SlideShare a Scribd company logo
Revisiting ATM
vulnerabilities for our fun and
vendor’s profit
Alexey Osipov & Olga Kochetova
Experts@Security:~# WhoAmI
• Positive Hack Days Team
• Speakers at many IT events
• Pentesters of various systems
• Authors of multiple articles, researches,
advisories
Agenda
•Overview
• What makes us roll
•Short stories
•Vendors losses
•Our frustration
•Conclusions
ATM (front view)
ATM Cabinet
ATM Safe (outside)
ATM Safe (inside)
Software Stack
Host
• MS Windows
• Device control middleware and kiosk
• Some AV/integrity control
• Video surveillance/Radmin/Old flash
player and other crap
Devices
• RTOS on strange microcontrollers
Windows XP Still Alive
•Early 2014 – 95%
of ATMs run on
Windows XP
•Support killed off
in April 2014
•>9000
vulnerabilities
Rob The Bank
BOOOoooring
Alternative News
“Average Bill”
Typical ATM contains 4 cassettes
with ~2500 notes in each one.
(5+10+20+50)x2500= US$/€ 212 500
could be stolen from ATM
during single incident.
DO NOT REPEAT IT AT HOME
Main Parts Of Everything
True Story #1
Malware
• Skimer.A -2008
• ……………………………………
• Backdoor.Ploutus – 2013-2014
• Backdoor.Padpin – 2014
• Macau Malware – 2014
• Backdoor.Tyupkin – 2014
• Trojan.Skimmer (new) – 2015
Subtotal = 16 < variants of malware
Tyupkin: Around The World In 435 Days
How It Works: Jackpotting Malware
•Access
•Infection
•Control
•Theft
How It Works: XFS
Network
communication
Windows-based
application
Configuration
information
Unit #1
Service
provider #1
Unit #2 Unit #3
Service
provider #2
Service
provider #3
Unit #4
Service
provider #4
Unit #5 Unit #6
Service
provider #5
Service
provider #6
XFS API
XFS SPI
XFS manager
COM USB
Customer/Service
mode
How It Really Works: XFS Insecurity
Network
communication
Windows-based
application
Configuration
information
Unit #1
Service
provider #1
Unit #2 Unit #3
Service
provider #2
Service
provider #3
Unit #4
Service
provider #4
Unit #5 Unit #6
Service
provider #5
Service
provider #6
XFS API
XFS SPI
XFS manager
COM USB
Customer/Service
mode
XFS, Cash Dispenser Device
•Cash withdrawal
without
authorization
•Cassette and cash
control
•Software safe
opening
XFS, Identification Card Device
•Insert/eject/retain
cards
•Read/write data
•EMV reader (one can
access payment
history stored in
chip)
XFS, PIN Keypad Device
• Export of the key is not
available
• Open mode and secure mode
read data
(for stealing PIN: an ATM
software sets “secure mode”
for entering PIN, and intruder
changes it to “open mode” to
capture the PIN)
PIN Device Flow
PIN Device Flow
-If entering PIN/encryption keys
-Authenticate host on currently used
keys
-Send empty button press events
-Send PIN block to host
-If entering open string
-Send all button press events with
button values to host
PIN MITM Attack
PIN Device MITM Attacks
-Request open mode from PIN pad when
user is going to insert PIN code
-Acknowledge host about button
presses
-Send erroneous PIN block (we don’t
know keys)
-Host refuses transaction, but
attacker knows client PIN code
-Next transaction will be unmodified
XFS Authentication
•Authentication? What
authentication?
•Exclusive access to XFS
manager/service provider?
Exists, but not intended to be
used for security
XFS Authentication
•Authentication? What
authentication?
•Exclusive access to XFS
manager/service provider?
Exists, but not intended to be
used for security
XFS specification
•Where?
XFS specification
•Where?
•“We don’t know yet” (c)
but try google “XFS ATM”
True Story #2
http://krebsonsecurity.com/2015/01/thieves-jackpot-atms-with-black-box-attack/
Black Box Attacks
•Directly control ATM
How It Works: Black Box Attacks
•Dispenser
•Card reader
•Encrypted
PIN-pad
•Sensors
How It Works: Physical Interfaces COM/USB
Network
communication
Windows-based
application
Configuration
information
Unit #1
Service
provider #1
Unit #2 Unit #3
Service
provider #2
Service
provider #3
Unit #4
Service
provider #4
Unit #5 Unit #6
Service
provider #5
Service
provider #6
XFS API
XFS SPI
XFS manager
COM USB
Customer/Service
mode
How It Really Works: COM/USB Insecurity
