Among other capabilities, Backdoor.ATM.Suceful malware can make an ATM retain — and release — a debit card upon a fraudster's command.
September 14, 2015
FireEye Labs, a threat prevention platform developer, says it has identified a new type of ATM malware, Backdoor.ATM.Suceful, that can retain debit cards on infected ATMs, disable alarms, and read debit card tracks.
According to the FireEye blog, Suceful was uploaded to VirusTotal from Russia, on Aug. 25.
"It might still be in its development phase; however, the features provided are shocking and never seen before in ATM malware," the blog said.
Like the earlier viruses Ploutus and PadPin, Suceful interacts with XFS Manager, the interface between the application (malware, in this case) and ATM peripherals (e.g., printer, dispenser, card reader, PIN pad).
One of the most disturbing things about Suceful is that it is device agnostic, FireEye said in the blog:
Every vendor has its own implementation of the XFS Manager with proper security controls in place; however, they also support the default XFS Manager template provided by WOSA/XFS Standard, allowing the attackers to create their own interface with the ATM.
FireEye listed potential capabilities in Diebold Inc. or NCR Corp. ATMs as:
"Suceful is the first multivendor ATM malware targeting cardholders, created to steal the tracks of the debit cards but also to steal the actual physical cards, which is definitely raising the bar of sophistication of this type of threats," the FireEye blog said.
Additional information and analysis of the malware's capabilities — including the types of sessions it is capable of carrying out — is available from the FireEye blog.
As a global technology leader and innovative services provider, Diebold Nixdorf delivers the solutions that enable financial institutions to improve efficiencies, protect assets and better serve consumers.