{"id":3855,"date":"2015-01-08T20:20:36","date_gmt":"2015-01-08T12:20:36","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3855"},"modified":"2015-09-09T19:36:41","modified_gmt":"2015-09-09T11:36:41","slug":"atm-hacked-using-samsung-galaxy-s4-usb-port","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/01\/atm-hacked-using-samsung-galaxy-s4-usb-port\/","title":{"rendered":"ATM Hacked Using Samsung Galaxy S4 & USB Port"},"content":{"rendered":"

A pretty interesting black box daughter board attack on ATM via USB, the crowd cry ATM Hacked! Yah it was, and it was triggered using a mobile phone to actually activate the attack, showing it’s fairly complex and also abstracting the actual attacker from being physically there.<\/p>\n

\"ATM<\/p>\n

The guy carrying the black box can’t actually perform the attack without whoever has the phone trigger letting it lose.<\/p>\n

Carders have jackpotted an ATM by inserting a circuit board into the USB ports of an ATM, tricking it into spitting out cash.<\/p>\n

The technique was thought to have emulated the cash dispenser of the ATM so the brains of the machine thought everything was normal, buying additional time for the brazen crooks to make off with the cash.<\/p>\n

A Samsung Galaxy S4 was then used by a remote attacker to issue commands to the dispenser, cybercrime scribe Brian Krebs reported.<\/p>\n

NCR global security manager Charlie Harrow said the circuit board gives crime lords control, but the folks who install it are not necessarily the real perps.<\/p>\n

“… you have the Mr. Big back at the hideout who’s sending the commands, and the mules are the ones at the ATMs,” Harrow said.<\/p>\n

“So the mule who has the black box is unable to activate the attack unless he gets the command from the Mr. Big, and the mobile phone is the best way to do that.\u201d<\/p><\/blockquote>\n