Cash machines are increasingly hosting malware able to harvest a person's card details for use in fraud, a situation that could worsen as the malware becomes more sophisticated, according to a security researcher.
Analysts at Trustwave's SpiderLabs research group were surprised earlier this year when it obtained the ATM malware sample from a financial institution in Eastern Europe, said Andrew Henwood, vice president of SpiderLabs's Europe, Middle East and Africa operation. Trustwave does forensic investigations for major credit card companies and financial institutions as well as penetration tests.
"It's the first time we have come across malware of this type," Henwood said.
The malware records the magnetic stripe information on the back of a card as well as the PIN. That data can be printed out on the ATM's receipt roll when a special master card is inserted to the ATM that launches a user interface. It can also be recorded on the magnetic stripe of that master control card.
"We were surprised at the level of sophistication," Henwood said. "It does make us generally pretty nervous."
Most ATMs run security software, but financial institutions haven't focused on their security as much as other systems, Henwood said.
"ATMs were kind of an afterthought and were considered to be fairly stable," Henwood said. "I'd say there's not been enough focus in the past on ATM infrastructure."
Those who wrote the malware have detailed knowledge about how ATMs work, Henwood said. The sample they tested ran on ATMs using Windows XP.
The sample did not have networking capabilities, but that may be a natural evolution. That's particularly dangerous since most ATM machines in developed countries are networked. The danger is that the malware could be engineered into a worm that, once on one ATM, spreads through all ATMs on a network, Henwood said.
To install the malware, a person would need access to inside of the ATM or a port in which software could be uploaded. That means insiders could be involved, or cybercriminals have picked a lock on an ATM in order to install the software, Henwood said.
SpiderLabs has received information that similar malware has been found on ATMs now outside of Eastern Europe, Henwood said. Since then, the lab has provided detailed information on the malware to financial institutions and law enforcement, he said.
In March, security vendor Sophos found it had captured three ATM malware samples customised to target machines made by Diebold, around the same time SpiderLabs saw its first sample.