Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Telecoms industry backs Malatsi policy directive, warns on execution - ACT CEO Nomvuyiso Batyi

      Telecoms industry backs Malatsi policy directive, warns on execution

      17 December 2025
      TechCentral's International Newsmakers of 2025

      TechCentral’s International Newsmakers of 2025

      17 December 2025
      Warner Bros slams the door on Paramount

      Warner Bros slams the door on Paramount

      17 December 2025
      Airtel to roll out Starlink direct-to-cell across Africa

      Airtel to roll out Starlink direct-to-cell across Africa

      17 December 2025
      Presidency backs Solly Malatsi in BEE reform fight - Cyril Ramaphosa

      Presidency backs Solly Malatsi in BEE reform fight

      15 December 2025
    • World
      X moves to block bid to revive Twitter brand

      X moves to block bid to revive Twitter brand

      17 December 2025
      Oracle’s AI ambitions face scrutiny on earnings miss

      Oracle’s AI ambitions face scrutiny on earnings miss

      11 December 2025
      China will get Nvidia H200 chips - but not without paying Washington first

      China will get Nvidia H200 chips – but not without paying Washington first

      9 December 2025
      IBM reportedly close to $11-billion deal to buy Confluent - Arvind Krishna

      IBM reportedly close to $11-billion deal to buy Confluent

      8 December 2025
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
    • In-depth
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      Canal+ plays hardball - and DStv viewers feel the pain

      Canal+ plays hardball – and DStv viewers feel the pain

      3 December 2025
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
    • TCS
      TCS+ | Africa's digital transformation - unlocking AI through cloud and culture - Cliff de Wit Accelera Digital Group

      TCS+ | Cloud without culture won’t deliver AI: Accelera’s Cliff de Wit

      12 December 2025
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
    • Opinion
      Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

      Netflix, Warner Bros deal raises fresh headaches for MultiChoice

      5 December 2025
      BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

      BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

      3 December 2025
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » World » Windows ATMs: how safe is your money?

    Windows ATMs: how safe is your money?

    By The Conversation13 October 2014
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    ATM-640

    How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced computers to shut down, knocked Korea offline and even overloaded Google’s servers.

    Now, how safe do you feel knowing that cash machines across the world run Microsoft Windows?

    A plot has been discovered, apparently spread across Russia, India and China, whereby cash machines can be turned into a free money vending machine.

    The hack requires re-starting the cash machine — essentially a Windows terminal — from a prepared CD that injects malware into the system to circumvent the security. At set times of the week, a unique code is generated and given to a “mule” who would approach the machine, enter the code, and withdraw up to 40 notes, anonymously and without trace.

    Attacks on ATMs (those more sophisticated than removing the cash machine and cutting into its safe) started around 10 years ago with card-reader devices containing a tiny integrated camera and card reader. As a user withdraws cash, the device reads the account details from the card’s magnetic stripe and videos the Pin number entered into the keypad.

    Earlier generations of ATM machines were often built around computer terminals running IBM’s OS/2 operating system (which started life as a joint IBM-Microsoft venture, and which somewhat ironically spawned Microsoft’s Windows NT, the grandparent of modern Windows, and IBM’s OS/2 when that project collapsed). Due to its more esoteric and rare nature, there are far fewer attacks for OS/2, but now it is standard builds of Windows, potentially vulnerable to all the usual malware and exploits, that run modern ATMs.

    So, it is not surprising that intruders have started to find ways inside ATMs’ card processing and cash dispensing systems. Malware that can offer external control to an ATM have been reported for some years, allowing attackers to dispense cash, record and print out card details and Pin numbers.

    This latest malware is Backdoor.MSIL.Tyupkin, which while running continuously will only listen for commands on a Sunday and Monday night. The criminal gangs operating the malware generate a random, unique, six-digit key code that activates the program, which is given to the “mule” who is withdrawing the money.

    Like previous efforts to crack into ATMs, the malware requires physical access to the ATM, typically by booting the machine from a CD prepared to install the malware. At present, the malware has been active on at least 50 ATMs in Russia and Eastern Europe, but also in the US, China and India.

    The malware is the file ulssm.exe, which is copied into the c:\windows\system32 directory and which is protected and maintained on the system between reboots by modifying the Windows registry (a database of configuration settings) so that Windows automatically runs the program at start-up. The program then interacts with the ATM through the Extension for Financial Services (XFS) library, MSXFS.dll. To avoid detection, it will only allow access controller commands on Sunday and Monday evenings.

    The threat of rebooting machines from CDs or bootable USB sticks in order to install malware and abusing the Windows autorun feature to sustain the program in memory is an exploit that has been common for over a decade. Few lessons have been learned in terms of securing physical access to the device, and also in the privileged rights that malware can gain. Even as companies focus on improving and securing the user interface, often the debugging and diagnostic side can provide further routes into a system.

    Versions of Windows used in embedded control systems are now sufficiently secure, but as ATM manufacturers use standard installations of Windows, they are opening themselves up to further problems — not least because it allows hackers the opportunity to simulate and craft their malware on well-known versions of the operating system.

    However, at the core of this attack — as with those before it — is the need for physical access to the device, which implies an insider working in the bank. That means with monitoring of who has access to the cash machine, this can be prevented. The key lesson is that the ATM operating system is a weak link in the chain which needs to be closed.The Conversation

    • Bill Buchanan is head of the Centre for Distributed Computing, Networks and Security at Edinburgh Napier University
    • This article was originally published on The Conversation


    IBM Kaspersky Kaspersky Lab Microsoft
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleJudgment reserved in StarSat case
    Next Article Vox Guardian Eye Lite: eye spy

    Related Posts

    OpenAI warns new models pose high cybersecurity risk

    OpenAI warns new models pose high cybersecurity risk

    11 December 2025
    IBM reportedly close to $11-billion deal to buy Confluent - Arvind Krishna

    IBM reportedly close to $11-billion deal to buy Confluent

    8 December 2025
    Big Microsoft 365 price increases coming next year

    Big Microsoft price increases coming next year

    5 December 2025
    Company News
    Why TechCentral is the most powerful platform for reaching IT decision makers

    Why TechCentral is the most powerful platform for reaching IT decision makers

    17 December 2025
    Business trends to watch in 2026 - Domains.co.za

    Business trends to watch in 2026

    17 December 2025
    MTN Zambia launches world's first 4G cloud smartphone solution - Huawei

    MTN Zambia launches world’s first 4G cloud smartphone solution

    17 December 2025
    Opinion
    Netflix, Warner Bros deal raises fresh headaches for MultiChoice - Duncan McLeod

    Netflix, Warner Bros deal raises fresh headaches for MultiChoice

    5 December 2025
    BIN scans, DDoS and the next cybercrime wave hitting South Africa's banks - Entersekt Gerhard Oosthuizen

    BIN scans, DDoS and the next cybercrime wave hitting South Africa’s banks

    3 December 2025
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Telecoms industry backs Malatsi policy directive, warns on execution - ACT CEO Nomvuyiso Batyi

    Telecoms industry backs Malatsi policy directive, warns on execution

    17 December 2025
    TechCentral's International Newsmakers of 2025

    TechCentral’s International Newsmakers of 2025

    17 December 2025
    Warner Bros slams the door on Paramount

    Warner Bros slams the door on Paramount

    17 December 2025
    Why TechCentral is the most powerful platform for reaching IT decision makers

    Why TechCentral is the most powerful platform for reaching IT decision makers

    17 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}