DEV Community

Cover image for FBI Says ATM “Jackpotting” Attacks Are on the Rise: What Developers and Security Engineers Need to Know
Raisha Sultana
Raisha Sultana

Posted on

FBI Says ATM “Jackpotting” Attacks Are on the Rise: What Developers and Security Engineers Need to Know

The FBI recently warned that ATM “jackpotting” attacks are increasing across the United States, with cybercriminals exploiting both software and hardware weaknesses to force cash machines to dispense large sums of money. While this might sound like a niche banking issue, the underlying techniques reveal broader lessons about system security, legacy infrastructure, embedded software, and real-world exploitation.

For developers, DevOps engineers, and security professionals, ATM jackpotting is a case study in how overlooked attack surfaces can lead to high-impact breaches.

This article breaks down how ATM jackpotting works, why it’s growing, and what developers can learn from these attacks.

What Is ATM Jackpotting?

ATM jackpotting is a form of cyberattack where criminals manipulate an ATM to dispense cash on demand, similar to hitting a jackpot on a slot machine.

Unlike traditional ATM fraud (like card skimming), jackpotting targets the machine itself rather than customer credentials. Attackers either:

  • Install malware directly on the ATM’s internal computer

  • Exploit network vulnerabilities

  • Use physical access to connect rogue devices

  • Abuse outdated operating systems and unpatched software

The result is direct cash extraction without needing a bank account or debit card.

How ATM Jackpotting Attacks Work

ATM jackpotting typically involves three main phases:

1. Physical Access to the Machine

Many ATMs still rely on legacy hardware and operating systems. Attackers may:

  • Open the ATM cabinet using generic master keys

  • Drill into the casing to access internal ports

  • Remove protective panels to reach USB or network ports

Once inside, they gain access to the ATM’s embedded PC.

This highlights a critical lesson: physical security is part of cybersecurity.

2. Malware Deployment

After accessing the ATM’s internal system, attackers install specialized malware. Historically known malware families include:

  • Ploutus

  • Cutlet Maker

  • Tyupkin

These programs are designed specifically to interact with ATM cash-dispensing hardware.

Many ATMs run on Windows-based systems, including outdated versions such as Windows 7 or Windows XP Embedded. If USB ports are not disabled or locked down, attackers can boot from external devices or install malware directly.

Once installed, the malware communicates with the dispenser module and can:

  • Trigger cash-out commands

  • Bypass authentication controls

  • Disable logging systems

3. Coordinated Cash-Out

The final stage is execution.

In many cases:

  • One individual installs the malware

  • Another person later enters a specific code sequence

  • The ATM begins dispensing cash rapidly

These attacks are often coordinated across multiple machines in a short time window to maximize profit before detection.

Why Jackpotting Is Increasing

The FBI’s warning signals a broader trend: legacy infrastructure is a growing liability.

Several factors are contributing to the rise:

1. Legacy Systems

Many ATMs still operate on outdated operating systems. Patching embedded systems in distributed environments is complex and costly.

Unpatched systems remain vulnerable to:

  • Privilege escalation exploits

  • Remote code execution

  • Known Windows vulnerabilities

Technical debt in physical infrastructure becomes a security liability.

2. Inconsistent Patch Management

Unlike cloud systems where updates can be automated, ATMs require coordinated maintenance windows, on-site updates, and hardware compatibility testing.

This creates:

  • Long patch cycles

  • Delayed vulnerability remediation

  • Inconsistent configurations across regions

For attackers, inconsistency equals opportunity.

3. Increased Malware Availability

Dark web marketplaces now sell ATM malware kits. Attack tools have become:

  • Easier to deploy

  • More user-friendly

  • Better documented

This lowers the barrier to entry for organized crime groups.

4. Weak Network Segmentation

In some cases, ATMs are connected to broader banking networks without proper isolation.

If attackers gain internal network access, they may:

  • Pivot laterally

  • Target multiple ATMs

  • Deploy malware remotely

Poor segmentation amplifies impact.

What Developers Should Learn from ATM Jackpotting

Even if you never work on banking software, these attacks provide important lessons.

1. Secure Embedded Systems Like You Secure Servers

Embedded systems are often treated differently from cloud applications, but they require the same:

  • Patch management

  • Logging and monitoring

  • Access control

  • Hardening

If your product includes IoT devices, kiosks, POS systems, or industrial controllers, treat them as production infrastructure.

2. Disable Unnecessary Ports and Interfaces

One common jackpotting vector involves USB access.

Best practices include:

  • Disable unused USB ports in BIOS

  • Use hardware port blockers

  • Enforce secure boot

  • Encrypt storage drives

Every exposed interface is a potential entry point.

3. Implement Application Whitelisting

ATM malware often succeeds because the system allows arbitrary executable code to run.

Application whitelisting ensures that:

  • Only approved binaries execute

  • Unknown executables are blocked

  • Malicious payloads fail by default

For enterprise systems, this significantly reduces attack surface.

4. Adopt Zero Trust Principles

Assume:

  • Physical access can happen

  • Internal networks are not inherently safe

  • Devices can be compromised

Zero trust architecture means continuous verification rather than perimeter-based trust.

5. Improve Logging and Real-Time Monitoring

ATM jackpotting often involves abnormal dispenser activity. Real-time monitoring systems should:

  • Alert on unusual cash-out rates

  • Detect system reboots outside maintenance windows

  • Flag unsigned executables

In cloud terms, this is similar to anomaly detection and behavior-based monitoring.

Broader Implications for Software Engineering

ATM jackpotting is not just about banks. It reflects systemic issues across software development:

  • Long-lived systems accumulate technical debt

  • Patch management is often deprioritized

  • Physical and digital security are separated organizationally

Modern development practices emphasize CI/CD and rapid iteration. However, physical infrastructure systems evolve more slowly.

Bridging this gap requires:

  • Infrastructure lifecycle planning

  • Mandatory update strategies

  • Secure-by-design principles

If your system cannot be updated easily, it will eventually become vulnerable.

How Financial Institutions Can Respond

Although this article focuses on developer lessons, defensive strategies for banks include:

  • Migrating to supported operating systems

  • Enabling secure boot and disk encryption

  • Strengthening physical locks and tamper detection

  • Deploying EDR (Endpoint Detection and Response) for ATMs

  • Segmenting ATM networks from core banking systems

The long-term solution involves replacing legacy systems rather than continuously patching them.

The Bigger Picture: Cyber-Physical Security

ATM jackpotting represents a convergence of cyber and physical attacks. As more devices become connected:

  • Smart kiosks

  • Retail POS terminals

  • Industrial control systems

  • IoT devices

Similar attack patterns will emerge.

The key takeaway for developers: security must extend beyond APIs and databases.

If your code runs on hardware deployed in public environments, assume adversaries will eventually gain physical access.

Final Thoughts

The FBI’s warning about rising ATM jackpotting attacks is a reminder that cybersecurity is never just about software or hardware alone. It is about the interaction between systems, physical environments, and operational practices.

For developers, this trend reinforces several core principles:

  • Keep systems updated

  • Minimize exposed interfaces

  • Assume breach scenarios

  • Monitor aggressively

  • Design for secure failure

ATM jackpotting may target banks today, but the lessons apply to every embedded system, kiosk application, and distributed device network.

Security is not just about preventing remote exploits. Sometimes, the attacker is standing right in front of the machine.

If you’re building systems that live outside the cloud, now is the time to audit your assumptions.

Top comments (0)