ATM Security Workshop on GISEC 2024 Conference

sergey489810 151 views 38 slides Apr 23, 2024
Slide 1
Slide 1 of 38
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38

About This Presentation

ATM Security Workshop on GISEC 2024 Conference

Positive Technologies


Slide Content

Automated Teller Machine ( ATM )

Overview What components does an ATM consist o f How does the ATM interact with banks What attacks are applicable to ATMs Practical demonstration

Vulnerabilities found in Diebold Nixdorf ATMs allowing cash withdrawals Hackers stole $346,000 from a Thai bank, causing the shutdown of 3,300 ATMs in the country ATMs in Europe were hacked using a USB stick In Hours, Thieves Took $45 Million in A.T.M. Scheme

Statistics Network attacks Vulnerable Requirements Required time 85% ATMs ATM network access 15 minutes Black Box Vulnerable Requirements Required time 69 % ATMs Physical access to the service area 10 minutes Boot in abnormal mode (e.g. safe mode) Vulnerable Requirements Required time 42 % ATMs Physical access to the service area 15 minutes Escaping kiosk mode Vulnerable Requirements Required time 76 % ATMs Physical access to the service area 15 minutes Hard disk access Vulnerable Requirements Required time 92 % ATMs Physical access to the service area 20 minutes

About ATMs

ATM types (by location) Components of the ATM Office (installed indoors) Outdoor (installed outdoors) Over-the-wall (installed through a partition both inside and outside the building) Supervisor / Operator Panel PC Core Coin Dispenser Receipt / Journal Printer and Card Reader Card Capture Bin Standard Side-Box or Cheque Acceptor Side-Box Security Enclosure Door Top-Box Network connection Digital Audio Volume Control Statement Printer Currency Dispenser or Cash Acceptor Security Enclosure Door

Typically ATMs have the following characteristics important for our case: Typical ATM attributes Run on Win* operating systems — typically Win7, Win10 Rigidly segmented from the corporate LAN, in their own segment for ATMs, network accesses are sliced strictly Dedicated group of administrators Not domain members, only workgroups Antivirus software is installed on the device >

ATM Communications More details CDM EPP IDC NFC QR Windows Firewall Processing center Monitoring server Bank network Secure communication channel Methods of connecting to an ATM CDM — Recycler/ Dispenser EPP — Peripherals IDC — Card reader NFC — NFC module QR — QR-code module Encrypted processing data Unencrypted monitoring data Unencrypted monitoring data Encrypted processing data

Processing center Bank network Encrypted communication ATM Bank application Service providers Peripherals API SPI XFS manager User

ATM attacks overview

Attacking ATM components Device Possible attacks ATM computer Connection of USB devices Connection to hard drive Boot mode modification Card reader decodes data from bank cards Card data intercaption Cash dispenser issues banknotes from the safe Black Box Network equipment connects the ATM to the processing center and remote administration servers Interception of network traffic Spoofing of processing center Attack on available network services Attack on network devices Connection from the bank`s internal network Spoofing or hacking of software update server

Insufficient peripheral security (including cash dispenser issues) Vulnerabilities or improper configuration of Application Control Improper configuration of systems or devices Insufficient network security Other things ATM vulnerabilities categories youtube.com/@bankomat3210

Black box attack

With access to the dispenser controller USB port, an attacker can install an outdated or modified firmware version (with malicious content) to bypass the encryption and withdraw cash.) Real life example CVE-2018-9099 CVE-2018-9100 CVE-2017-17668 CVE-2018-5717

Computer A Black Box attack in unprotected ATM cabinet Cash dispenser in reinforced safe Black Box connected Cable

A Black Box attack Single-board computers

Exit from Kiosk mode Exit from Kiosk online contest

The keyboard is the main tool when hacking an ATM The main task is to find a button or key combination that will close the kiosk

You can automate the search using Teensy Exit from kiosk mode Connect device Attacker device (HID emulator, keyboard) Exit kiosk mode Bypass or disable security Send command to cash dispenser to issue banknotes !

Privilege Escalation About privilege escalation Outdated Software Vulnerable Windows Kernel Exploit for publicly known vulnerability can be developed 0-day exploit can be identified and developed Public exploit exists Vulnerable Application Exploit for publicly known vulnerability can be developed 0-day exploit can be identified and developed Public exploit exists

Access to Hard Drive

Access to Hard Drive Computer Hard drive External disk Bypass or disable security Direct connection to hard drive

Access to Hard Drive Connect external disk Connect to hard drive Access hard drive Start up from external disk Change BIOS boot order Write malware to hard drive Add malware to whitelist or disable security software Run malware Send command to cash dispenser to issue banknotes

Boot mode

Boot mode ! Star up debug mode Obtain control of ATM OS Exit kiosk mode Execute arbitrary commands Execute arbitrary commands Star up in Safe Mode Send command to cash dispenser to issue banknotes

ATM network attacks

ATM network attacks Ethernet cable Network devices Attack available network services Bank internal network Processing center Software update server Wi-Fi GSM Spoof or hack software update server Connect remotely to ATM Spoof processing center Attack network devices

ATM network attacks Spoofing of processing center Connect processing center emulator Network equipment ATM sends request to confirm translation Real processing center does not receive the request Processing center ATM Processing center emulator

ATM network attacks Exploitation of vulnerabilities in available network services ! Connect to network equipment Exploit vulnerabilities in available network services Bypass or disable security Send command to cash dispenser to issue banknotes

Card data theft Interception of data between ATM and processing center Card reader Intercept data between card reader and ATM OS Card data Card data Processing center ATM OS Intercept data between ATM and processing center

Card data theft Connect to network equipment Access network traffic Intercept card data Attack network devices Attack network traffic

Card data theft Infect ATM with malware Install device between card reader and ATM computer Intercept data between card reader and ATM OS Install device between card reader and ATM OS

Other things 

DMA Attacks Victim Machine Data From Memory PCle Device A Complection TLP Attacker Machine Command Sent Memory Read Request TLP PCle Device A

DMA Attacks

Today we learned about security aspects of ATMs Now you know how attackers will act if they want to hack into your ATM machine And you know who to turn to if you want to conduct such testing by white-hat hackers Let's sum it up

Questions and Answers Everything you wanted to know about ATM security but were afraid to ask