當前位置

首頁 > 英語閱讀 > 雙語新聞 > 惡意軟件讓多臺取款機同時自動吐鈔

惡意軟件讓多臺取款機同時自動吐鈔

推薦人: 來源: 閱讀: 3.84K 次

ing-bottom: 56.29%;">惡意軟件讓多臺取款機同時自動吐鈔

A Russian cybersecurity firm has issued a warning about a spate of remotely coordinated attacks on cash machines.

一家俄羅斯網絡安全公司日前發出警告稱,自動取款機正受到遠程協同攻擊的威脅。

Hacks of banks' centralised systems had made groups of machines issue cash simultaneously, a process known as "touchless jackpotting", said Group IB.

全球網絡安全公司Group IB表示,黑客運用一種名爲“自動吐鈔”的程序攻擊銀行的中央系統,從而使多臺自動取款機同時自動吐出現鈔。

The machines had not been physically tampered with, it said, but "money mules" had waited to grab the cash.

Group IB稱,這些自動取款機的硬件並沒有被動過手腳,但“錢騾們”卻都伺機從中大撈一筆。

Affected countries are said to include Armenia, Estonia, the Netherlands, Poland, Russia, Spain and the UK.

據稱這次受害的國家包括亞美尼亞、愛沙尼亞、荷蘭、波蘭、俄羅斯、西班牙和英國。

But the company declined to name any specific banks.

但Group IB拒絕透露任何被攻擊銀行的名字。

Dmitriy Volkov from Group IB told the BBC a successful attack could net its perpetrators up to $400,000 at a time.

Group IB的德米克利.沃爾科夫對BBC說,一次成功的攻擊最多可讓犯罪團伙淨賺40萬美元。

"We have seen such attacks in Russia since 2013," he said.

他說:“從2013年起,俄羅斯就發生過類似的事件。”

"The threat is critical. Attackers get access to an internal bank's network and critical information systems. That allows them to rob the bank."

“黑客攻擊的威脅十分嚴重。罪犯可以黑進銀行的內部網絡以及重要的信息系統,這讓罪犯遠程搶劫銀行成爲了可能。”

Two cash machine manufacturers, Diebold Nixdorf and NCR Corp, told Reuters they were aware of the threat.

自動取款機制造商迪堡多富和NCR對路透社說,他們已經意識到了黑客攻擊的威脅。

"They are taking this to the next level in being able to attack a large number of machines at once," said senior director Nicholas Billett, from Diebold Nixdorf.

迪堡多富的高管尼古拉斯.比利特說:“通過一次性攻破大量取款機,黑客攻擊已然提升到了一個新水平。”

"They know they will be caught fairly quickly, so they stage it in such a way that they can get cash from as many ATMs as they can before they get shut down."

“黑客知道攻擊很快就會被發現,所以他們會在銀行關閉入口前,攻破儘可能多的取款機,以攫取鉅額現金。”

'Follow the money'

“追蹤現金流向”

A recent report by Europol warned of the rise of cash-machine-related malware, although it said "skimming" - using hardware to steal card information at the machine itself - was still more common.

歐洲刑警組織近日的一份報告警告稱,與取款機相關的惡意軟件的數量正在上升,不過,它也表示,用“讀卡器”在取款機上盜取銀行卡信息仍是更爲普遍的犯罪招數。

"The new method is being done by somehow gaining access to the banks' central systems and infecting whole communities of ATMs simultaneously, hence multiplying the amount of money that can be stolen in a short time," said Surrey University's cybersecurity expert Prof Alan Woodward.

薩里大學的網絡安全專家艾倫.伍德沃德教授說:“這種新招數通過黑進銀行的中央系統,同時操控大片區域的自動取款機來實現,這樣,罪犯在短時間內盜取的現金就能大大增加。”

Because criminals were collecting the cash in person, it made the crime more difficult to trace, he added.

他還補充道,由於罪犯都是親自來拿錢,加大了追蹤難度。

"The classic way of solving online financial crime is to 'follow the money' - but when you can no longer do this, it is very hard to find out who is behind it, even though the evidence suggests it is a very limited number of groups that have started perpetrating this type of crime."

“破解網絡金融案件的傳統方法是‘追蹤現金流向’——但現在這種方法失效了。即使有證據表明,只有幾個團隊在遠程竊取取款機現金,但你仍很難查出背後的主使者是誰。”