SlideShare a Scribd company logo
Hack your ATM with friend's Raspberry.Py 
Alexey Osipov 
Olga Kochetova
Who are we? 
•Positive Hack Days Team 
•Authors of multiple articles and researches 
•White hats 
•CLUB-MATE addicts 
•Just cool folks
Agenda 
•Intro (little bit about ATM history) 
•Old physical stuff (Skimmers and pin sniffers) 
•Host based attacks (XFS vulnerabilities/insecurities) 
•Device-specific attacks 
•Demos
INTRO (LITTLE BIT ABOUT ATM HISTORY)
The 1stidea: no ATM –no cry 
•1939 –the 1stidea of ATM 
•The City Bank of New York rejected it 
•If you don’t have ATM, it can’t be hacked
1967 –the world’s 1stATM
Card&PIN&online&soon
Today we can use and investigate ATMs
WHY WE ARE DOING IT?
$#it happened
Banks are curious
We are curious
ATMs are hacked 
•Trojan.Skimers 
•Backdoor.Ploutus 
•Tyupkin 
•Another target attack 
•Undocumented features 
•“Top secret” data is online
ATM Jackpotting by Barnaby Jack 
•Remote controlled ATM with admin tools 
•Firmware updates 
•Dispense money
OLD PHYSICAL STUFF (SKIMMERS AND PIN SNIFFERS)
•Encrypted PIN Pad 
Motorized hybrid card readerWhat is inside
• 
Motorized hybrid card readerCard reader
Track2 is enough for transaction
PAN = the 1stpart of Track2
•Skimming 
•Shoulder-surfing, hidden camera, mirrors 
•Fake PIN pad 
•Fake ATMI need your PIN, your card and your cash
Like valid slots
The most popular devices
Converted anti-skimming
3D printing skimming
via http://krebsonsecurity.com/ Fake ATM
Your money is not yours anymore
HOW HARD TO GET INSIDE OF ATM?
-Service zone 
-Plastic cover 
-Single lock 
-Safe for money 
-Steel + concrete 
-Rotary code locks/electronic locks 
-Two types of locksATM countermeasures
How to get in
How to get in
How to get in
ATM is locked
DEMO
HARDWARE AND PREPARATIONS
-Minimal price 
-Small 
-Capable of using multiple interfacesIntent
-Raspberry Pi 
-2 USB ports 
-Ethernet 
-USB-COM converter 
-Facedancer(kudos to Travis Goodspeed) 
-Wifidongle 
-Battery =) Hardware
-PWN Pi 
-Python 
-pySerial 
-pyHID 
-pyUSB 
-TTWE framework (thx rvantonder) Software
Raspberry Pi + Python + WiFi= bingo! Our “malware” devices
HOST BASED ATTACKS (XFS VULNERABILITIES)
XFS insecurity 
Network communicationWindows-based application Configuration informationUnit #1Service provider #1Unit #2Unit #3Service provider #2Service provider #3Unit #4Service provider #4Unit #5Unit #nService provider #5Service provider #nXFS APIXFS SPIXFS managerCOMUSBCustomer/Service mode
XFS insecurity 
Windows-based application Network communication 
Configuration information 
Unit #1 
Service provider #1 
Unit #2 Unit #3 
Service provider #2 Service provider #3 
Unit #4 
Service provider #4 
Unit #5 Unit #n 
Service provider #5 Service provider #n 
XFS API 
XFS SPI 
XFS manager 
COM USB 
Customer/Service mode
XFS, PIN Keypad device 
PIN device 
–Open mode and secure mode read data 
–Export of key is not available
XFS,Identification Card Device 
IDC device 
–Read/write data 
–Insert/eject/retain cards 
–EMV reader
Cash Dispenser Device 
–Cash withdrawal without authorization 
–Cassette and cash control 
–Software safe openingXFS, Cash Dispenser Device
-Authentication? 
-Hard to get specification? 
-Exclusive access to XFS manager/service provider? XFS authentication
-Authentication? What authentication? 
-Hard to get specification? Freely available 
-Exclusive access to XFS manager/service provider? Exists, but not intended to be used for securityXFS authentication
•Early 2014 –95% of ATMs run on Windows XP 
•Support killed off in April 
•>9000 vulnerabilitiesWindows XP still alive
So?
DEMO
DEVICE-SPECIFIC ATTACKS (PHYSICAL INTERFACES COM/USB)
RS232 insecurity 
Network communicationWindows-based application Configuration informationUnit #1Service provider #1Unit #2Unit #3Service provider #2Service provider #3Unit #4Service provider #4Unit #5Unit #nService provider #5Service provider #nXFS APIXFS SPIXFS managerCOMUSBCustomer/Service mode
DinosauRS232 
•Standard interface 
•No specific drivers 
•No authorization 
•Insecure proprietary protocols (just sniff and replay)
•Direct device control 
–Command execution mitigating all host-based checks, e.g. cash withdrawal without notes counter checks 
–Execution of undocumented functions 
–Intercept unmasked sensitive data 
•Possibility of producing hardware sniffer, which can’t be detected by software meansAdvantages
•Protocols bloat 
•Specific method of integrity control 
•Short timeouts 
•Endless polling 
•New firmware version = new protocolDifficulties
DEVICE-SPECIFIC ATTACKS (COM-PROTOCOLS)
-No good tools for analysis 
-No flow control 
-No host loss detection 
-Packets 
-Fixed size 
-Start/stop bytes 
-Length prefix + dataTypical serial protocol
Life without wireshark
Typical data 
0230 
XX XX 
XX 
01 01 
02 00 
03 00 
04 00 
05 00 
06 00 
1003 
42
Typical serial protocol 
0230 
XX XX 
XX 
01 01 
02 00 
03 00 
04 00 
05 00 
06 00 
1003 
42 
-02 30 / 10 03 –start-stop sentinels 
-XX XX–op-code 
-XX –Unknown 
-01 01 … –data 
-42 –CRC8
-Request insert card 
-Acknowledge host about card inserted 
-Issue 3 separate commands to read 3 tracks 
-Issue additional commands for EMV communicationIDC device flow
-Sniff all Track data 
-Send to host fake information about inserted card 
-Abuse services existent on ATM that don’t involve cash withdrawal 
-Card to card transactions 
-PaymentsIDC device attacks
PIN device flow
-If entering PIN/encryption keys 
-Authenticate host on currently used keys 
-Send empty button press events 
-Send PIN block to host 
-If entering open string 
-Send all button press events with button values to hostPIN device flow
PIN MITM attack
-Request open mode from PIN pad when user is going to insert PIN code 
-Acknowledge host about button presses 
-Send erroneous PIN block (we don’t know keys) 
-Host refuses transaction, but attacker knows client PIN code 
-Next transaction will be unmodifiedPIN device MITM attacks
-Restart/check device 
-Dispense X notes from Y cassettes 
-Open shutter 
-Present notes to userDispenser device flow
DEMO
-No more RS232 –no malicious control 
-Any use of cryptography –is equal to good use of cryptography 
-We regret informing you that we had decided to stop producing this model and warranties for our distributors been expired (c) What big vendors think
What we think
HOW TO LIVE WITH ALL THIS?
-Service zone is important 
-Current methods of protection is not enough 
-Using execution prevention software without OS patches –is wrongConclusions
-Implement mutual authentication both for ATM computer and it’s devices 
-Make peer review of XFS standard/communication protocols 
-Service zone is as important as safe 
-Trust environment is not about ATMsProposals
Alexander Tlyapov, @Rigmar 
SCADAStrangeLove, @scadasl 
And all other guys worth mentioningKudos
Alexey Osipov, @GiftsUngiven 
Olga Kochetova, @_Endless_Quest_ Questions?
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)

