Global ATM Threat: “EU ATM Malware” Targets Major Manufacturers, Steals Millions
A new type of malicious software targeting ATMs is rapidly spreading in the digital realm, remarkable for its effectiveness — its success rate, according to its creators, reaches 99%. This malware, named “EU ATM Malware,” is capable of breaching nearly any ATM in Europe and approximately 60% of ATMs worldwide, posing a significant threat to global banking security.
“EU ATM Malware” can target ATMs from leading manufacturers such as Diebold Nixdorf, Hyosung, Oki, Bank of America, NCR, GRG, and Hitachi. Developers claim it can extract up to $30,000 from a single ATM, making it an attractive tool for cybercriminals.
One of the key features of this software is its complete automation, which significantly simplifies deployment and operation. However, for those who prefer more active intervention and precise customization, a manual control mode is available.
The software’s developers offer highly flexible purchasing options, including:
- Monthly subscriptions;
- A three-day trial period;
- An initial fee plus a share of the profits from successful ATM attacks.
Thus, the European banking sector, known for its stringent security measures, faces a new serious threat. The emergence of “EU ATM Malware” underscores the need to strengthen cybersecurity measures.
Banking institutions not only in Europe but worldwide must adapt to this new threat and develop strategies to protect their systems from such attacks. Only a comprehensive and proactive approach will effectively counter the new challenges of the digital age.