Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FBI Warns of Rising ATM Jackpotting Losses Exceeding M

FBI Warns of Rising ATM Jackpotting Losses Exceeding $20M

Posted on February 20, 2026 By CWS

The Federal Bureau of Investigation (FBI) has raised concerns over a surge in ATM jackpotting incidents nationwide, which have resulted in financial losses exceeding $20 million in 2025 alone. Since 2020, there have been 1,900 reported cases of such attacks, with 700 occurring in the past year. In December 2025, the U.S. Department of Justice (DoJ) reported that a total of $40.73 million has been lost to these attacks since 2021.

Understanding the Jackpotting Threat

ATM jackpotting involves cybercriminals exploiting both physical and software vulnerabilities in ATMs, often by deploying malware to dispense cash unlawfully. The FBI, in a recent bulletin, highlighted that threat actors use sophisticated malware, such as Ploutus, to gain unauthorized control over ATM systems. Commonly, attackers access machines using widely available generic keys, allowing them to open the ATM face and inject the malware.

The malware is usually installed by either removing the ATM’s hard drive and connecting it to an attacker’s computer or replacing it with a foreign drive preloaded with malicious software. Once installed, the malware interacts directly with ATM hardware, bypassing the existing security measures of the original software. This enables the malware to operate across various ATM models with minimal code modifications, exploiting the Windows operating system.

Mechanics of Malware Deployment

First observed in Mexico in 2013, Ploutus has evolved to provide cybercriminals with full control over ATMs, facilitating rapid and undetectable cash withdrawals. According to the FBI, the malware manipulates the eXtensions for Financial Services (XFS) software, which directs ATM actions. By issuing unauthorized commands through XFS, attackers can bypass the usual bank authorization process, making it possible to dispense cash on demand.

This sophisticated attack method requires no bank card or customer account interaction, significantly increasing its effectiveness and reach. The FBI emphasized the urgency of understanding these tactics to implement effective countermeasures.

Preventive Measures and Recommendations

In response to the growing threat, the FBI has suggested several strategies to mitigate the risks associated with ATM jackpotting. Key recommendations include enhancing physical security by installing threat sensors, security cameras, and replacing standard locks on ATM devices. Additionally, financial institutions are advised to audit ATM devices regularly, change default credentials, and configure automatic shutdowns when compromise indicators are detected.

Further measures involve enforcing device allowlisting to prevent unauthorized connections and maintaining comprehensive logs for monitoring purposes. These steps aim to bolster security protocols and reduce the vulnerability of ATMs to jackpotting attacks.

As cyber threats continue to evolve, it is imperative for organizations to remain vigilant and proactive in safeguarding their financial assets against such sophisticated criminal activities.

The Hacker News Tags:ATM security, ATM vulnerabilities, banking security, cash dispensing, Cybercrime, Cybersecurity, FBI, financial crime, financial losses, Jackpotting, Malware, Ploutus, security measures, U.S. Department of Justice, XFS software

Post navigation

Previous Post: AI-Driven Penetration Testing with 20+ Integrated Tools
Next Post: Ransomware Attack Targets Advantest’s Network

Related Posts

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware The Hacker News
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors The Hacker News
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions The Hacker News
New Phishing Kit Targeting US and EU Enterprises New Phishing Kit Targeting US and EU Enterprises The Hacker News
Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats The Hacker News
DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News