Posts: 14,425
Threads: 9,512
Thanks Received: 9,034 in 7,184 posts
Thanks Given: 9,805
Joined: 12 September 18
03 April 19, 07:00
Quote:
What does it usually take to implement new protective technologies? It takes understanding of the threat model, a reliable solution, and approval from the budget holders. To get this approval you usually need to explain how an innovation will affect your business: its benefits, basically, preferably in terms of monetary value. That is why we are announcing a new security solution for ATM protection that has monetary benefits everyone can clearly see.
The problem
How do cybercriminals usually liberate money from an ATM? Cutlet Maker and WinPot attacks require the attacker to open the ATM door and connect a laptop to the ATM’s USB port. We have seen cases of malefactors literally drilling into an ATM to connect their equipment to some technological bus connector, or plug in some hacking equipment. Finally, criminals can actually steal the ATM and try to break into its cash cassettes somewhere safe.
The common part of those methods is that they require physical access to the internals of the machine. That is why we decided to add an additional layer to existing security solutions: a physical layer.
Continue Reading