More Related Content

PPTX
How to hack stuff for cash
DOCX
Atm hacking and cracking to steal money with atm backdoor default master pass...
PDF
CNIT 141: 2. Randomness
PDF
CNIT 126 9: OllyDbg
PDF
RTOS - Real Time Operating Systems
PPT
Flynn's Classification parallel processing
PDF
CNIT 141 7. Keyed Hashing
PDF
Thread
How to hack stuff for cash
Atm hacking and cracking to steal money with atm backdoor default master pass...
CNIT 141: 2. Randomness
CNIT 126 9: OllyDbg
RTOS - Real Time Operating Systems
Flynn's Classification parallel processing
CNIT 141 7. Keyed Hashing
Thread

What's hot (20)

PDF
Practical Malware Analysis: Ch 15: Anti-Disassembly
PPTX
I Hunt Sys Admins
PDF
CNIT 126 8: Debugging
PDF
cours-gratuit.com--id-12477.pdf
PDF
CNIT 126: Ch 2 & 3
PDF
Local File Inclusion to Remote Code Execution
PPTX
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
PDF
CNIT 141: 5. Stream Ciphers
PPTX
Classification of vulnerabilities
PDF
Static Analysis of Your OSS Project with Coverity
PPTX
Brute force-attack presentation
PDF
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
iOS Application Pentesting
PDF
Kamailio - Load Balancing Load Balancers
PDF
Grokking Techtalk #39: How to build an event driven architecture with Kafka ...
PDF
Web Server Hardening
PDF
Aca2 08 new
PPTX
HSM Basic Training
PDF
CNIT 141: 6. Hash Functions
Practical Malware Analysis: Ch 15: Anti-Disassembly
I Hunt Sys Admins
CNIT 126 8: Debugging
cours-gratuit.com--id-12477.pdf
CNIT 126: Ch 2 & 3
Local File Inclusion to Remote Code Execution
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
CNIT 141: 5. Stream Ciphers
Classification of vulnerabilities
Static Analysis of Your OSS Project with Coverity
Brute force-attack presentation
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
iOS Application Pentesting
Kamailio - Load Balancing Load Balancers
Grokking Techtalk #39: How to build an event driven architecture with Kafka ...
Web Server Hardening
Aca2 08 new
HSM Basic Training
CNIT 141: 6. Hash Functions

