Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    America’s immigration system was a landmine, and Trump set it off

    May 15, 2025

    Apple CarPlay 2 Finally Lands As ‘CarPlay Ultra’—but Aston Martin Gets It First

    May 15, 2025

    Trump wants Apple to stop making more iPhones in India

    May 15, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look
    Security

    ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look

    News RoomBy News RoomAugust 10, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    There is a grand tradition at the annual Defcon security conference in Las Vegas of hacking ATMs. Unlocking them with safecracking techniques, rigging them to steal users’ personal data and PINs, crafting and refining ATM malware and, of course, hacking them to spit out all their cash. Many of these projects targeted what are known as retail ATMs, freestanding devices like those you’d find at a gas station or a bar. But on Friday, independent researcher Matt Burch is presenting findings related to the “financial” or “enterprise” ATMs used in banks and other large institutions.

    Burch is demonstrating six vulnerabilities in ATM-maker Diebold Nixdorf’s widely deployed security solution, known as Vynamic Security Suite (VSS). The vulnerabilities, which the company says have all been patched, could be exploited by attackers to bypass an unpatched ATM’s hard drive encryption and take full control of the machine. And while there are fixes available for the bugs, Burch warns that, in practice, the patches may not be widely deployed, potentially leaving some ATMs and cash-out systems exposed.

    “Vynamic Security Suite does a number of things—it has endpoint protection, USB filtering, delegated access, and much more,” Burch tells WIRED. “But the specific attack surface that I’m taking advantage of is the hard drive encryption module. And there are six vulnerabilities, because I would identify a path and files to exploit, and then I would report it to Diebold, they would patch that issue, and then I would find another way to achieve the same outcome. They’re relatively simplistic attacks.”

    The vulnerabilities Burch found are all in VSS’s functionality to turn on disk encryption for ATM hard drives. Burch says that most ATM manufacturers rely on Microsoft’s BitLlocker Windows encryption for this purpose, but Diebold Nixdorf’s VSS uses a third-party integration to run an integrity check. The system is set up in a dual-boot configuration that has both Linux and Windows partitions. Before the operating system boots, the Linux partition runs a signature integrity check to validate that the ATM hasn’t been compromised, and then boots it into Windows for normal operation.

    “The problem is, in order to do all of that, they decrypt the system, which opens up the opportunity,” Burch says. “The core deficiency that I’m exploiting is that the Linux partition was not encrypted.”

    Burch found that he could manipulate the location of critical system validation files to redirect code execution; in other words, grant himself control of the ATM.

    Diebold Nixdorf spokesperson Michael Jacobsen tells WIRED that Burch first disclosed the findings to them in 2022 and that the company has been in touch with Burch about his Defcon talk. The company says that the vulnerabilities Burch is presenting were all addressed with patches in 2022. Burch notes, though, that as he went back to the company with new versions of the vulnerabilities over the past couple of years, his understanding is that the company continued to address some of the findings with patches in 2023. And Burch adds that he believes Diebold Nixdorf addressed the vulnerabilities on a more fundamental level in April with VSS version 4.4 that encrypts the Linux partition.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe cheapest Cybertruck is now almost $100,000
    Next Article Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

    Related Posts

    Google’s Advanced Protection for Vulnerable Users Comes to Android

    May 14, 2025

    Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud

    May 14, 2025

    An $8.4 Billion Chinese Hub for Crypto Crime Is Incorporated in Colorado

    May 14, 2025

    ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador

    May 13, 2025

    US Border Agents Are Asking for Help Taking Photos of Everyone Entering the Country by Car

    May 13, 2025

    The Trump Administration Sure Is Having Trouble Keeping Its Comms Private

    May 12, 2025
    Our Picks

    Apple CarPlay 2 Finally Lands As ‘CarPlay Ultra’—but Aston Martin Gets It First

    May 15, 2025

    Trump wants Apple to stop making more iPhones in India

    May 15, 2025

    Motorola Razr Ultra (2025) review: looking sharp

    May 15, 2025

    Microsoft shuts off Bing Search APIs and recommends switching to AI

    May 15, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    Our Favorite Micro Electric Bike Just Got a Big Upgrade

    By News RoomMay 15, 2025

    I’ve become popular with children lately. It’s not intentional. It’s just because I’ve been riding…

    Google DeepMind’s AI Agent Dreams Up Algorithms Beyond Human Expertise

    May 15, 2025

    Apple is placing warnings on EU apps that don’t use App Store payments

    May 15, 2025

    Leica can now style your iPhone photos to mimic a pro photographer

    May 15, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.