Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware

U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware

Posted on December 22, 2025December 22, 2025 By CWS

The U.S. Division of Justice (DOJ) has charged 54 people in a sweeping crackdown on a transnational cyber-physical assault community.

The indictments, introduced by U.S. Lawyer Lesley A. Woods, allege an enormous conspiracy involving “ATM jackpotting” to fund Tren de Aragua (TdA), a delegated International Terrorist Group.

The coordinated operation focused a complicated felony ring that deployed the infamous Ploutus malware to siphon thousands and thousands of {dollars} from ATMs throughout the US.

 location of alleged jackpotting incidents dedicated throughout the US

The Ploutus Connection

In accordance with courtroom paperwork, the attackers utilized a variant of the Ploutus malware to compromise monetary establishments.

Not like conventional skimming assaults that steal card information, “jackpotting” includes bodily intruding into the machine to pressure it to dispense money on command.

The indictment outlines a methodical course of utilized by the conspirators:

Reconnaissance: Groups scouted goal banks and Credit score Unions to evaluate exterior safety measures.

Bodily Entry: Attackers bodily opened the ATM’s hood or door.

Deployment: The malware was put in by both changing the ATM’s laborious drive with a preloaded drive or by connecting an exterior gadget, comparable to a USB drive, to the machine.

Execution: Ploutus issued unauthorized instructions to the Money Meting out Module, inflicting the machine to empty its forex.

A couple of of the alleged ATM burglaries are in progress

The malware was additionally designed to delete logs to hide the intrusion.

Federal prosecutors allege the stolen funds had been laundered to Venezuela to help TdA management. Together with the gang’s infamous head, Hector Rusthenford Guerrero Flores (a.ok.a. “Niño Guerrero”).

Amongst these charged is Jimena Romina Araya Navarro, a Venezuelan entertainer and alleged TdA chief, accused of offering materials help to the group.

“The Felony Division is not going to tolerate networks of thieves who breach the safety of our monetary system,” mentioned Appearing Assistant Lawyer Normal Matthew R. Galeotti.

In accordance with courtroom paperwork, the 54 defendants face extreme expenses starting from financial institution fraud and pc harm to offering materials help to terrorists. If convicted, they face jail phrases starting from 20 to 335 years.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:ATM, Attack, Charged, Connection, Deploying, DoJ, Hacking, Malware, Ploutus, U.S

Post navigation

Previous Post: Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
Next Post: DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks

Related Posts

Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts Cyber Security News
Massive Cyberattack Targets Trusted Platforms with Malware Massive Cyberattack Targets Trusted Platforms with Malware Cyber Security News
8000+ SmarterMail Hosts Vulnerable to RCE Attack 8000+ SmarterMail Hosts Vulnerable to RCE Attack Cyber Security News
Top 20 Most Exploited Vulnerabilities of 2025 Top 20 Most Exploited Vulnerabilities of 2025 Cyber Security News
Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News
Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News