Network
communication
Windows-based
application
Configuration
information
Unit #1
Service
provider #1
Unit #2 Unit #3
Service
provider #2
Service
provider #3
Unit #4
Service
provider #4
Unit #5 Unit #6
Service
provider #5
Service
provider #6
XFS API
XFS SPI
XFS manager
COM USB
Customer/Service
mode
DinosauRS232
•Standard interface
•No specific drivers
•No authorization
•Insecure proprietary protocols
(just sniff and replay)
Advantages Of COM/USB
•Direct device control
•Execution of undocumented
functions
•Intercept unmasked sensitive data
•Possibility of producing
hardware sniffer, which can’t
be detected by visual
examination
Advantages Of COM/USB
•Direct device control
• Command execution mitigating all host-
based checks, e.g. cash withdrawal
without notes counter checks
• 02 30 / 10 03 – start-stop sentinels
• XX XX– op-code
• XX – Unknown
• 01 01 … – data
• 42 – CRC8
02
30
XX
XX
X
X
01 01
02 00
03 00
04 00
05 00
06 00
10
03
42
We Had Two Libs Of Python, 35
USD, Power Bank And Wi-Fi Dongle
RS232 vs USB-HID
# ls /dev/tty*
import serial
ser = serial.Serial('/dev/ttyUSB0')
ser.write("0230XXXXXX01010200
0300040005000600100342“.deco
de(‘hex’))
ser.close()
# lsusb
import hid
h = hid.device(0x????, 0x20)
h.write([0x80] + map(ord,
"0230XXXXXX0101020003000400
05000600100342“.decode(‘hex’)))
h.close()
Demo
https://youtu.be/4TXnIcjn1xc
True Story #3
Hijacking ATM Control/Processing Host
•Carbanac – 2015
•MitM – 2015
Possible connections to processing
center
•VPN (Hardware/Software)
•SSL
•MAC-authentication
•Firewall
•IDS
ATMs In Internet
Pakistan 1458
Russia 571
Venezuela 28
Tajikistan 20
Ukraine 16
Armenia 11
Brazil 1
Zambia 1
Sierra-Leone 1
Thailand 1
Who Cares
Card Reader/ Writer/ Skimmer
Sensitive data disclosure,
e.g. track data in plaintext,
is possible with reading
command sending to COM/USB
port directly. This attack is
possible with ATM's computer
or with any external device,
which is connected to the card
reader's COM/USB port.
What Big Vendors Think
The vulnerabilities are essentially normal
specifications of the card readers and not
unexpected. As long as the ATM is running within
normal parameters, these problems cannot
possibly occur.(c)
However this vulnerability is inherent in the
USB technology and is expected be mitigated by
the use of appropriate physical controls on
access to the ATM top box.(c)
Quick Cash And Full Control
Control cash dispenser module by
unauthorized application or user.
An attacker has possibility to
control cash dispenser by sending
command to COM/USB port directly,
including dispensing and
presenting commands. This attack
is possible with ATM's computer or
with any external device, which is
connected to the dispenser's
COM/USB port.
What Big Vendors Think
“We regret informing you that we had
decided to stop producing this model
more than 3 years ago and warranties
for our distributors been expired.”
What About Cryptography
Dispenser “Half” Security Level:
Any use of cryptography – is NOT
equal to good use of
cryptography
Achievement Unlocked
Dispenser High Security Level:
Dispenser Upgrade Pack is
released and available from
the vendor_name download
center, and it will be
included as standard in the
next release of XFS.(c)
No More SSL
•OpenSSL in ATM/POS software
•Misconfiguration
•PCI/PA DSS v.3.1
SSL >> TLS
How Live With All This
Conclusions
• Current vulnerabilities in ATMs
are low hanging fruits, that are
ready for criminals
• Vendors are not that interested in
fixing. Increase cost, decrease
profit
• Banks are not that competent to
know what to do
Proposals
• Implement mutual authentication both
for ATM computer and it’s devices
• Make peer review of XFS
standard/communication protocols
• Authenticated dispense from
processing center
• Trust environment is not about ATMs
• Implement regular security
assessments and pentest of ATMs
Kudos
Alexander Tlyapov, @_Rigmar_
And all other guys worth mentioning
Questions?
Alexey Osipov
@GiftsUngiven, GiftsUngiv3n@gmail.com
Olga Kochetova
@_Endless_Quest_, Olga.v.Kochetova@gmail.com

