Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware

U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware

Posted on December 22, 2025December 22, 2025 By CWS

The U.S. Division of Justice (DOJ) has charged 54 people in a sweeping crackdown on a transnational cyber-physical assault community.

The indictments, introduced by U.S. Lawyer Lesley A. Woods, allege an enormous conspiracy involving “ATM jackpotting” to fund Tren de Aragua (TdA), a delegated International Terrorist Group.

The coordinated operation focused a complicated felony ring that deployed the infamous Ploutus malware to siphon thousands and thousands of {dollars} from ATMs throughout the US.

 location of alleged jackpotting incidents dedicated throughout the US

The Ploutus Connection

In accordance with courtroom paperwork, the attackers utilized a variant of the Ploutus malware to compromise monetary establishments.

Not like conventional skimming assaults that steal card information, “jackpotting” includes bodily intruding into the machine to pressure it to dispense money on command.

The indictment outlines a methodical course of utilized by the conspirators:

Reconnaissance: Groups scouted goal banks and Credit score Unions to evaluate exterior safety measures.

Bodily Entry: Attackers bodily opened the ATM’s hood or door.

Deployment: The malware was put in by both changing the ATM’s laborious drive with a preloaded drive or by connecting an exterior gadget, comparable to a USB drive, to the machine.

Execution: Ploutus issued unauthorized instructions to the Money Meting out Module, inflicting the machine to empty its forex.

A couple of of the alleged ATM burglaries are in progress

The malware was additionally designed to delete logs to hide the intrusion.

Federal prosecutors allege the stolen funds had been laundered to Venezuela to help TdA management. Together with the gang’s infamous head, Hector Rusthenford Guerrero Flores (a.ok.a. “Niño Guerrero”).

Amongst these charged is Jimena Romina Araya Navarro, a Venezuelan entertainer and alleged TdA chief, accused of offering materials help to the group.

“The Felony Division is not going to tolerate networks of thieves who breach the safety of our monetary system,” mentioned Appearing Assistant Lawyer Normal Matthew R. Galeotti.

In accordance with courtroom paperwork, the 54 defendants face extreme expenses starting from financial institution fraud and pc harm to offering materials help to terrorists. If convicted, they face jail phrases starting from 20 to 335 years.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:ATM, Attack, Charged, Connection, Deploying, DoJ, Hacking, Malware, Ploutus, U.S

Post navigation

Previous Post: Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
Next Post: DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks

Related Posts

State-Backed Hackers Exploit Signal to Target Officials State-Backed Hackers Exploit Signal to Target Officials Cyber Security News
Google Now Allows Users to Change Their @gmail.com Email Address Google Now Allows Users to Change Their @gmail.com Email Address Cyber Security News
NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems Cyber Security News
NCSC Warns of Hacktivist Groups Attacking UK Organisations and Online Services NCSC Warns of Hacktivist Groups Attacking UK Organisations and Online Services Cyber Security News
Global Outage Disrupts Microsoft Exchange Online Access Global Outage Disrupts Microsoft Exchange Online Access Cyber Security News
Critical XSS Flaw in Angular i18n Risks Malicious Attacks Critical XSS Flaw in Angular i18n Risks Malicious Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark