FBI warns of ATM Jackpotting incidents across America: What are they, how they work and how to detect one

FBI warns of ATM Jackpotting incidents across America: What are they, how they work and how to detect one

The Federal Bureau of Investigation (FBI) has released a flash to disseminate indicators of compromise (IOCs) and technical details associated with malware enabled ATM jackpotting. Threat actors exploitphysical and software vulnerabilities in ATMs and deploy malware to dispense cash without a legitimate transaction. The FBI has observed an increase in ATM jackpotting incidents across the United States. Out of 1,900 ATM jackpotting incidents reported since 2020, over 700 of them with more than $20 million in losses occurred in 2025 alone. This FLASH is being provided to encourage organizations to implement the recommended mitigation steps and to outline the information requested from the public.Threat actors are deploying ATM jackpotting malware, including the Ploutus family malware, to infect ATMs and force them to dispense cash. Ploutus malware exploits the eXtensions for Financial Services (XFS), the layer of software that instructs an ATM what to physically do. When a legitimate transaction occurs, the ATM application sends instructions through XFS for bank authorization. If a threat actor can issue their own commands to XFS, they can bypass bank authorization entirely and instruct the ATM to dispense cash on demand. As a result, Ploutus allows threat actors to force an ATM to dispense cash without using a bank card, customer account, or bank authorization. Once Ploutus is installed on an ATM, it gives threat actors direct control over the machine, allowing them to trigger cash withdrawals. Ploutus attacks the ATM itself rather than customer accounts, enabling fast cash-out operations that can occur in minutes and are often difficult to detect until after the money is withdrawn.

Common methods of used to infect ATMs

After gaining access to ATMs, most often by opening an ATM face with widely available generic keys, ATM jackpotting threat actors have used several main methods to deploy malware:• Criminals remove the ATM’s hard drive, connect it to their computer, copy the malware to the hard drive, return the hard drive to the ATM, and reboot the ATM.• Criminals remove the ATM’s hard drive, replace it with a foreign hard drive or other external device with preloaded malware, and reboot the ATM.

How ATM malware works

The malware interacts directly with the ATM hardware, bypassing any communications or security of the original ATM software. The malware does not require connection to an actual bank customer account todispense cash. The malware can be used across ATMs of different manufacturers with very little adjustment to the code as the Windows operating system is exploited during the compromise.

What are the Physical Indicators of an infected ATM

* ATM door open alerts outside of planned maintenance schedule* Low/No cash indicators outside of expected use schedule* Unauthorized devices plugged into the ATM* Removal of hard drives from ATMs* ATM unexpectedly out of service

  • Related Posts

    Steam Games With Hidden Malware: FBI is investigating malware hidden inside games on Steam: Names of suspected games; timeline of attack and tips for gamers to protect themselves |

    FBI Director Kash Patel. (AP Photo/Mark Schiefelbein) The Federal Bureau of Investigation (FBI) is investigating malware hidden inside games hosted on Steam. The FBI’s Seattle Division is seeking to identify…

    Us-China Rivalry: $3.4 trillion mistake with China: Why US will make India’s rise far tougher

    The US has quietly funneled $3.4 trillion into a “militarised rivalry” with China from 2012 to 2024 — eclipsing the $2.3 trillion spent during two decades of war in Afghanistan…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    ‘Use LPG wisely’: Centre says supply ‘matter of concern’; advises consumers not to panic | India News

    ‘Use LPG wisely’: Centre says supply ‘matter of concern’; advises consumers not to panic | India News

    Remembering Puneeth Rajkumar: A Tribute on His 51st Birthday |

    Remembering Puneeth Rajkumar: A Tribute on His 51st Birthday |

    Trump’s Trade Adviser Rages As Putin-Modi-Xi SCO Bonhomie ‘Flips’ U.S.’ Tariff Gambit

    Trump’s Trade Adviser Rages As Putin-Modi-Xi SCO Bonhomie ‘Flips’ U.S.’ Tariff Gambit

    Exporters seek moratorium on loan repayment for 6 mths

    Exporters seek moratorium on loan repayment for 6 mths

    10 years in space: ISRO’s IRNSS-1F completes its 10-year mission life with lasting impact on NavIC |

    10 years in space: ISRO’s IRNSS-1F completes its 10-year mission life with lasting impact on NavIC |

    Alacrity 2026 concludes at AISSMS IOIT with a grand cultural and technical showcase

    Alacrity 2026 concludes at AISSMS IOIT with a grand cultural and technical showcase