More Related Content

PDF
Leave ATM Forever Alone
PDF
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
PPTX
How to hack stuff for cash
PDF
ATM Compromise with and without Whitelisting
DOCX
Atm hacking and cracking to steal money with atm backdoor default master pass...
PDF
DTS Solution - Hacking ATM Machines - The Italian Job Way
PDF
Hacking ATM machines for fun and profit!
PDF
Secure Real Time Embedded System For ATM Using Web Server
Leave ATM Forever Alone
Hack your ATM with friend's Raspberry.Py (Black Hat EU-2014)
How to hack stuff for cash
ATM Compromise with and without Whitelisting
Atm hacking and cracking to steal money with atm backdoor default master pass...
DTS Solution - Hacking ATM Machines - The Italian Job Way
Hacking ATM machines for fun and profit!
Secure Real Time Embedded System For ATM Using Web Server

What's hot (20)

PPTX
Atm card skimming &amp; pin capturing awareness
PDF
EntroWatch V1.2 (1)
PDF
ATM Skimming Devices
PDF
ATM Awareness Guide
PPT
Atm Presentationgp2
PDF
[CB19] Hardware Wallet Security
PDF
Atm awareness guide
PPTX
Thesis presentation
PDF
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
PDF
Skimmer Presentation V1 230109 Ppt
PPTX
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
PDF
System 6000
PDF
Kavya racharla ndh-naropanth_fin
PPTX
Communication in automatic teller machine (atm)
PDF
Yunusov babin 7 sins pres atm v2
PDF
Atm presentation
PPT
Elevator controller for multi story building security
PDF
Cant touch this: cloning any Android HCE contactless card
PPTX
RCS Demo HackingTeam
PDF
Teller pass slides
Atm card skimming &amp; pin capturing awareness
EntroWatch V1.2 (1)
ATM Skimming Devices
ATM Awareness Guide
Atm Presentationgp2
[CB19] Hardware Wallet Security
Atm awareness guide
Thesis presentation
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
Skimmer Presentation V1 230109 Ppt
[CB16] ATMS how to break them to stop the fraud. by Olga Kochetova & Alexey O...
System 6000
Kavya racharla ndh-naropanth_fin
Communication in automatic teller machine (atm)
Yunusov babin 7 sins pres atm v2
Atm presentation
Elevator controller for multi story building security
Cant touch this: cloning any Android HCE contactless card
RCS Demo HackingTeam
Teller pass slides
Ad

Viewers also liked (9)

PDF
Как (не) взломать банкомат.
PDF
G01.2012 magic quadrant for user authentication
PDF
Проблемы безопасности ATM и способы их решения.
PDF
Hyosung 1800 ce-atm-machine-owners-manual
PDF
Triton rl1600-atm-owners-manual
PDF
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
PDF
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
PDF
Банкоматы: сравнительное юзабилити-исследования UL
PPTX
Kali net hunter
Как (не) взломать банкомат.
G01.2012 magic quadrant for user authentication
Проблемы безопасности ATM и способы их решения.
Hyosung 1800 ce-atm-machine-owners-manual
Triton rl1600-atm-owners-manual
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
Банкоматы: сравнительное юзабилити-исследования UL
Kali net hunter
Ad

