Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FBI Warns of Ploutus Malware Draining ATMs Nationwide

FBI Warns of Ploutus Malware Draining ATMs Nationwide

Posted on February 20, 2026 By CWS

The Federal Bureau of Investigation (FBI) has issued a critical alert regarding a surge in cyber-attacks on ATMs across the United States. On February 19, 2026, the FBI released a FLASH alert highlighting the widespread use of Ploutus malware, which allows criminals to exploit software vulnerabilities and gain unauthorized access to ATM machines, leading to significant financial losses.

Ploutus Malware: A Growing Threat

Ploutus has emerged as a significant threat to financial institutions, targeting the eXtensions for Financial Services (XFS), a critical software component in ATMs. This malware enables attackers to bypass the usual authorization process that verifies transactions with banks, allowing unauthorized cash withdrawals.

According to FBI analysts, there were over 700 incidents of such ‘jackpotting’ in 2025 alone, resulting in losses exceeding $20 million. These attacks represent a departure from traditional card data theft, as they involve directly manipulating the ATM hardware to dispense cash without the need for a bank card or account.

How Ploutus Operates

Access to the ATM’s internal systems is gained by physically opening the machine, often with generic keys. Once inside, attackers can either directly install the malware onto the hard drive or replace it with a compromised one. The malware operates through XFS, enabling it to interact with the hardware even when the ATM is offline.

Experts recommend vigilance for signs of infection, such as unexpected executable files or unauthorized remote access tools. The malware often uses common names for its services to avoid detection, making it crucial for ATM operators to monitor for anomalies rigorously.

Preventative Measures and Recommendations

The FBI emphasizes the importance of robust security measures to safeguard ATMs against Ploutus. Recommended actions include upgrading standard locks, installing tamper-evident sensors, and enhancing camera surveillance. In addition, enabling disk encryption and implementing hardware device whitelisting can provide further protection.

Regular validation of ATM software against a trusted gold image, along with targeted Windows auditing, is advised. These steps can help detect unauthorized activities, such as USB insertions and file modifications. Any suspected incidents of jackpotting should be promptly reported to local FBI offices or the Internet Crime Complaint Center (IC3).

Stay informed of the latest updates by following the FBI on platforms like Google News, LinkedIn, and X, and consider setting CSN as a preferred source for security news.

Cyber Security News Tags:ATM attacks, ATM security, Cybercrime, Cybersecurity, FBI alert, financial malware, Jackpotting, malware alert, Ploutus malware, security measures

Post navigation

Previous Post: Engineers Charged in Silicon Valley Trade Secrets Case
Next Post: Anthropic Introduces Claude Code Security for AI Vulnerability Scanning

Related Posts

PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models Cyber Security News
Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware Cyber Security News
New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys Cyber Security News
Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web Cyber Security News
Chrome Security Update Patches Critical Remote Code Execution Vulnerability Chrome Security Update Patches Critical Remote Code Execution Vulnerability Cyber Security News
Claude’s New Feature Simplifies AI Memory Transfer Claude’s New Feature Simplifies AI Memory Transfer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ILSpy Site Hacked, Spreads Malware to Developers
  • Iran-Linked Cyber Attacks Target Israeli Microsoft 365
  • North Korean IT Worker Exposed by Unusual Interview Tactic
  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ILSpy Site Hacked, Spreads Malware to Developers
  • Iran-Linked Cyber Attacks Target Israeli Microsoft 365
  • North Korean IT Worker Exposed by Unusual Interview Tactic
  • Malicious PyPI AI Tool Steals Data via Trojanized Proxy
  • North Korean Hackers Exploit GitHub in South Korea Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark