Menu
Sophisticated malware possibly tied to recent ATM heists in Thailand

Sophisticated malware possibly tied to recent ATM heists in Thailand

The Ripper malware allows attackers to withdraw money from ATMs with specially made cards

Security researchers have found a sophisticated malware program that may have been used recently by a gang of hackers to steal more than US$350,000 from ATMs in Thailand.

A sample of the new malware, dubbed Ripper, was uploaded to the VirusTotal database from an Internet Protocol address in Thailand last week, shortly before local media reported that hackers used malware to steal 12.29 million Baht from 21 ATMs in the country.

The incident forced the state-owned Government Savings Bank to temporarily shut down all of its ATMs made by one vendor so they could be checked for malware, the Bangkok Post reported last week.

Aside from the Ripper sample coming from Thailand, other indicators suggest this program was the one used to pull off the recent ATM heist in the country, security researchers from FireEye said in a blog post Friday.

Based on their analysis, Ripper targets the same ATM brand as the one affected in Thailand, as well as two others. It can disable the ATM's local network interface, which according to some public sources, happened during the recent incident. The sample was also compiled on July 10, around a month before the attack was disclosed publicly.

Once installed on an ATM, Ripper waits for attackers to insert a card with a specially programmed chip. This mechanism, used for authentication, has been used by other ATM malware in the past. Once authenticated, the attacker can issue commands to dispense up to 40 banknotes from the ATM's cash cassettes.

Ripper also has other features seen in past ATM malware programs, including Padpin (Tyupkin), SUCEFUL and GreenDispenser. For example, it features a secure delete option that can be used to destroy forensic evidence, the FireEye researchers said.

ATM malware can be deployed in several ways. One is by insiders who work as technicians and service ATMs. Another is through the CD-ROM or USB ports of the ATMs that are available after opening their covers with special service keys, which can be bought online. This second method can only be used to target ATMs that sit outside, in unsecured places, which seems to have been the case in Thailand.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments