Announcement

Collapse
No announcement yet.

ATMii: a small but effective ATM robber

Collapse
X
Collapse

  • ATMii: a small but effective ATM robber

    While some criminals blow up ATMs to steal cash, others use less destructive methods, such as infecting the ATM with malware and then stealing the money. We have written about this phenomenon extensively in the past and today we can add another family of malware to the list – Backdoor.Win32.ATMii.

    More...
      Posting comments is disabled.

    Categories

    Collapse

    Article Tags

    Collapse

    Latest Articles

    Collapse

    • ATM malware is being sold on Darknet market
      willie
      In May 2017, Kaspersky Lab researchers discovered a forum post advertising ATM malware that was targeting specific vendor ATMs. The forum contained a short description of a crimeware kit designed to empty ATMs with the help of a vendor specific API, without interacting with ATM users and their data. The price of the kit was 5000 USD at the time of research.

      More...
      10-17-2017, 12:57 PM
    • BlackOasis APT and new targeted attacks leveraging zero-day exploit
      willie
      On October 10, 2017, Kaspersky Lab’s advanced exploit prevention systems identified a new Adobe Flash zero day exploit used in the wild against our customers. The exploit was delivered through a Microsoft Office document and the final payload was the latest version of FinSpy malware. We have reported the bug to Adobe who assigned it CVE-2017-11292 and released a patch earlier today.

      More...
      10-17-2017, 02:20 AM
    • ATMii: a small but effective ATM robber
      willie
      While some criminals blow up ATMs to steal cash, others use less destructive methods, such as infecting the ATM with malware and then stealing the money. We have written about this phenomenon extensively in the past and today we can add another family of malware to the list – Backdoor.Win32.ATMii.

      More...
      10-10-2017, 01:03 PM
    • The Festive Complexities of SIGINT-Capable Threat Actors
      willie
      The 2017 VirusBulletin conference is upon us and, as in previous years, we’re taking the opportunity to dive into an exciting subject, guided by our experience from doing hands-on APT research. This year we decided to put our heads together to understand the implications that the esoteric SIGINT practice of fourth-party collection could have on threat intelligence research.

      More...
      10-04-2017, 03:32 PM
    • Threat Landscape for Industrial Automation Systems in H1 2017
      willie
      Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the results of its research on the threat landscape for industrial automation systems for the first six months of 2017.

      More...
      09-29-2017, 02:12 AM
    • A simple example of a complex cyberattack
      willie
      We're already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks. Sometimes, however, all of this may be done in much simpler ways, as was the case in the malicious campaign that we detected a while ago – we named it 'Microcin' after microini, one of the malicious components used in it.

      More...
      09-27-2017, 02:17 AM
    Working...
    X