Where The Money Is: Bank Robbers Blow Up 492 ATMs

 
Some 492 ATMs across Europe were blown up by thieves in the first half of 2016, as criminals looked to supplement their attempts at infiltrating machines via cyber-attacks.

The non-profit European ATM Security Team (EAST) claimed physical attacks soared 80% from the 273 reported in the same period in 2015, costing over €16,000 (£14,450) each, not including damage to equipment and buildings.

Total physical attacks jumped 30% from the first half of 2015 to reach 1,604 incidents in the first six months of the year, with losses rising 3% to hit €27m (£24m).

 

Cybercriminals increasingly target ATMs
The news comes as cybercriminals increasingly target ATMs with virtual or ‘logical’ attacks. Some 28 incidents were reported in the first half of 2016, up from just five the same period last year, at a total loss of €400,000 (£361,000).

These “cash out” or “jackpotting” attacks typically involve malware which takes control of the ATM’s cash dispensing function to fill the pockets of the cybercriminals.

ATM-related fraud jumped 28% to over 10,000 incidents in 1H 2016, thanks to a staggering 281% increase in Transaction Reversal Fraud, where thieves either physically interfere with the machine or attempt to corrupt transaction messages to siphon off cash funds.

ATM fraud alone cost European lenders €174m (£157m) in the first half of 2016, up from €156m (£141m) a year ago. There’s also been a rise in skimming internationally, from losses of €131m (£118m) to €142m (£128m) over the period.

The news shows criminal gangs increasingly using diverse tactics, and blending physical and online methods, to steal from banks. A report from Kaspersky Lab back in April claimed that almost all ATMs across the globe can be illegally accessed and raided without even the need to install malware, because they’re running outdated technology. That said, malware is also being used to devastating effect by some groups.

The ‘Ripper’ family was recently pegged for helping a gang steal 12 million baht (£265,400) from ATMs in Thailand.

Infosecurity Magazine: 

« US Has A Strategy To Defend Against Another Massive IoT Attack
Was North Korea Behind The IoT DDoS Attack? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

Simility

Simility

Simility's multi-layered fraud detection solution uses superior machine learning & device intelligence technology to safeguard your online businesses.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Cyber Grant

Cyber Grant

Cyber Grant excel in designing cybersecurity solutions for data protection. Our approach and vision, centered on ease-of-use, establish us as a benchmark in the industry for safeguarding information.