everything. Toaster, tooth brush, pet rock...it's all evidence of the crime and/or hacking tools. They'd probably search the houses of your friends, family, and the guy you looked at walking down the street a week ago too.

    • Could be worse. In Britain they'd have been fimed with cameras!

    • And other stuff (Score:5, Interesting)

      by tekrat ( 242117 ) on Monday June 09, 2014 @03:02PM (#47197519) Homepage Journal

      For example, if they find bleach AND draino under the sink, you're also charged with "Chemical Weapons Possession" if they find candles and matches and charcoal, you have "bomb making materials". The spooks can get you for anything.

      • Usually they'll use that to threaten the suspect into a plea bargin. Either admit guilt and go to jail for five years, or fight it and they'll do the best they can to send you for fifty.

    • Which is a sad (if a bit hyperbolic) reflection of things these days. In the early 1970's, we had a time sharing terminal at our high school. I noted the manuals for the system in my father's office at Boeing, 'borrowed' the manuals and we proceeded to have a fun couple of hours screwing around in admin land. We then got a nice little reply on said terminal to please stop doing that.

      So we stopped.

      The school got a phone call that asked them to supervise the children a bit better and that was that. No muss

  • In the USA anyway, the kids are looking at adult jail time.

    • Did "Bank of Montreal" not clue you in that this wasn't in the USA?
  • Does anyone else think that its getting too dangerous to keep some information in a digital form? Is some information destined to forever be kept in a printed form?

    • With that sentiment, you'd never put *anything* online. This whole thing is just some asshat ATM admins leaving stuff in the *default configuration*. This is the equivalent of buying a home router and not changing the default password (though nowadays routers come with individualized passwords, but they didn't used to).

      • by cdrudge ( 68377 ) on Monday June 09, 2014 @03:13PM (#47197645) Homepage

        though nowadays routers come with individualized passwords, but they didn't used to

        When Verizon FiOS first came to my area, the autogenerated WEP password was based on a 5 character SSID. There were online tools [whatsmyip.org] that you could use to lookup what the default password would be and almost no one, relatively speaking, bothered to change it from the default. Came in handy on more than a few occasions to get free wifi as just about anywhere you go you were in range of someone that had FiOS.

        Another brand used the wireless MAC as the WEP key. shm

  • by Anonymous Coward on Monday June 09, 2014 @02:53PM (#47197397)

    In other news, domestic terrorist ringleaders Matthew Hewlett and Caleb Turon were arrested today in what Department of Homeland Security spokesman Peter Atriot called "a blow for freedom against Jihadists". The two men are believed to diverted funds vital to global banking, thereby aiding and assisting worldwide terror organisations.

  • by Anonymous Coward

    Reading a manual and following step by step instructions which tell you how to get into operator mode is NOT HACKING.. UGH.

  • Relax, folks. (Score:5, Insightful)

    by Anonymous Coward on Monday June 09, 2014 @02:54PM (#47197413)

    This is Canada. As long as they don't try to link good science to administrative policy, the government probably won't care.

  • by Ghostworks ( 991012 ) on Monday June 09, 2014 @02:55PM (#47197435)

    Back before the internet, it was common practice to put hard-coded admin passwords in documentation, in case anyone should forget the real password. In some industries (say, construction road signs) it just never occurred to them that anyone would ever care to look it up for a prank. In other industries, like ATMs, the assumption was that documentation was obscure and difficult to lay hands on without writing to a real person who then had to mail a manual to a real address of an existing customer.

    The fact that they still do this is depressing, but doesn't surprise me in the least.

  • By "hacked" you mean "followed printed instructions from a user's manual". If that's the new "hacking" then I weep for mankind.

    • by Ionized ( 170001 ) on Monday June 09, 2014 @03:09PM (#47197587) Journal

      they were inquisitive, did some research, and experimented on a system, and succeeded in gaining unauthorized access. they then responsibly reported their findings to the device owner.

      what these kids did, while perhaps not quite on par with hacking the gibson, still very much represents the (white hat) hacker ethos at work.

      you, on the other hand, represent the asshat ethos, for downplaying what they did and trying to fiddle fart around with semantics.

  • by g01d4 ( 888748 ) on Monday June 09, 2014 @02:59PM (#47197481)

    Their first random guess at the six-digit password worked. They used a common default password.

    When does incompetence become criminal neglect?

  • Demo Disks (Score:5, Interesting)

    by Ronin Developer ( 67677 ) on Monday June 09, 2014 @03:03PM (#47197521)

    Years ago, when ATMs were first becoming available, someone I know worked as a security exec for a large bank. Seems back then, each ATM came with a demo disk hat, when inserted into a floppy disk port inside the ATM's housing (but, easily accessed) placed the machine into demo mode and allowed the operator full control of the device. The sales operator could then fully demonstrate ALL the features of the ATM - including the automatic dispensing of cash.

    With furled eyebrows, he asked whatever became of all the demo disks after the ATM was installed..nobody knew...just assumed they were thrown out. He asked if they considered this a problem. And, he was told 'No'. At the time, stealing the ATM was all the rage and his concerns were discounted...until one day when money just started disappearing from ATMs. Seems, somebody else found or had one of those disks and realized what they had.

    Pretty scary these kids could find a manual online and that the command sequence to place it into admin mode could be done from the user console vs a separate terminal. One has to wonder if they could have dispensed cash like a Pez dispensor like was possible with the old demo disks.

  • by infogulch ( 1838658 ) on Monday June 09, 2014 @03:10PM (#47197603)
    From this to Highway Sign Hacking [slashdot.org] to that researcher that made a botnet of home routers with default config to ping the whole of ipv4, I really hope admins are getting the point that you can't just drop appliances in public places without adjusting the default configuration. What critical infrastructure is left out there just begging for someone with an operator's manual to wreck it, or even worse, exploit it? Can we get a wake-up call to the administrators of these appliances?
    • Re: (Score:3, Interesting)

      by Anonymous Coward

      Honestly, I don't think even a wake-up call would do anything. Prime example from my life:

      I went to a community college for a few years to get gen-eds out of the way cheap before going to a real college. In one of the buildings, there was a break room that was really popular with students despite not really being anything special - some tables and chairs, and that was about it. I had no idea why it was so popular when there were other break rooms on campus that had TVs and better Wi-Fi access and the like.

  • by meta-monkey ( 321000 ) on Monday June 09, 2014 @03:23PM (#47197767) Journal

    Kids?! More like cybercriminal financial terrorists! Time for a no-knock SWAT raid! Flashbangs, go go go and shoot the dog, too!

  • by Deadstick ( 535032 ) on Monday June 09, 2014 @03:25PM (#47197797)

    Seems like an echo of Richard Feynman's famous "I can open your safe" hobby at Los Alamos. Same method: guessing at obvious combinations like birthdates, in the 50% of cases where the lock wasn't still on the factory combination.

  • by Hamsterdan ( 815291 ) on Monday June 09, 2014 @03:31PM (#47197871)

    When there's an ATM fraud in a customer's account, the customer is accounted responsible for his own account.

Some people manage by the book, even though they don't know who wrote the book or even what book.

Working...