Similar to Revisiting atm vulnerabilities for our fun and vendor’s (20)

PDF
Kochetova+osipv atm how_to_make_the_fraud__final
PPTX
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
PPTX
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
PDF
Shameful secrets of proprietary network protocols
PPTX
BSides London 2015 - Proprietary network protocols - risky business on the wire.
PDF
Offline attacks-and-hard-disk-encription
PPTX
ATM Security Workshop on GISEC 2024 Conference
PDF
DEF CON 27 - ANISH ATHALYE - Strong Isolation
PPTX
Dealing with legacy code
PPTX
How to Hack a Telecom and Stay Alive
PPTX
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
PDF
Sergey Gordeychik - How to hack a telecom and stay alive
PDF
How to hack a telecom and stay alive
PPTX
How to hack a telecommunication company and stay alive. Sergey Gordeychik
PDF
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
PDF
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
PDF
Breaking Smart Speakers: We are Listening to You.
PPTX
Software Security and IDS.pptx
Kochetova+osipv atm how_to_make_the_fraud__final
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
Shameful secrets of proprietary network protocols
BSides London 2015 - Proprietary network protocols - risky business on the wire.
Offline attacks-and-hard-disk-encription
ATM Security Workshop on GISEC 2024 Conference
DEF CON 27 - ANISH ATHALYE - Strong Isolation
Dealing with legacy code
How to Hack a Telecom and Stay Alive
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Sergey Gordeychik - How to hack a telecom and stay alive
How to hack a telecom and stay alive
How to hack a telecommunication company and stay alive. Sergey Gordeychik
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Breaking Smart Speakers: We are Listening to You.
Software Security and IDS.pptx

Recently uploaded (20)

PPTX
chapter8-180915055454bycuufucdghrwtrt.pptx
PPTX
Introduction-to-Food-Packaging-and-packaging -materials.pptx
PPTX
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
PPTX
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx
PPTX
Module_4_Updated_Presentation CORRUPTION AND GRAFT IN THE PHILIPPINES.pptx
PPTX
Relationship Management Presentation In Banking.pptx
PPTX
Anesthesia and it's stage with mnemonic and images
PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
fundraisepro pitch deck elegant and modern
PPT
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
Lesson-7-Gas. -Exchange_074636.pptx
PPTX
water for all cao bang - a charity project
PPTX
Project and change Managment: short video sequences for IBA
PPTX
Human Mind & its character Characteristics
PPTX
Tour Presentation Educational Activity.pptx
PPTX
PurpoaiveCommunication for students 02.pptx
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
PPTX
Hydrogel Based delivery Cancer Treatment
DOC
LSTM毕业证学历认证,利物浦大学毕业证学历认证怎么认证
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
chapter8-180915055454bycuufucdghrwtrt.pptx
Introduction-to-Food-Packaging-and-packaging -materials.pptx
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx
Module_4_Updated_Presentation CORRUPTION AND GRAFT IN THE PHILIPPINES.pptx
Relationship Management Presentation In Banking.pptx
Anesthesia and it's stage with mnemonic and images
The Effect of Human Resource Management Practice on Organizational Performanc...
fundraisepro pitch deck elegant and modern
The Effect of Human Resource Management Practice on Organizational Performanc...
Lesson-7-Gas. -Exchange_074636.pptx
water for all cao bang - a charity project
Project and change Managment: short video sequences for IBA
Human Mind & its character Characteristics
Tour Presentation Educational Activity.pptx
PurpoaiveCommunication for students 02.pptx
2025-08-10 Joseph 02 (shared slides).pptx
Hydrogel Based delivery Cancer Treatment
LSTM毕业证学历认证,利物浦大学毕业证学历认证怎么认证
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx

