Future ATM Attacks Report Eng
Future ATM Attacks Report Eng
Future ATM Attacks Report Eng
AGAINST AUTHENTICATION
SYSTEMS, COMMUNICATING
WITH ATMS
CONTENT
INTRODUCTION..........................................................................................3
DESCRIPTION OF THE CURRENT AND FUTURE
AUTHENTICATION SERVICES................................................................ 4
DESCRIPTION AND DIAGRAMS OF INFRASTRUCTURES AND
ATTACK TARGETS........................................................................................ 8
POTENTIAL ATTACKS TECHNIQUES..................................................12
Attacks on hardware components....................................................................12
Attacks on software components..................................................................... 17
Attacks on the network layer...............................................................................21
POTENTIAL COUNTERMEASURES..................................................... 25
General recommendations..................................................................................25
Recommendations for preventing attacks on hardware
components.............................................................................................................. 26
Recommendations for preventing attacks on software
components.............................................................................................................. 26
Recommendations for preventing attacks affecting the network
communications..................................................................................................... 26
Recommendations for personnel.....................................................................27
Recommendations for clients.............................................................................27
Recommendations in case of incident............................................................27
ABOUT AUTHORS.....................................................................................28
ABOUT COMPANY....................................................................................30
INTRODUCTION
ATMs have been under attack since at least 2008-2009, when the first
malicious program targeting ATM Backdoor.Win32.Skimer was discovered.
The goal of every fraudster is to obtain money, directly or indirectly. When
we talk about fraud in relation to ATMs we can generally divide it into two
main categories:
1. Direct losses, when an attacker obtains money from an ATM cash
dispenser.
2. Indirect losses, when the aim of the attacker is to obtain unique
cardholder data from the ATMs users (including Track2 - the
magnetic stripe data, the PIN personal identification number
used as a password, or newly appearing authentication methods
biometric data. Attacks of the latter type of authentication can
increase risks of identity theft).
To achieve their goals, attackers must solve one of these key challenges
they must either bypass the customer authentication mechanisms, or
bypass the ATMs security mechanisms. Criminals already use various
methods to get profit from ATMs, such as ram-raiding and gas explosive
attacks, or use skimmers and shimmers to attack customers. From our
observations, criminal methods are shifting from physical attacks to
so-called logical attacks. These can be described as non-destructive
attacks on software or hardware implementations used in ATMs or their
network. This provides fraudsters with more opportunities to leave their
attack hidden for a longer time and thus increase the severity of the losses.
and not capable of being surreptitiously stolen via the Internet. The
strong authentication procedure should be designed in such a way
as to protect the confidentiality of the authentication data.3
The high rate of development of new technologies, and the development
of new information security mechanisms, is leading to the evolution and
expansion of the following authentication methods for ATMs:
1. Contactless authentication
The most promising technology is NFC (Near Field Communication),
which makes it possible to use radio frequency as an authentication
method. NFC-chips are a form of passive data storage, which can be read,
and under some circumstances written to, by an NFC-device. The chip
can securely store personal data such as debit and credit card information,
PINs and loyalty program data. NFC-chips can be fitted in smartphones to
store bank card data, passports to store ID and biometric data, and watches
or even the human body (in the hand, for example) to store various data.
An NFC-device works in reader-writer mode, it is able to receive and
transmit data at the same time. Thus, it can check for potential collisions
if the received signal frequency does not match the transmitted signals
frequency.
NFC is fast and easy to use but insecure and vulnerable to various attacks,
e.g. passive relay attack.4
2. Biometric authentication
Biometric authentication technologies are being actively implemented in
banking solutions, both on a commercial scale and at an early level of
concept development. Biometrics refers to the automatic identification
of clients based on their psychological, morphological or behavioral
characteristics. Various types of biometric systems are being used for real
time identification.
