{"id":16841,"date":"2020-10-20T14:00:11","date_gmt":"2020-10-20T17:00:11","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=16841"},"modified":"2020-10-20T12:11:12","modified_gmt":"2020-10-20T15:11:12","slug":"cashing-in-on-atm-malware-a-comprehensive-look-at-various-attack-types","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/cashing-in-on-atm-malware-a-comprehensive-look-at-various-attack-types\/","title":{"rendered":"Cashing in on ATM Malware &#8211; A Comprehensive Look at Various Attack Types"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-16842\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/10\/cashing-in-on-atm-malware-a-comprehensive-look-at-various-attack-types.jpg\" alt=\"Cashing in on ATM Malware - A Comprehensive Look at Various Attack Types\" width=\"145\" height=\"187\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/10\/cashing-in-on-atm-malware-a-comprehensive-look-at-various-attack-types.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/10\/cashing-in-on-atm-malware-a-comprehensive-look-at-various-attack-types-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Trend Micro, Europol<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> ATM malware is one of the digital threats that have been around for a while now, with the discovery of the first known variant dating back to 2009. It should not be a surprise that it has become a mainstay in many cybercriminals\u2019 arsenal because it can, plainly put, steal cold, hard cash.<br \/>\nWe have seen time and again how cybercriminals plant skimming devices on automated teller machines (ATMs), even those exposed in public sight, and how they use other physical attacks for quick gains.<br \/>\nHowever, as cybercriminals continue to aim at siphoning off considerable profits, it only makes sense that they would progress to targeting ATMs via networks. After all, finding a way to bypass security and infiltrate the financial institutions\u2019 networks promises a bigger payout.<br \/>\nCouple that motivation with the fact that many ATMs run on outdated operating systems, and you get a compelling reason for the sustained cybercriminal use of ATM malware. Such operating systems are vulnerable since they have already reached end of support, meaning there will no longer be security updates and hotfixes provided for them. Consequently, machines that rely on obsolete operating systems are highly susceptible to attacks.<br \/>\nIn this paper, we explore in detail the different known ATM malware families and attack types (physical and network-based) and how attackers operate their way to and around their target infrastructures.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2020\/10\/cashing-in-on-atm-malware-a-comprehensive-look-at-various-attack-types.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro, Europol R\u00e9sum\u00e9: ATM malware is one of the digital threats that have been around for a while now, with the discovery of the first known variant dating back to 2009. It should not be a surprise that it has become a mainstay in many cybercriminals\u2019 arsenal because it can, plainly put, steal cold, hard cash. We have seen time and again how cybercriminals plant skimming devices on automated&hellip; <\/p>\n","protected":false},"author":3,"featured_media":16842,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,51,23,6,91,22,112],"tags":[],"class_list":["post-16841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crime-violencia-e-criminologia","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-seguranca-bancaria","category-seguranca-eletronica","category-download"],"views":152,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=16841"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16841\/revisions"}],"predecessor-version":[{"id":16843,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16841\/revisions\/16843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/16842"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=16841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=16841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=16841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}