Watch video
Barnaby Jack, IOActive's security testing director, brought two ATMs bought on eBay onto the stage and demonstrated the process of hacking the two machines in front of many security experts, technology firms and hackers. at the Black Hat Conference (annual conference on security technology). By software tools, hacking these two ATMs is relatively easy. Two ATMs that Jack hacked on stage were produced by Triton and Tranax.
Barnaby Jack at the Black Hat conference. (Photo: AP).
Jack demonstrated two different attacks aimed at these two ATMs. In the first way, Jack used an attack tool that could install a strange program into the machine and even overwrite the entire firmware of the ATM remotely via the network without touching it; The second way is to use a key that can be purchased on the web for only $ 10 to open the lid and plug a USB device containing malware.
Jack would have published these attacks from the conference last year, but he had withdrawn from participating to allow time for Triton to release the vulnerability patch and Tranax advised customers.
After Jack " wakes up " the software installed on the system and places the order, the ATM releases 50 notes on the stage.
The Tranax hacked was due to an authentication bypass vulnerability. Jack discovered this vulnerability in the remote system monitoring feature, so that the system can be accessed via Internet or dial-up, depending on the system configuration. The remote system monitoring feature is turned on by default, but Jack says the manufacturer has begun recommending that users protect themselves from attacks by turning off this feature.
Triton's ATM was attacked by a security vulnerability that allowed unauthenticated programs to run on the system. The company distributed a patch of this vulnerability last November to allow only digital certificate codes to be allowed to operate.
Both Triton and Tranax ATMs run Windows CE operating systems.