Revisiting atm vulnerabilities for our fun and vendor’s

  • 1. Revisiting ATM vulnerabilities for our fun and vendor’s profit Alexey Osipov & Olga Kochetova
  • 2. Experts@Security:~# WhoAmI • Positive Hack Days Team • Speakers at many IT events • Pentesters of various systems • Authors of multiple articles, researches, advisories
  • 3. Agenda •Overview • What makes us roll •Short stories •Vendors losses •Our frustration •Conclusions
  • 8. Software Stack Host • MS Windows • Device control middleware and kiosk • Some AV/integrity control • Video surveillance/Radmin/Old flash player and other crap Devices • RTOS on strange microcontrollers
  • 9. Windows XP Still Alive •Early 2014 – 95% of ATMs run on Windows XP •Support killed off in April 2014 •>9000 vulnerabilities
  • 13. “Average Bill” Typical ATM contains 4 cassettes with ~2500 notes in each one. (5+10+20+50)x2500= US$/€ 212 500 could be stolen from ATM during single incident.
  • 14. DO NOT REPEAT IT AT HOME
  • 15. Main Parts Of Everything
  • 17. Malware • Skimer.A -2008 • …………………………………… • Backdoor.Ploutus – 2013-2014 • Backdoor.Padpin – 2014 • Macau Malware – 2014 • Backdoor.Tyupkin – 2014 • Trojan.Skimmer (new) – 2015 Subtotal = 16 < variants of malware
  • 18. Tyupkin: Around The World In 435 Days
  • 19. How It Works: Jackpotting Malware •Access •Infection •Control •Theft
  • 20. How It Works: XFS Network communication Windows-based application Configuration information Unit #1 Service provider #1 Unit #2 Unit #3 Service provider #2 Service provider #3 Unit #4 Service provider #4 Unit #5 Unit #6 Service provider #5 Service provider #6 XFS API XFS SPI XFS manager COM USB Customer/Service mode
  • 21. How It Really Works: XFS Insecurity Network communication Windows-based application Configuration information Unit #1 Service provider #1 Unit #2 Unit #3 Service provider #2 Service provider #3 Unit #4 Service provider #4 Unit #5 Unit #6 Service provider #5 Service provider #6 XFS API XFS SPI XFS manager COM USB Customer/Service mode
  • 22. XFS, Cash Dispenser Device •Cash withdrawal without authorization •Cassette and cash control •Software safe opening
  • 23. XFS, Identification Card Device •Insert/eject/retain cards •Read/write data •EMV reader (one can access payment history stored in chip)
  • 24. XFS, PIN Keypad Device • Export of the key is not available • Open mode and secure mode read data (for stealing PIN: an ATM software sets “secure mode” for entering PIN, and intruder changes it to “open mode” to capture the PIN)
  • 26. PIN Device Flow -If entering PIN/encryption keys -Authenticate host on currently used keys -Send empty button press events -Send PIN block to host -If entering open string -Send all button press events with button values to host
  • 28. PIN Device MITM Attacks -Request open mode from PIN pad when user is going to insert PIN code -Acknowledge host about button presses -Send erroneous PIN block (we don’t know keys) -Host refuses transaction, but attacker knows client PIN code -Next transaction will be unmodified
  • 29. XFS Authentication •Authentication? What authentication? •Exclusive access to XFS manager/service provider? Exists, but not intended to be used for security
  • 30. XFS Authentication •Authentication? What authentication? •Exclusive access to XFS manager/service provider? Exists, but not intended to be used for security
  • 32. XFS specification •Where? •“We don’t know yet” (c) but try google “XFS ATM”
  • 36. How It Works: Black Box Attacks •Dispenser •Card reader •Encrypted PIN-pad •Sensors
  • 37. How It Works: Physical Interfaces COM/USB Network communication Windows-based application Configuration information Unit #1 Service provider #1 Unit #2 Unit #3 Service provider #2 Service provider #3 Unit #4 Service provider #4 Unit #5 Unit #6 Service provider #5 Service provider #6 XFS API XFS SPI XFS manager COM USB Customer/Service mode
