Breaking news

ATM Jackpotting Escalates: The Evolving Threat To Cash Dispensers

Historic Exploits And The Evolution Of ATM Hacking

In 2010, security researcher Barnaby Jack demonstrated at the Black Hat conference how an ATM could be hacked to dispense cash, drawing attention to vulnerabilities that were largely theoretical at the time. The demonstration marked an early turning point in public awareness of ATM cybersecurity risks and foreshadowed techniques later adopted by criminal groups.

The Rise Of ATM Jackpotting As A Criminal Enterprise

ATM jackpotting has since evolved from a research demonstration into a large-scale criminal activity. According to a recent FBI security bulletin, more than 700 attacks on cash machines were recorded in 2025, generating an estimated $20 million in illegal withdrawals. Attackers combine physical access methods, such as using generic keys to open machines, with malware designed to trigger rapid cash dispensing.

Dissecting The Ploutus Malware Threat

One of the most widely used tools in these attacks is Ploutus malware. The software targets Windows-based operating systems used by many ATMs and exploits vulnerabilities in the XFS (Extensions for Financial Services) software, which controls communication among components such as PIN pads, card readers, and cash dispensers. Once installed, the malware allows attackers to command machines to release cash without affecting customer accounts.

Business Implications And Future Trends

The FBI notes that Ploutus attacks focus on ATM infrastructure rather than on individual bank accounts, making them harder to detect through traditional fraud-monitoring systems. This creates new challenges for financial institutions, which must protect both physical hardware and digital systems.

As jackpotting techniques continue to evolve, banks and operators are increasing investment in stronger access controls, system monitoring, and software security. These measures are becoming essential to reducing operational risk and maintaining trust in cash infrastructure.

Greek Tankers Transit Hormuz As Shipping Risks Rise In Gulf And Black Sea

Two tankers linked to George Prokopiou passed through the Strait of Hormuz as regional tensions continue to affect shipping routes in the Gulf.

Safe Passage Through Hormuz

The tanker Smyrni, operated by Dynacom Tankers Management, was observed off the coast of Mumbai on Saturday morning after its earlier positioning in the Persian Gulf. The vessel, like its predecessor Shenlong, temporarily disabled its transponder during transit, a common practice in these narrow channels under uncertain conditions.

Robust Market Commitments

Despite reduced shipping traffic through the strait, Dynacom has continued expanding its fleet. The company recently ordered four additional VLCC tankers from Hengli Heavy Industry. Each vessel will have a capacity of 300,000 deadweight tonnes. With the new order, Dynacom’s VLCC program in Chinese shipyards now totals 16 vessels.

Security Incident In The Black Sea

In a separate incident, the Greek-flagged tanker Maran Homer sustained minor damage near Novorossiysk in the Black Sea. The vessel is operated by Maran Tankers Management, part of the shipping group controlled by Maria Angelicoussis.

Reports indicated the ship was struck by a missile or drone about 14 nautical miles from the port. The crew of 24, including Greek, Filipino and Romanian sailors, was not injured. The vessel, which was not carrying cargo, continued sailing under its own power.

The Future Forbes Realty Global Properties
Aretilaw firm
Uol
eCredo

Become a Speaker

Become a Speaker

Become a Partner

Subscribe for our weekly newsletter