|
In recent months, multiple US law enforcement agencies have responded to ATM jackpotting attacks targeting Direct Memory Access (DMA) of various ATM models and manufacturers by bypassing traditional security controls – resulting in significant financial loss and operational disruption.
DMA attack vulnerabilities may exist across all ATM manufacturers and models.
Attackers gain physical access to the ATM’s upper enclosure (top hat), power it down, open the main computer case (housing), connect malicious hardware (such as a DMA card or PCILeech device) to an internal port, and then power the ATM back up to directly access the memory by installing and/or executing malware on the ATM. This method is effective regardless of ATM brand or model, and older models may lack BIOS (Basic Input/Output System)1 or other firmware update support
Technical Details and Attack Vectors
-
Hardware Exploitation: Attackers target PCIe and M.2 ports, now standard in many ATMs. DIMM slots for RAM modules are also potentially vulnerable.
-
DMA Attack Mechanism: DMA attacks enable direct injection into RAM, bypassing antivirus, whitelisting, and other operating system (OS)-level controls.
-
Security Override: Once RAM is accessed, attackers can override security factors and issue direct disk commands.
Device Components Used in Recent Attacks
The following images represent typical components recovered from ATM DMA incidents. These devices, which can include a Raspberry Pi, DMA card, PCI adapter card, hot spot device, and an external USB power supply, can be used to facilitate direct access to ATM memory and bypass security controls.
|