Just a couple of weeks after the Spanish-language ATM malware known as Ploutus was discovered making the rounds in Mexico, computer security software company Symantec has discovered an updated English-language version.
Aside from the language, the only real differences are that the binary name has changed to ‘Ploutus.exe' from ‘PloutusService.exe,' and it has been changed from a standalone program to a modular architecture, Satnam Narang, a researcher with Symantec Security Response, told SCMagazine.com on Monday.
Otherwise, the mechanism for crooks is mostly the same. Essentially, the malware is transferred into the ATM through the CD-ROM drive, attackers send a 16-digit command code using the ATM keypad, a dispatcher sends a 33-digit instruction to Ploutus through the command line, and then a timer is scheduled to dispense funds.
The malware will only spit out money within the first 24 hours of activation, Narang said.
Aside from placing great physical protections on ATMs, so as to avoid allowing criminals access to the money machine's CD-ROM drive, to defend against Ploutus Symantec has offered up some additional best practices for owners.
First, configure the BIOS boot order to only boot from the hard disk, and not a CD, DVD or USB, Narang said. He added that ATM vendors should secure the BIOS with a password so that attackers cannot reconfigure the boot options, consider removing hardware that allows the BIOS to read and start from the boot, and ensure that AV signatures and security solutions are up to date.
“This discovery underlines the increasing level of cooperation between traditional physical-world criminals with hackers and cyber criminals,” Narang said, adding that ATMs in off-site locations, such as malls and convenience stores, are more likely at risk. “With the ever increasing use of technology in all aspects of security, traditional criminals are realizing that to carry out successful heists, they now require another set of skills that wasn't required in the past.”
Russian security firm Safensoft discovered late in September that Ploutus was infecting ATMs in Mexico, and not long after information security company Trustwave released its own findings on the malware.
시만텍의 영어버전 Ploutus 악성코드 분석 블로그 게시글 -
최초 ATM 악성코드 기사 -
Safensoft 최초 ATM 악성코드 게시글 -
Trustwave 최초 ATM 악성코드 분석 게시글 -
'날마다 반복되는 생활. > 아직 처리되지 않은 자료' 카테고리의 다른 글
|How a Bitcoin transaction works (0)||2013.12.04|
|Google Chrome to Automatically Block Malicious Downloads (0)||2013.11.01|
|ATM 악성코드 Ploutus 영어 버전으로 업데이트 (0)||2013.10.31|
|IBM X-Force 2013 Mid-Year Trend and Risk Report Infographic (0)||2013.10.31|
|Becoming a Data Scientist – Curriculum via Metromap (0)||2013.09.12|
|Phishing Infography (0)||2013.08.29|