Request a Demo
ATM Security

ATM Security

ATM machines are now turning increasingly vulnerable to all kinds of malware strikes. This happens in addition to the other frauds committed at ATM counters, including card skimming, using hidden cameras etc.

Cybercriminals manage to infect ATM software with malware using different techniques and making use of different kinds of vulnerabilities. This has been happening worldwide for the last few years and now it's showing an increasing trend. Thus, securing ATM software becomes as important as securing the machine itself.

Comodo SecureBox offers different kinds of ATM security solutions, which are accomplished with the following features-

Data Protection - This is achieved by protecting the ATM software application's data in memory and on disk.

Keylogger Protection - Comodo SecureBox uses keyboard virtualization technology to intercept keystrokes from the keyboard filter driver and then encrypts the information to provide maximum security.

Remote Takeover Protection - Comodo combats and defeats remote desktop takeover using its application-agnostic screen capture detection technology and by intercepting the attempt and switching from the default screen to an isolated desktop screen that displays warning messages, prohibiting the hacker from viewing anything on a user’s desktop.

Anti-SSL Sniffing - ATM protection is given by detecting malicious SSL connections and SSL sniffing. Certificates are intercepted and verified using Comodo’s trusted root certificate list, effectively preventing man-in-the-middle attacks.

Anti-Memory Scraping - Memory scraping is prevented when Comodo SecureBox prohibits external applications from accessing the memory of containerized applications.

Active Virus Removal - Comodo SecureBox performs a rapid cloud -based scan, before the software application opens, to detect and remove all active viruses on the host device.

Latest ATM Machines Attack

  • There were recent reports of Russian hackers having adopted a new technique, dubbed Reverse ATM Attack, to steal Millions of dollars from ATMs of financial institutions.
  • Recently, banks in India has to block cards following reports of ATM security breaches involving over 3.5 million debit cards.
  • In July, there were reports of cybercriminals possibly using smartphones to gain control of ATM machines in Taiwan and get away with big amounts.
  • In November 2015, there were reports of sensitive data being leaked during software updates from ATMs of the German savings bank Sparkasse.

How to Handle ATM Security

If you own an ATM, or one is used in your building, you have a responsibility to keep it secure. There are many hackers out there who target ATMs specifically, and they have multiple tools available to help them. At Comodo, we understand that you’re focused on your ATM machine security and have a product to help you.

It is important to understand a few things about ATMs, including:

  • How they work
  • How ATM security differs from other forms of security
  • Communication protection
  • Hardware security
  • Authentication
  • Data integrity

How They Work

Modern times call for modern measures. In the past, ATMs used a card that was punched and not active anymore. That meant multiple cards were needed. Magnetic cards also were used but had a limited lifespan. The risks involved with these methods include losing the card and having it stolen. The PIN was created to help thwart off attacks and stolen money, but with the modernized world of hacking, a PIN may not be enough.

How ATM Security Differs

The problem with ATMs is that they are very different than computers. Companies lock their doors and keep the riff-raff out while they are working, so hackers have to remotely hack into the system. With ATMs, that isn’t necessarily the case. While malware and viruses still work the same way, hackers can visit the machine and insert tools that will help scan the numbers and send them back to the hacker to use later.

Three components are usually used for these systems, including computers, the terminal and communication links. Links can be subject to attack, and we can help prevent that with the use of our product. However, ATM machine security also uses a computer terminal, and it must be protected against attack, as well. If you’d like to learn more about ATM security, please contact us today.