ATM Malware Analysis

Viewing 1 reply thread
  • Author
    Posts
    • #3855
      ethicalhack3r
      Participant

      Found this and thought it was interesting…

      Trustwave’s SpiderLabs performed the analysis of malicious software (malware) found installed on compromised ATMs (Automated Teller Machines) in the Eastern European region. This malware captures magnetic stripe data and PIN codes from the private memory space of transaction-processing applications installed on a compromised ATM. The compromised ATMs discussed in this briefing ran Microsoft’s Windows XP operating system.

      I took pictures of an ATM last year that was running what I thought at the time was Windows 95 however I have since learnt that it was XP with the 95 theme. I was very surprised that they were not *nix based.

      Heres a link to the trustwave briefing (very interesting):
      https://www.trustwave.com/downloads/alerts/Trustwave-Security-Alert-ATM-Malware-Analysis-Briefing.pdf

      My blog post on ATM’s running what I thought was win95 (one of my first posts, excuse the quality of it):
      http://www.ethicalhack3r.co.uk/2008/11/12/atms-running-windows-95/

    • #24633
      Ne0
      Participant

      cool 🙂

Viewing 1 reply thread
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?