Solved

how to mitigate against $ theft from ATM machines

Posted on 2016-07-17
5
93 Views
Last Modified: 2016-11-23
http://cnnphilippines.com/business/2016/07/16/hackers-taiwan-atm-theft.html

Besides CCTV camera in place, how else can we mitigate against the above?

Is it due to poor coding standards of the ATM software as understand the thieves
don't need an ATM card to commit the above.  Dont think the thieves use an axe
or drills to break into the ATM to gain access to the $
0
Comment
Question by:sunhux
5 Comments
 

Author Comment

by:sunhux
ID: 41715684
As ATMs usually use a custom OS, is there such thing as installing anti malwares in
ATM ?
0
 
LVL 87

Assisted Solution

by:rindi
rindi earned 80 total points
ID: 41715697
Your only effective choice is to take the machines offline and wait until the authorities have found out what actually happened, and then wait for the machine vendor to plug the "hole" in their software or hardware.

Before the case has been solved everything is pure speculation as no one will know what actually happened.
0
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 60 total points
ID: 41715730
There is nothing you can do about the machines themselves. As noted above you must wait for the machine supplier / owner to fix issues.

I do the following with my Bank Card.

1. I have a decent PIN not easily guessed.
2. I keep track of my card(s) (I have multiple bank cards).
3. I cover the keyboard with my left hand while keying in my PIN with my right hand. Thieves have been able to install small cameras to get your PIN.  Make sure this cannot happen.

With these steps above, you are as safe as can be.
0
 
LVL 61

Accepted Solution

by:
btan earned 360 total points
ID: 41715810
Actually need some regime check regularly like health report card of those ATM (besides filling them with cash). For example, key checks include
- ATM software to be verified - regular security review report on version update (what is patched)
- ATM firmware to be verified - check against patch against hardware provider (any backdoor or remote access code), tamper proof trigger alert & erasure (able to detect these physical attempt and alert)
- ATM store to be verified - secure at rest and wipe temp storage (filesystem check)
- ATM access control to be verified - physical check on spy reader (skimmer) or wireless attachment to device, check account login trail (http://krebsonsecurity.com/category/all-about-skimmers/)

Good to reference PCI-DSS instead
As organized global crime syndicates target ATMs, the financial industry needs a global ATM
security standard to promote the availability of secure ATMs. The main characteristics of this
standard are:
 Focus on mitigating the effects of skimming and PIN-stealing attacks
 Primarily targeted at products from ATM vendors and deployers
 Provide a complementary framework for device approval (evaluation methodology,
evaluation facilities, and approval management)
https://www.pcisecuritystandards.org/pdfs/PCI_ATM_Security_Guidelines_Info_Supplement.pdf

..and some checklist covering areas such as below though not all are available but priority should be at the the compromise and fraud prevention checks
             ATM Physical Attack Checklist (APA)
               ATM Cash Trapping Checklist (ACT)
               ATM Deposit Fraud Checklist (ADP)
               ATM Dispenser Manipulation Checklist (ADT)
               ATM Card Trapping & Card Theft Checklist (ALT)
               ATM PIN Compromise Checklist (APC)
               ATM Skimming & Systems Compromise Checklist (ASK)
http://www.atmsecurity.com/articles/atm-fraud/tools-atm-fraud-and-atm-security-checklists.html
0
 
LVL 27

Expert Comment

by:tliotta
ID: 41899953
...how else can we mitigate...
Who is "we" in your question?

Is that a question about ATM customers? If so, you can only separate funds into accounts not accessible by ATM.

Or is it about any banks that use those ATMs? If so, ask the ATM vendors.

Up until a decade or so ago, the vast majority of ATMs ran OS/2. (For well beyond the general commercial availability.) But a Windows variant had begun displacing OS/2 because of wider experience (rather than better security, etc., AFAIK.) I've seen no reason to believe that things got better after that. I haven't followed for a number of years, so Linux might have made inroads.
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now