  • 38. How It Really Works: COM/USB Insecurity Network communication Windows-based application Configuration information Unit #1 Service provider #1 Unit #2 Unit #3 Service provider #2 Service provider #3 Unit #4 Service provider #4 Unit #5 Unit #6 Service provider #5 Service provider #6 XFS API XFS SPI XFS manager COM USB Customer/Service mode
  • 39. DinosauRS232 •Standard interface •No specific drivers •No authorization •Insecure proprietary protocols (just sniff and replay)
  • 40. Advantages Of COM/USB •Direct device control •Execution of undocumented functions •Intercept unmasked sensitive data •Possibility of producing hardware sniffer, which can’t be detected by visual examination
  • 41. Advantages Of COM/USB •Direct device control • Command execution mitigating all host- based checks, e.g. cash withdrawal without notes counter checks • 02 30 / 10 03 – start-stop sentinels • XX XX– op-code • XX – Unknown • 01 01 … – data • 42 – CRC8 02 30 XX XX X X 01 01 02 00 03 00 04 00 05 00 06 00 10 03 42
  • 42. We Had Two Libs Of Python, 35 USD, Power Bank And Wi-Fi Dongle
  • 43. RS232 vs USB-HID # ls /dev/tty* import serial ser = serial.Serial('/dev/ttyUSB0') ser.write("0230XXXXXX01010200 0300040005000600100342“.deco de(‘hex’)) ser.close() # lsusb import hid h = hid.device(0x????, 0x20) h.write([0x80] + map(ord, "0230XXXXXX0101020003000400 05000600100342“.decode(‘hex’))) h.close()
  • 46. Hijacking ATM Control/Processing Host •Carbanac – 2015 •MitM – 2015
  • 47. Possible connections to processing center •VPN (Hardware/Software) •SSL •MAC-authentication •Firewall •IDS
  • 48. ATMs In Internet Pakistan 1458 Russia 571 Venezuela 28 Tajikistan 20 Ukraine 16 Armenia 11 Brazil 1 Zambia 1 Sierra-Leone 1 Thailand 1
  • 50. Card Reader/ Writer/ Skimmer Sensitive data disclosure, e.g. track data in plaintext, is possible with reading command sending to COM/USB port directly. This attack is possible with ATM's computer or with any external device, which is connected to the card reader's COM/USB port.
  • 51. What Big Vendors Think The vulnerabilities are essentially normal specifications of the card readers and not unexpected. As long as the ATM is running within normal parameters, these problems cannot possibly occur.(c) However this vulnerability is inherent in the USB technology and is expected be mitigated by the use of appropriate physical controls on access to the ATM top box.(c)
  • 52. Quick Cash And Full Control Control cash dispenser module by unauthorized application or user. An attacker has possibility to control cash dispenser by sending command to COM/USB port directly, including dispensing and presenting commands. This attack is possible with ATM's computer or with any external device, which is connected to the dispenser's COM/USB port.
  • 53. What Big Vendors Think “We regret informing you that we had decided to stop producing this model more than 3 years ago and warranties for our distributors been expired.”
  • 54. What About Cryptography Dispenser “Half” Security Level: Any use of cryptography – is NOT equal to good use of cryptography
  • 55. Achievement Unlocked Dispenser High Security Level: Dispenser Upgrade Pack is released and available from the vendor_name download center, and it will be included as standard in the next release of XFS.(c)
  • 56. No More SSL •OpenSSL in ATM/POS software •Misconfiguration •PCI/PA DSS v.3.1 SSL >> TLS
  • 57. How Live With All This
  • 58. Conclusions • Current vulnerabilities in ATMs are low hanging fruits, that are ready for criminals • Vendors are not that interested in fixing. Increase cost, decrease profit • Banks are not that competent to know what to do
  • 59. Proposals • Implement mutual authentication both for ATM computer and it’s devices • Make peer review of XFS standard/communication protocols • Authenticated dispense from processing center • Trust environment is not about ATMs • Implement regular security assessments and pentest of ATMs
  • 60. Kudos Alexander Tlyapov, @_Rigmar_ And all other guys worth mentioning
  • 61. Questions? Alexey Osipov @GiftsUngiven, GiftsUngiv3n@gmail.com Olga Kochetova @_Endless_Quest_, Olga.v.Kochetova@gmail.com