Back to Intelligence

ATM Jackpotting Attacks Surge: FBI Issues $20M Warning for 2025

SA
Security Arsenal Team
March 16, 2026
5 min read

ATM Jackpotting Attacks Surge: FBI Issues $20M Warning for 2025

The FBI has issued a urgent Flash alert warning the financial sector about a massive surge in "jackpotting" attacks. In 2025 alone, these attacks have resulted in over $20 million in losses. This isn't a digital heist happening in the cloud; it is a visceral, physical attack where cybercriminals force Automated Teller Machines (ATMs) to spit out cash like a broken slot machine.

For banks and credit unions, this represents a critical convergence of physical security vulnerabilities and cyber warfare tactics. As attackers refine their methods, moving from crude malware to sophisticated hardware bypasses, the security community must adapt its defenses.

The Threat Landscape: Beyond Malware

While early jackpotting schemes relied on infecting the ATM's operating system with malware like Ploutus, the 2025 surge is driven largely by "Black Box" attacks. This method bypasses the need to crack the ATM's OS or application layer entirely.

The Attack Vector

In a typical Black Box attack, cybercriminals gain physical access to the top box of the ATM. Once the upper cabinet is open—which often takes mere seconds using generic lock picking tools or drills—attackers locate the cable connecting the host computer to the dispenser mechanism. They disconnect this cable and insert a rogue physical device (the "black box") or a laptop acting as an intermediary.

This malicious device mimics the legitimate commands of the ATM's core computer, sending direct instructions to the dispenser to release cash. Since the dispenser trusts the commands coming from the cable, it obliges. The attacker walks away with the cash, leaving the software logs often showing no record of a legitimate transaction.

Technical Analysis: XFS and Vulnerabilities

The underlying enabler for many of these attacks is the eXtensions for Financial Services (XFS) standard. XFS provides the API that allows the ATM software to communicate with hardware peripherals (card readers, pin pads, dispensers).

  • XFS Vulnerabilities: In software-based jackpotting, attackers exploit weak authentication in the XFS service provider. They may inject commands via a keyboard or USB drive to trigger the dispenser.
  • Legacy OS Risks: Many ATMs still run on Windows 10 IoT or older embedded versions. While these are stripped down, unpatched vulnerabilities (CVEs) in the underlying OS or third-party drivers can provide an initial foothold if the attacker opts for a software-based approach rather than a pure hardware bypass.

Detection and Threat Hunting

Detecting jackpotting requires monitoring for anomalies that bridge the gap between physical access and digital logs. Since the money is gone the moment the attack completes, prevention and real-time alerting are paramount. Security Operations Centers (SOCs) must monitor the ATM endpoints for signs of unauthorized hardware interaction or suspicious process execution.

Hunting for Physical Device Connection

If an attacker uses a USB keyboard to inject commands or connects a laptop to an internal port, we can look for Plug and Play (PnP) events that occur outside of maintenance windows.

KQL (Sentinel/Defender) - Hunt for USB Device Insertion:

Script / Code
DeviceEvents
| where ActionType == "UsbDriveMounted" or ActionType == "PnpDeviceConnected"
| where Timestamp > ago(7d)
| extend DeviceDetails = parse_(AdditionalFields)
| project Timestamp, DeviceName, ActionType, DeviceId, DeviceDetails.VendorId, DeviceDetails.ProductId, InitiatingProcessAccountName
| where DeviceName contains "ATM" or DeviceName has_any("NCR", "Diebold", "Hyosung")
| sort by Timestamp desc

Investigating Dispenser Service Anomalies

Black Box attacks often disrupt the normal communication chain, causing errors in the XFS service logs or sudden terminations of the host application while the dispenser remains active.

Bash - Check XFS Service Status and Recent Errors (Linux-based ATMs or monitoring agents):

Script / Code
# Check status of common XFS related services
systemctl status --no-pager -l xfsmanager

# Grep recent logs for dispenser communication errors
journalctl -u xfsmanager --since "1 hour ago" | grep -i "dispenser\|error\|disconnect"


**PowerShell - Windows ATM Endpoint Check:**
Script / Code
# Get events related to Hardware errors (Event ID 11) which might indicate 
# physical disconnection of the dispenser cable
Get-WinEvent -FilterHashtable @{LogName='System'; ID=11; StartTime=(Get-Date).AddHours(-2)} -ErrorAction SilentlyContinue |
  Select-Object TimeCreated, Message | Format-List

Mitigation Strategies

Stopping these attacks requires a "Defense in Depth" approach that acknowledges the physical reality of the ATM.

  1. Hardened Physical Access Control:

    • Upgrade to high-security locks that resist drilling and picking.
    • Install shock sensors and alarm systems on the ATM upper cabinet. Any vibration or tilting should trigger an immediate alert to the SOC.
  2. Network-Based Transaction Verification:

    • Implement endpoint detection solutions that require a cryptographic handshake between the ATM host and the dispenser. If the "black box" cannot provide the valid handshake, the dispenser ignores the command.
  3. USB Port Restriction:

    • Physically block unused USB ports with epoxy or secure port locks.
    • Configure the ATM OS to disable USB storage devices via Group Policy or registry edits.

Bash - Disable USB Mass Storage on Linux Endpoints:

Script / Code
# Create a configuration file to disable USB storage
echo "install usb-storage /bin/true" | sudo tee /etc/modprobe.d/disable-usb-storage.conf
# Update initramfs
sudo update-initramfs -u
# Reboot required


4.  **Application Whitelisting:**
    *   Ensure only signed, authorized ATM applications can execute. This prevents attackers from running malicious tools if they manage to connect a keyboard.

The $20 million loss reported by the FBI is likely just the tip of the iceberg. As jackpotting tools become commoditized, the speed and frequency of attacks will increase. Financial institutions must move beyond simple surveillance and integrate their physical security feeds directly into their SOC monitoring workflows.

Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socthreat-intelmanaged-socjackpottingatm-securityfinancial-crimethreat-huntingphysical-security

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.