• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>

            Michael's Space

            Technology changes the world, serves the people.
              C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理
            Source: http://www.wired.com/threatlevel/2010/07/atms-jackpotted/

            Researcher Demonstrates ATM ‘Jackpotting’ at Black Hat Conference

            LAS VEGAS — In a city filled with slot machines spilling jackpots, it was a “jackpotted” ATM that got the most attention Wednesday at the Black Hat security conference, when researcher Barnaby Jack demonstrated two suave hacks against automated teller machines that made them spew out dozens of crisp bills.

            The audience greeted the demonstration with hoots and applause.

            In one of the attacks, Jack reprogrammed the ATM remotely over a network, without touching the machine; the second attack required he open the front panel and plug in a USB stick loaded with malware.

            Jack, director of security research at IOActive Labs, focused his hack research on standalone and hole-in-the-wall ATMs — the kind installed in retail outlets and restaurants. He did not rule out that bank ATMs could have similar vulnerabilities, but he hasn’t yet examined them.

            The two systems he hacked onstage were made by Triton and Tranax. The Tranax hack was conducted using an authentication bypass vulnerability that Jack found in the system’s remote monitoring feature, which can be accessed over the internet or dial-up, depending on how the owner configured the machine.

            Tranax’s remote monitoring system is turned on by default, but Jack said the company has since begun advising customers to protect themselves from the attack by disabling the remote system.

            To conduct the remote hack, an attacker would need to know an ATM’s IP address or phone number. Jack said he believes about 95 percent of retail ATMs are on dial-up; a hacker could war dial for ATMs connected to telephone modems, and identify them by the cash machine’s proprietary protocol.

            The Triton attack was made possible by a security flaw that allowed unauthorized programs to execute on the system. The company distributed a patch last November so that only digitally signed code can run on them.

            Both the Triton and Tranax ATMs run on Windows CE.

            Using a remote attack tool, dubbed Dillinger, Jack was able to exploit the authentication-bypass vulnerability in Tranax’s remote monitoring feature and upload software or overwrite the entire firmware on the system. With that capability, he installed a malicious program he wrote, called Scrooge.

            Scrooge lurks on the ATM quietly in the background until someone wakes it up in person. It can be initiated in two ways — either through a touch-sequence entered on the ATM’s keypad or by inserting a special control card. Both methods activate a hidden menu an attacker can use to make the machine spew out money or print receipts. Scrooge will also capture magstripe data embedded in bank cards other users insert into the ATM.

            To demonstrate, Jack punched keys on the keypad to call up the menu, then instructed the machine to spit out 50 bills from one of four cassettes. The screen lit up with the word “Jackpot!” as the bills came flying out the front.

            To hack the Triton, he used a key to open the machine’s front panel, then connected a USB stick containing his malware. The ATM uses a uniform lock on all of its systems — the kind used on filing cabinets — that can be opened with a $10 key available on the web. The same key opens every Triton ATM.

            Two Triton representatives said at a press conference after the presentation that its customers preferred a single lock on systems so they could easily manage fleets of machines without requiring numerous keys. But they said Triton offers a lock upgrade kit to customers who request it — the upgraded lock is a Medeco pick-resistant, high-security lock.

            Similar malware attacks were discovered on bank ATMs in Eastern Europe last year. Security researchers at Trustwave, based in Chicago, found the malware on 20 machines in Russia and Ukraine that were all running Microsoft’s Windows XP operating system. They said they found signs that hackers were planning on bringing their attacks to machines in the United States. The malware was designed to attack ATMs made by Diebold and NCR.

            Those attacks required an insider, such as an ATM technician or anyone else with a key to the machine, to place malware on the ATM. Once that was done, attackers could insert a control card into the machine’s card reader to trigger the malware and give them control of the machine through a custom interface and the ATM’s keypad.

            The malware captured account numbers and PINs from the machine’s transaction application and then delivered it to the thief on a receipt printed from the machine in an encrypted format, or to a storage device inserted in the card reader. A thief could also instruct the machine to eject whatever cash was inside the machine. A fully loaded bank ATM can hold up to $600,000.

            Earlier this year, in a separate incident, a Bank of America employee was charged with installing malware on his employer’s ATMs that allowed him to withdraw thousands of dollars without leaving a transaction record.

            Jack was slated to give the same ATM vulnerability talk at Black Hat last year, but his then-employer Juniper Networks canceled the talk weeks before the conference after an unnamed ATM vendor expressed concern. He said on Wednesday that the earlier talk was withdrawn to allow Triton time to implement a patch to address the code-execution vulnerability targeted in his demonstration. The company released the patch eight months ago.

            Jack said that so far he’s examined ATMs made by four manufacturers and all of them have vulnerabilities. “Every ATM I’ve looked at allows that ‘game over.’ I’m four for four,” he said at the press conference. He wouldn’t discuss the vulnerabilities in the two ATMs not attacked on Wednesday because he said his previous employer, Juniper Networks, owns that research.

            Jack said his aim in demonstrating the hacks is to get people to look more closely at the security of systems that are presumed to be locked down and impenetrable.

            Photo: Isaac Brekken/Associated Press



            Read More http://www.wired.com/threatlevel/2010/07/atms-jackpotted/#ixzz0vAgMMN79

            久久九九久精品国产免费直播| 亚洲精品乱码久久久久久中文字幕 | 99久久成人国产精品免费| 国产精品久久毛片完整版| 国产精品内射久久久久欢欢| 亚州日韩精品专区久久久| 蜜臀久久99精品久久久久久小说| 久久精品免费观看| 99久久做夜夜爱天天做精品| 国内精品伊人久久久久AV影院| 久久99亚洲综合精品首页| 99久久精品免费看国产一区二区三区 | 日韩精品久久久久久| 亚洲日韩欧美一区久久久久我 | 国产精品成人99久久久久| 2021国内精品久久久久久影院| 国产精品久久自在自线观看| 亚洲а∨天堂久久精品9966| 99精品久久久久中文字幕| 97视频久久久| 精品久久久久久无码人妻热| 久久久久亚洲av无码专区| 久久精品国产亚洲av瑜伽| 亚洲精品无码久久久久去q | 久久久女人与动物群交毛片| 久久青青草原精品国产不卡| 久久香综合精品久久伊人| 亚洲国产成人精品91久久久 | 亚洲精品午夜国产va久久| 中文字幕一区二区三区久久网站 | 超级碰碰碰碰97久久久久| 国产 亚洲 欧美 另类 久久| 无码人妻精品一区二区三区久久久| 久久久久无码专区亚洲av| 久久噜噜电影你懂的| 少妇内射兰兰久久| 欧美亚洲国产精品久久| 久久久久国色AV免费观看| 亚洲精品高清国产一久久| 久久99国产精品尤物| A级毛片无码久久精品免费|