These may include:
Iris recognition;
Fingerprint recognition;
Palm recognition;
Vein recognition;
Face recognition;
3
Report: European Central Bank, January 2013. Recommendations for the security of internet
payments, final version after public consultation. Available at: https://www.ecb.europa.eu/pub/pdf/
other/recommendationssecurityinternetpaymentsoutcomeofpcfinalversionafterpc201301en.pdf
(Accessed 29/06/2016)
4
Report: Practical Experiences on NFC RelayAttacks with Android: Virtual Pickpocketing Revisited.
Available
at:
https://conference.hitb.org/hitbsecconf2015ams/wp-content/uploads/2014/12/
WHITEPAPER-Relay-Attacks-in-EMV-Contactless-Cards.pdf (Accessed 05/07/2016)
Voice recognition;
Other (for example, signature recognition).
Some ATMs (so-called Biometric ATMs) also use biometric data as
multifactor authentication (in other words card + PIN + biometrics) or as
combination of card or PIN. Some of these recognition methods might
be used as single or multi factor biometric authentication. It could be
used for online or offline authentication using smart cards or for cardless
authentication.
Offline authentication using a smart card means the ability to authenticate
the cardholder without connection to a backend biometric database. The
template of biometric data is stored on the smart card chip according to
so-called match-on-card technology.
The main reason for introducing biometric data recognition is to increase
security and to achieve strong authentication. But various biometric
security systems could be bypassed and sometimes in a simple way, for
example, using images of the victims. One such example was delivered
at the December 2014 Chaos Communication Congress, by security
researcher Jan Krissler.5
The smart cards are sensitive to different types of attacks6, even to man-inthe-middle attack.7
3. Authentication with a one-time password
The theory behind using two-factor authentication is the need to enter
a one-time session key, also called a one-time password an OTP, in
addition to a user login and password.
An OTP can be used to withdraw money without a card the password is
delivered via SMS and should be used instead of a bankcard. This service
is also known as Cellphone Banking. Various banks around the world, for
example, Spains Banco Sabadell8 launched an ATM withdrawal service that
allows clients to withdraw cash from their mobile phones. The client sends
5
Web-site: Swati Khandelwal, 2015, Hacker Finds a Simple Way to Fool IRIS Biometric Security
Systems. Available at: http://thehackernews.com/2015/03/iris-biometric-security-bypass.html
(Accessed 05/07/2016) The entire presentation in German, with Q&A, is available on web-site https://
www.youtube.com/watch?v=pIY6k4gvQsY (Accessed 05/07/2016)
6
Report: Benoit Vibert, Christophe Rosenberger, Alexandre Ninassi, 2013. Security and
Performance Evaluation Platform of Biometric Match On Card. Available at: https://hal.archivesouvertes.fr/hal-00848330/document (Accessed 05/07/2016)
7
Report: Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, Ross Anderson,
2014. Chip and Skim: cloning EMV cards with the pre-play attack. Available at: http://sec.cs.ucl.ac.uk/
users/smurdoch/papers/oakland14chipandskim.pdf (Accessed 05/07/2016)
8
Web-site: Vaseem Khan, October, 2013. 4 Cardless Ways of Withdrawing Cash from ATMs.
Available at: https://letstalkpayments.com/4-cardless-ways-withdrawing-cash-atms/ (Accessed
29/06/2016)
a request to the bank and receives a code via SMS. Then the client simply
enters the code into an ATM to withdraw the cash, or sends the code to
another persons phone, making it a person-to-person payment system.
Now, the SMS-banking service is widely used for approving payments, or
online transactions.
An OTP also can be used in mobile banking applications.
But delivering OTP via SMS is not so secure. Firstly, the OTP in the SMS
might be obtained by an attacker via social engineering techniques, such
as a fake call or SIM swap attack. Secondly, the SMS with the OTP might be
extracted by an attacker via physical access to the phone, mobile phone
trojans or wireless interception.9
Another method is to use a personal electronic token with a cryptographic
algorithm to generate an OTP. That password can be used to confirm
banking transactions online and for the verification of 3D-secure
technology transactions. MasterCard has launched a Chip Authentication
Program (CAP) for using EMV banking smartcards for authenticating clients
and transactions during online and telephone banking. In the future this
will also be implemented in ATMs.