Viewers also liked (20)

PDF
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
PDF
Revisiting atm vulnerabilities for our fun and vendor’s
PDF
The Little Black Book of Scams
PDF
Leave ATM Forever Alone
PPT
Denis Baranov: Root via XSS
KEY
PresentacióN Marcos Group
PPTX
Dominican Starfish Foundation with Toni ZoBell builds another new home in the...
PDF
ICT-104 bill acceptor protocol
PDF
Secure Real Time Embedded System For ATM Using Web Server
PDF
Modern Post-Exploitation Strategies - 44CON 2012
PDF
Red teaming the CCDC
PDF
Hyosung 1800 ce-atm-machine-owners-manual
PDF
Triton rl1600-atm-owners-manual
PDF
ATM Compromise with and without Whitelisting
DOC
Embedded systems projects
PDF
merged_document_2
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
PPTX
Six Degrees of Domain Admin - BloodHound at DEF CON 24
PPT
Plastic money and digital cash sept 2012 abbl card info
PDF
When you don't have 0days: client-side exploitation for the masses
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
Revisiting atm vulnerabilities for our fun and vendor’s
The Little Black Book of Scams
Leave ATM Forever Alone
Denis Baranov: Root via XSS
PresentacióN Marcos Group
Dominican Starfish Foundation with Toni ZoBell builds another new home in the...
ICT-104 bill acceptor protocol
Secure Real Time Embedded System For ATM Using Web Server
Modern Post-Exploitation Strategies - 44CON 2012
Red teaming the CCDC
Hyosung 1800 ce-atm-machine-owners-manual
Triton rl1600-atm-owners-manual
ATM Compromise with and without Whitelisting
Embedded systems projects
merged_document_2
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Plastic money and digital cash sept 2012 abbl card info
When you don't have 0days: client-side exploitation for the masses

Similar to Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014) (20)

PPTX
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
PDF
Kochetova+osipv atm how_to_make_the_fraud__final
PDF
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
PPTX
ATM Security Workshop on GISEC 2024 Conference
PDF
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
PDF
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
PPTX
Root via sms. 4G security assessment
PDF
Electronic Access Control Security / Безопасность электронных систем контроля...
PDF
CSI - Poor Mans Guide To Espionage Gear
PDF
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
PDF
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
ODP
Wifi Security, or Descending into Depression and Drink
PPT
Attacking Embedded Devices (No Axe Required)
PDF
amrapali builders @@hacking printers.pdf
PDF
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
ODP
Cracking Into Embedded Devices - HACK.LU 2K8
PDF
Microcontroller mayhem - ECTF & USSS 2011
PPTX
ATM machine and its reverse engineering
PDF
Q180203109113
PDF
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
Kochetova+osipv atm how_to_make_the_fraud__final
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
ATM Security Workshop on GISEC 2024 Conference
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Root via sms. 4G security assessment
Electronic Access Control Security / Безопасность электронных систем контроля...
CSI - Poor Mans Guide To Espionage Gear
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
Wifi Security, or Descending into Depression and Drink
Attacking Embedded Devices (No Axe Required)
amrapali builders @@hacking printers.pdf
CODE BLUE 2014 : Physical [In]Security: It’s not ALL about Cyber by Inbar Raz
Cracking Into Embedded Devices - HACK.LU 2K8
Microcontroller mayhem - ECTF & USSS 2011
ATM machine and its reverse engineering
Q180203109113
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests

Recently uploaded (20)

PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PPTX
STEEL- intro-1.pptxhejwjenwnwnenemwmwmwm
PPTX
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PPTX
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
PPTX
Lecture-3-Computer-programming for BS InfoTech
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPTX
quadraticequations-111211090004-phpapp02.pptx
PPTX
ERP good ERP good ERP good ERP good good ERP good ERP good
PPTX
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
PDF
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
PPTX
Wireless and Mobile Backhaul Market.pptx
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PPTX
Lecture 3b C Library _ ESP32.pptxjfjfjffkkfkfk
PDF
How NGOs Save Costs with Affordable IT Rentals
PPTX
title _yeOPC_Poisoning_Presentation.pptx
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PPTX
Embedded for Artificial Intelligence 1.pptx
PDF
PPT Determiners.pdf.......................
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
STEEL- intro-1.pptxhejwjenwnwnenemwmwmwm
了解新西兰毕业证(Wintec毕业证书)怀卡托理工学院毕业证存档可查的
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
Lecture-3-Computer-programming for BS InfoTech
Dynamic Checkweighers and Automatic Weighing Machine Solutions
quadraticequations-111211090004-phpapp02.pptx
ERP good ERP good ERP good ERP good good ERP good ERP good
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
Wireless and Mobile Backhaul Market.pptx
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Lecture 3b C Library _ ESP32.pptxjfjfjffkkfkfk
How NGOs Save Costs with Affordable IT Rentals
title _yeOPC_Poisoning_Presentation.pptx
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
Embedded for Artificial Intelligence 1.pptx
PPT Determiners.pdf.......................

Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)