FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
The FBI has confirmed that the Ploutus malware, which has been around for over a decade, is still being used in the wild. The post FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025 appeared first on SecurityWeek .
AI Analysis
Technical Summary
Ploutus malware is a specialized ATM jackpotting malware family that has been active for over a decade. It enables attackers to gain unauthorized control over ATM machines, forcing them to dispense cash on command. The malware typically requires physical access to the ATM to install, often involving the use of hardware devices or USB drives to load the malicious code. Once deployed, Ploutus can bypass ATM security controls and manipulate the cash dispenser mechanism. The FBI's recent confirmation highlights that despite its age, Ploutus remains a prevalent threat, with 700 attacks in 2025 resulting in $20 million in losses. This persistence is largely due to many ATMs running outdated operating systems and lacking modern security controls. The attacks are sophisticated, requiring attackers to have both technical expertise and physical access, but the financial impact is significant. The malware's continued use underscores the challenges in securing legacy ATM infrastructure and the need for comprehensive security strategies that include both cyber and physical protections.
Potential Impact
The primary impact of Ploutus ATM jackpotting attacks is financial loss, as attackers forcibly dispense cash from compromised ATMs. Beyond direct monetary theft, these attacks can erode customer trust in financial institutions and damage the reputation of ATM operators. The operational disruption caused by compromised ATMs can lead to service outages and increased maintenance costs. Additionally, the persistence of such attacks may encourage further criminal activity targeting ATM infrastructure. Organizations worldwide, especially banks and ATM service providers, face increased risk of fraud losses and regulatory scrutiny. The threat also highlights systemic vulnerabilities in ATM security, particularly in regions where legacy systems remain in use. While the attacks require physical access, the scale of incidents reported indicates that attackers have been able to exploit these opportunities repeatedly, suggesting gaps in physical and network security controls.
Mitigation Recommendations
To mitigate Ploutus ATM jackpotting attacks, organizations should implement a multi-layered security approach: 1) Enhance physical security by installing tamper-evident seals, surveillance cameras, and restricting access to ATM internals. 2) Upgrade ATM software and firmware to the latest versions that include security patches and hardened configurations. 3) Employ endpoint protection solutions specifically designed for ATM environments to detect and block unauthorized code execution. 4) Segment ATM networks from other corporate networks to limit malware propagation and unauthorized access. 5) Conduct regular security audits and penetration testing focused on ATM infrastructure. 6) Train staff and ATM service personnel to recognize signs of tampering and suspicious behavior. 7) Implement strict access controls and logging for all maintenance activities. 8) Collaborate with law enforcement and industry groups to share threat intelligence and respond rapidly to incidents. These targeted measures go beyond generic advice by addressing both the physical and cyber aspects of ATM security.
Affected Countries
United States, Mexico, Brazil, India, Russia, United Kingdom, Germany, South Africa, Indonesia, Philippines
FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
Description
The FBI has confirmed that the Ploutus malware, which has been around for over a decade, is still being used in the wild. The post FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025 appeared first on SecurityWeek .
AI-Powered Analysis
Technical Analysis
Ploutus malware is a specialized ATM jackpotting malware family that has been active for over a decade. It enables attackers to gain unauthorized control over ATM machines, forcing them to dispense cash on command. The malware typically requires physical access to the ATM to install, often involving the use of hardware devices or USB drives to load the malicious code. Once deployed, Ploutus can bypass ATM security controls and manipulate the cash dispenser mechanism. The FBI's recent confirmation highlights that despite its age, Ploutus remains a prevalent threat, with 700 attacks in 2025 resulting in $20 million in losses. This persistence is largely due to many ATMs running outdated operating systems and lacking modern security controls. The attacks are sophisticated, requiring attackers to have both technical expertise and physical access, but the financial impact is significant. The malware's continued use underscores the challenges in securing legacy ATM infrastructure and the need for comprehensive security strategies that include both cyber and physical protections.
Potential Impact
The primary impact of Ploutus ATM jackpotting attacks is financial loss, as attackers forcibly dispense cash from compromised ATMs. Beyond direct monetary theft, these attacks can erode customer trust in financial institutions and damage the reputation of ATM operators. The operational disruption caused by compromised ATMs can lead to service outages and increased maintenance costs. Additionally, the persistence of such attacks may encourage further criminal activity targeting ATM infrastructure. Organizations worldwide, especially banks and ATM service providers, face increased risk of fraud losses and regulatory scrutiny. The threat also highlights systemic vulnerabilities in ATM security, particularly in regions where legacy systems remain in use. While the attacks require physical access, the scale of incidents reported indicates that attackers have been able to exploit these opportunities repeatedly, suggesting gaps in physical and network security controls.
Mitigation Recommendations
To mitigate Ploutus ATM jackpotting attacks, organizations should implement a multi-layered security approach: 1) Enhance physical security by installing tamper-evident seals, surveillance cameras, and restricting access to ATM internals. 2) Upgrade ATM software and firmware to the latest versions that include security patches and hardened configurations. 3) Employ endpoint protection solutions specifically designed for ATM environments to detect and block unauthorized code execution. 4) Segment ATM networks from other corporate networks to limit malware propagation and unauthorized access. 5) Conduct regular security audits and penetration testing focused on ATM infrastructure. 6) Train staff and ATM service personnel to recognize signs of tampering and suspicious behavior. 7) Implement strict access controls and logging for all maintenance activities. 8) Collaborate with law enforcement and industry groups to share threat intelligence and respond rapidly to incidents. These targeted measures go beyond generic advice by addressing both the physical and cyber aspects of ATM security.
Threat ID: 699841e52c4d84f260dc08ad
Added to database: 2/20/2026, 11:13:41 AM
Last enriched: 2/20/2026, 11:13:53 AM
Last updated: 2/20/2026, 11:59:09 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Android threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumPromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
MediumThreatFox IOCs for 2026-02-19
MediumUncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.