9
Report: Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert, 2014.
Available
at:
https://www.eecs.tu-berlin.de/fileadmin/f4/TechReports/2014/tr_2014-02.pdf
(Accessed 06/07/2016)
10
Report: DCB Bank, April 2, 2016. DCB Bank launches Indias first Aadhaar Number and
Aadhar Biometric enabled ATM. Available at: http://www.dcbbank.com/pdfs/India_s_first_Aadhaar_
enabled_ATM_launched_by_DCB_Bank_Press_Release_3_April_2016.pdf (Accessed 29/06/2016)
10
11
11
Web-site: Olga Kochetova, February 26, 2016. Malware and non-malware ways for ATM
jackpotting. Extended cut. Available at: https://securelist.com/analysis/publications/74533/malwareand-non-malware-ways-for-atm-jackpotting-extended-cut/ (Accessed 29/06/2016)
12
13
14
15
16
Malware attacks.
The software is subject to zero-day vulnerabilities and may become easy
prey for malware. Current state-of-the-art attacks in the malware world
include several different approaches.
1. Memory scrappers
The main feature of these methods is memory scrapping/searching for
sensitive customer information. This information includes Track2 data,
personal information, and transaction history etc.
According to information provided by law enforcement agencies (LEAs),
and the victims themselves, total financial losses from a Carbanak attack
could be as a high as $1 billion12 with more than 100 targets.
2. API-specific malware
The next generation of malware is leveraging the standard libraries and
API of ATM vendors. The very same libraries that are used for legitimate
interaction with an ATM can also be abused to obtain sensitive information
about clients, or to interact with hardware to conduct fraud (including
the unauthorized dispensing of money). It is safe to assume, that if a
service engineer or authorized customer can do something with an ATM,
an attacker can also do it without being checked if the software is not
produced with security in mind.
XFS (CEN/XFS, and earlier WOSA/XFS), or the eXtensions for financial
services, is a standard that provides client-server architecture for financial
applications on the Microsoft Windows platform, especially peripheral
devices such as ATMs. XFS is intended to standardize software so that it
can work on any equipment regardless of the manufacturer, and provides
a common API for this purpose.
12
Web-site: Kaspersky Labs Global Research & Analysis Team, Febraury 16, 2015. The Great Bank
Robbery: the Carbanak APT. Available at: https://securelist.com/blog/research/68732/the-greatbank-robbery-the-carbanak-apt/ (Accessed 29/06/2016)
17
18
Figure 7 PIN device operation flow in open mode and secure mode
19
13
Web-site: Kaspersky Labs Global Research & Analysis Team, Olga Kochetova, Alexey Osipov,
May 17, 2016. ATM Infector. Available at: https://securelist.com/blog/research/74772/atm-infector/
(Accessed 29/06/2016)
14
Web-site: Mathew J. Schwartz, April 2016, Bangladesh Bank Attackers Hacked SWIFT
Software. Available at: http://www.bankinfosecurity.com/report-swift-hacked-by-bangladesh-bankattackers-a-9061 (Accessed 08/07/2016)
20
21
Man-in-the-middle attacks.
As an entry point of attack intruders should use security or network
misconfigurations on the ATM, or its externally available vulnerabilities, to
conduct man-in-the-middle attacks.
There are several ways an attacker can compromise the network layer:
1. Lack of network segregation between ATMs
After getting ATM under their control, an attacker can gain access to other
ATMs, which communicate with the compromised one. The attacker can
then withdraw money from all hacked ATMs.
2. Lack of network protection between the ATM and the processing
center
If the channel of interaction between the ATM and the processing center is
not protected, and the processing of the server contains vulnerabilities, an
attacker can gain access not only to a single ATM, but also to the processing
center or other banks services.
3. Lack of network segregation between an ATM and other parts of the
banks internal network
An attacker can gain access not only to the processing center, but also
to the ATMs Active Directory host, to the ATM administrator host or even
deeper to bank office hosts or other banks authentication systems
because of network misconfigurations and segregation flaws.
The unsecure networks communications of ATMs with other banking
components allows an attacker to intercept and modify the data being
transmitted. This data may also be the authentication information that is
unique to each client. If an ATM is under their control, an attacker can
implement software interception, and if the ATMs casing is not hardened,
physical interception with the devices is also possible.
The description of a man-in-the-middle network attack is provided in
the document Description of attacks and countermeasures.
22
23
24
POTENTIAL COUNTERMEASURES
ATM security is a complex problem that should be addressed on different
levels. Many problems can be fixed only by ATM manufacturers or vendors.
Many countermeasures already exists and should be put to use by bank
(or business structure which provide servicing of ATMs). Some can be
mitigated by ordinary customers of ATMs.
The following lists include advices and possible countermeasures against
attacks on ATM components (i.e. hardware, software and network). These
countermeasures can effectively decrease risk of successful attacks and
thus the fraud losses.
General recommendations
Conduct regular ATM security assessments
Monitor the situation on the black market (e.g. with Threat
Intelligence reports)
Conduct regular visual inspections of ATMs
Mount video surveillance cameras inside and outside the ATM top
box
Enable all current security mechanisms implemented by
manufacturers
Use modern anti-fraud systems designed to prevent, detect and
block fraudulent payment transactions
Use additional authentication factors to confirm the financial
transactions
Use ATM monitoring systems
Use Intrusion detection system/ intrusion prevention systems
Implement organizational and technical measures to protect the
ATM top box and external communication lines (including wireless)
Implement organizational and technical measures to protect the
ATM top box
Encrypt data in-transit
Use the technical means to protect the ATM - alarm system, vibration
sensors, gas analysing system, drilling detection systems
Use system to control unauthorized access to ATM units with
possibility to break connection to unit (USB/SDC/COM connections)
25
26
27
ABOUT AUTHORS
Olga Kochetova
Olga is interested in how various devices
interact with cash or plastic cards. She
is a senior specialist for the penetration
testing team at Kaspersky Lab, providing
security services, such as threat
intelligence, penetration testing, ATM/
POS security assessments, application
security assessments and more. She
has more than five years experience in
information security and more than four
years experience in practical security
assessment. Olga has authored multiple
articles and webinars about ATM security.
She is also the author of advisories about
various vulnerabilities for major ATM vendors and has been a speaker
at international conferences, including Black Hat Europe, Hack in Paris,
Positive Hack Days, Security Analyst Summit, Nuit Du Hack and others.
Alexey Osipov
Alexey is a lead expert on the penetration
testing team at Kaspersky Lab, providing
security services such as threat
intelligence, penetration testing, ATM/
POS security assessments, application
security assessment and more. He has
more than five years of experience in
information security and more than four
years experience in practical security
assessment. He is the author of a variety
of techniques and utilities exploiting
vulnerabilities in XML protocols, telecom
networking and ATM security, as well as
advisories about various vulnerabilities
for major ATM vendors. He has been a speaker at international security
conferences, including Black Hat Europe and Hack in Paris (presenting the
paper on ATM vulnerabilities), Black Hat USA, NoSuchCon Paris, Positive
Hack Days, Chaos Communication Congress, and Nuit Du Hack.
28
Yuliya Novikova
Yuliya is an analyst for the security
services analysis team at Kaspersky Lab,
providing security services, such as threat
intelligence, penetration testing, ATM/POS
security assessments, application security
assessment and more. Yulias areas of
interest are mobile application security
assessment, threat modeling, and OSINT
practices.
29
ABOUT COMPANY
30
Follow us
31