place Google AdSense code here
By simply sending a text message to the compromised system, hackers can control the ATM, walk up to it, and collect dispensed cash.
To begin with, a hacker must connect the ATM to a mobile phone via USB tethering. This creates a shared Internet connection, which then can be used to send specific SMS commands to the phone attached inside the ATM. The mobile device, if properly set up, then converts the message into a network packet and forwards it on to the ATM through the USB cable.
The first message sent contains an activation ID to start Ploutus in the ATM. Another message then sends a valid dispense command which dupes the system in to releasing money, which is pre-configured within the malware.
0 comments: Post Yours! Read Comment Policy ▼
PLEASE NOTE:
We have Zero Tolerance to Spam. Chessy Comments and Comments with Links will be deleted immediately upon our review.
Post a Comment