Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware

U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware

Posted on December 22, 2025December 22, 2025 By CWS

The U.S. Division of Justice (DOJ) has charged 54 people in a sweeping crackdown on a transnational cyber-physical assault community.

The indictments, introduced by U.S. Lawyer Lesley A. Woods, allege an enormous conspiracy involving “ATM jackpotting” to fund Tren de Aragua (TdA), a delegated International Terrorist Group.

The coordinated operation focused a complicated felony ring that deployed the infamous Ploutus malware to siphon thousands and thousands of {dollars} from ATMs throughout the US.

 location of alleged jackpotting incidents dedicated throughout the US

The Ploutus Connection

In accordance with courtroom paperwork, the attackers utilized a variant of the Ploutus malware to compromise monetary establishments.

Not like conventional skimming assaults that steal card information, “jackpotting” includes bodily intruding into the machine to pressure it to dispense money on command.

The indictment outlines a methodical course of utilized by the conspirators:

Reconnaissance: Groups scouted goal banks and Credit score Unions to evaluate exterior safety measures.

Bodily Entry: Attackers bodily opened the ATM’s hood or door.

Deployment: The malware was put in by both changing the ATM’s laborious drive with a preloaded drive or by connecting an exterior gadget, comparable to a USB drive, to the machine.

Execution: Ploutus issued unauthorized instructions to the Money Meting out Module, inflicting the machine to empty its forex.

A couple of of the alleged ATM burglaries are in progress

The malware was additionally designed to delete logs to hide the intrusion.

Federal prosecutors allege the stolen funds had been laundered to Venezuela to help TdA management. Together with the gang’s infamous head, Hector Rusthenford Guerrero Flores (a.ok.a. “Niño Guerrero”).

Amongst these charged is Jimena Romina Araya Navarro, a Venezuelan entertainer and alleged TdA chief, accused of offering materials help to the group.

“The Felony Division is not going to tolerate networks of thieves who breach the safety of our monetary system,” mentioned Appearing Assistant Lawyer Normal Matthew R. Galeotti.

In accordance with courtroom paperwork, the 54 defendants face extreme expenses starting from financial institution fraud and pc harm to offering materials help to terrorists. If convicted, they face jail phrases starting from 20 to 335 years.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:ATM, Attack, Charged, Connection, Deploying, DoJ, Hacking, Malware, Ploutus, U.S

Post navigation

Previous Post: Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
Next Post: DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks

Related Posts

Researchers Proposed Game-Theoretic AI for Guiding Attack and Defense Researchers Proposed Game-Theoretic AI for Guiding Attack and Defense Cyber Security News
Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content Cyber Security News
Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials Cyber Security News
ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions Cyber Security News
Top 10 Best Exposure Management Tools In 2026 Top 10 Best Exposure Management Tools In 2026 Cyber Security News
Microsoft 365 Services and Copilot Outage Hits Users in Japan and China Microsoft 365 Services and Copilot Outage Hits Users in Japan and China Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark