FBI: More than 700 ATM jackpotting incidents with losses over $20 million occurred in 2025
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,理解主要信息。 文章讲的是犯罪分子利用恶意软件从ATM机中盗取现金的情况日益严重。特别是2025年发生了数百起这样的事件,FBI统计了自2020年以来超过1900起案件,损失超过2000万美元。主要的恶意软件是Ploutus,它通过绕过XFS软件层来控制ATM机,让犯罪分子无需交易就能提款。 接下来,犯罪分子通常使用通用钥匙打开ATM机的面板,安装恶意软件到硬盘或外部设备中。这种攻击方式难以被发现,直到现金被盗。文章还提到司法部起诉了相关团伙,他们在2024年到2025年间盗取了540万美元。 总结时需要涵盖关键点:ATM盗钱案件增加、恶意软件Ploutus的作用、犯罪手段、损失金额以及司法行动。要确保语言简洁明了,不超过100字。 最后检查一下是否符合要求:没有使用“文章内容总结”等开头词,直接描述内容,并且字数控制在范围内。 </think> 犯罪分子利用恶意软件Ploutus从ATM中盗取现金的案件激增,FBI统计2025年已发生700余起,损失超2千万美元。攻击者通过物理手段安装恶意软件绕过安全系统,在几分钟内完成盗钱行为。 2026-2-19 21:30:43 Author: therecord.media(查看原文) 阅读量:7 收藏

Criminals are increasingly using malware to steal money out of ATMs, with hundreds of incidents taking place in 2025 alone.

In a flash alert on Thursday, the FBI said it has tracked more than 1,900 ATM jackpotting incidents since 2020 and over 700 in 2025 that involved more than $20 million in losses.

FBI officials explained that criminals are now taking advantage of physical and software vulnerabilities that allow them to deploy malware on ATMs and dispense cash without transactions. 

The strains of malware include Ploutus, which has long been used globally by criminals to circumvent a layer of software that tells ATMs what to do called eXtensions for Financial Services (XFS). 

“When a legitimate transaction occurs, the ATM application sends instructions through XFS for bank authorization. If a threat actor can issue their own commands to XFS, they can bypass bank authorization entirely and instruct the ATM to dispense cash on demand,” the FBI explained.

Once Ploutus is installed, criminals can directly control the machine and trigger withdrawals. Attacks involving Ploutus allow criminals to steal money in minutes and are hard to detect until after the money is taken out. 

In most instances, criminals open the face of an ATM with widely available generic keys, according to the FBI. Once inside, they remove the ATM’s hard drive, connect it to their own computer and copy the malware onto it. In other cases they simply replace the ATM’s hard drive or external device that has malware loaded. 

“The malware interacts directly with the ATM hardware, bypassing any communications or security of the original ATM software. The malware does not require connection to an actual bank customer account to dispense cash,” the FBI said.

“The malware can be used across ATMs of different manufacturers with very little adjustment to the code as the Windows operating system is exploited during the compromise.”

The white notice comes two months after the Justice Department indicted dozens people for running an ATM jackpotting ring that involved the Ploutus malware being used against ATMs owned by credit unions. 

Between February 2024 and December 2025, the gang stole at least $5.4 million from at least 63 ATMs, according to the indictment. 

The gang would survey ATMs and test whether they had alarms that would trigger police response. 

The DOJ said at least $5.4 million was stolen by the group and another $1.4 million was at risk of being stolen but the attacks failed. At least one credit union in Kearney, Nebraska suffered a loss of about $300,000 and most lost more than $100,000. 

Experts and government agencies have warned for nearly a decade about variants of the Ploutus malware, which Google researchers previously said “is one of the most advanced ATM malware families” they've seen. 

The Ploutus ATM malware was first detected by Symantec in 2013 and has gone through several updates since then. It was initially deployed against ATMs across Mexico in 2013, allowing criminals to empty machines by either attaching an external keyboard attached to the ATM or by sending an SMS message, a technique that had never been seen before, according to Google. 

Ploutus has been used to target a variety of ATM vendors, including Diebold Nixdorf, Kalignite Platform and others. Diebold Nixdorf issued multiple alerts in 2017 and 2018 about variants of the malware being used to steal money from ATMs across Mexico and the U.S.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/fbi-atm-jackpotting-2025-report
如有侵权请联系:admin#unsafe.sh