Solved

how to mitigate against $ theft from ATM machines

Posted on 2016-07-17
5
116 Views
Last Modified: 2016-11-23
http://cnnphilippines.com/business/2016/07/16/hackers-taiwan-atm-theft.html

Besides CCTV camera in place, how else can we mitigate against the above?

Is it due to poor coding standards of the ATM software as understand the thieves
don't need an ATM card to commit the above.  Dont think the thieves use an axe
or drills to break into the ATM to gain access to the $
0
Comment
Question by:sunhux
5 Comments
 

Author Comment

by:sunhux
ID: 41715684
As ATMs usually use a custom OS, is there such thing as installing anti malwares in
ATM ?
0
 
LVL 88

Assisted Solution

by:rindi
rindi earned 80 total points
ID: 41715697
Your only effective choice is to take the machines offline and wait until the authorities have found out what actually happened, and then wait for the machine vendor to plug the "hole" in their software or hardware.

Before the case has been solved everything is pure speculation as no one will know what actually happened.
0
 
LVL 92

Assisted Solution

by:John Hurst
John Hurst earned 60 total points
ID: 41715730
There is nothing you can do about the machines themselves. As noted above you must wait for the machine supplier / owner to fix issues.

I do the following with my Bank Card.

1. I have a decent PIN not easily guessed.
2. I keep track of my card(s) (I have multiple bank cards).
3. I cover the keyboard with my left hand while keying in my PIN with my right hand. Thieves have been able to install small cameras to get your PIN.  Make sure this cannot happen.

With these steps above, you are as safe as can be.
0
 
LVL 62

Accepted Solution

by:
btan earned 360 total points
ID: 41715810
Actually need some regime check regularly like health report card of those ATM (besides filling them with cash). For example, key checks include
- ATM software to be verified - regular security review report on version update (what is patched)
- ATM firmware to be verified - check against patch against hardware provider (any backdoor or remote access code), tamper proof trigger alert & erasure (able to detect these physical attempt and alert)
- ATM store to be verified - secure at rest and wipe temp storage (filesystem check)
- ATM access control to be verified - physical check on spy reader (skimmer) or wireless attachment to device, check account login trail (http://krebsonsecurity.com/category/all-about-skimmers/)

Good to reference PCI-DSS instead
As organized global crime syndicates target ATMs, the financial industry needs a global ATM
security standard to promote the availability of secure ATMs. The main characteristics of this
standard are:
 Focus on mitigating the effects of skimming and PIN-stealing attacks
 Primarily targeted at products from ATM vendors and deployers
 Provide a complementary framework for device approval (evaluation methodology,
evaluation facilities, and approval management)
https://www.pcisecuritystandards.org/pdfs/PCI_ATM_Security_Guidelines_Info_Supplement.pdf

..and some checklist covering areas such as below though not all are available but priority should be at the the compromise and fraud prevention checks
             ATM Physical Attack Checklist (APA)
               ATM Cash Trapping Checklist (ACT)
               ATM Deposit Fraud Checklist (ADP)
               ATM Dispenser Manipulation Checklist (ADT)
               ATM Card Trapping & Card Theft Checklist (ALT)
               ATM PIN Compromise Checklist (APC)
               ATM Skimming & Systems Compromise Checklist (ASK)
http://www.atmsecurity.com/articles/atm-fraud/tools-atm-fraud-and-atm-security-checklists.html
0
 
LVL 27

Expert Comment

by:tliotta
ID: 41899953
...how else can we mitigate...
Who is "we" in your question?

Is that a question about ATM customers? If so, you can only separate funds into accounts not accessible by ATM.

Or is it about any banks that use those ATMs? If so, ask the ATM vendors.

Up until a decade or so ago, the vast majority of ATMs ran OS/2. (For well beyond the general commercial availability.) But a Windows variant had begun displacing OS/2 because of wider experience (rather than better security, etc., AFAIK.) I've seen no reason to believe that things got better after that. I haven't followed for a number of years, so Linux might have made inroads.
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
An overview of HIPAA and guidance on this topic that Experts Exchange members can offer.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now