Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

How cheaters use rigged DeckMate 2 shuffling machines in poker games | Kaspersky official blog

0
Low
Vulnerability
Published: Tue Dec 02 2025 (12/02/2025, 17:01:21 UTC)
Source: Kaspersky Security Blog

Description

We explain how vulnerabilities in DeckMate 2 shuffling machines allowed criminals to gain insights into opponents' hands and win massive sums at poker.

AI-Powered Analysis

AILast updated: 12/02/2025, 17:07:33 UTC

Technical Analysis

The DeckMate 2 is a professional automated card shuffler introduced in 2012 and widely deployed in casinos and private poker clubs worldwide. It uses an internal camera to verify the presence of all 52 cards and to shuffle them, returning the deck to the dealer within 22 seconds. However, researchers demonstrated in 2023 that the device's security design is flawed. The shuffler contains hard-coded system passwords set by the manufacturer, which are identical across devices and difficult to change. Attackers can connect a small device (e.g., a Raspberry Pi or USB-sized module) to the exposed USB port to alter the firmware. They bypass the firmware integrity check by overwriting the stored hash reference, allowing the device to run malicious code undetected. This code accesses the internal camera to capture the exact card order and transmits this information via Bluetooth to an accomplice's phone, who then signals the cheating player. Some models equipped with cellular modems could be targeted remotely via fake base stations, although this vector remains untested. In 2025, law enforcement indicted a criminal group that used pre-hacked DeckMate 2 machines in high-stakes poker games, resulting in over $7 million in losses. The criminals combined this with other cheating methods like marked cards and covert signaling. The manufacturer has since disabled the USB port and improved firmware verification in updated devices, but many second-hand or unmaintained units remain vulnerable, especially in illegal or private venues. The root cause is the reuse of default passwords, exposed update interfaces, and lack of secure firmware validation. The attack requires physical access initially but can be extended with network-based methods on some models.

Potential Impact

For European organizations, especially casinos, private poker clubs, and gambling regulators, this vulnerability poses a significant risk to the integrity and fairness of card games. Exploitation can lead to substantial financial losses, reputational damage, and legal consequences. The ability to predict card order compromises game confidentiality and fairness, undermining trust in gaming establishments. Illegal or unregulated venues, which may use second-hand or unpatched DeckMate 2 devices, are particularly vulnerable, potentially facilitating organized crime and fraud. Additionally, manufacturers and service providers renting these devices face liability risks if compromised units are used in Europe. The threat could also impact European sports betting and gambling sectors indirectly by eroding consumer confidence. While the attack requires physical access for initial compromise, the possibility of remote exploitation on cellular-enabled models increases the attack surface. Regulatory bodies may need to enforce stricter device security standards and auditing to prevent such fraud. Overall, the threat undermines the confidentiality, integrity, and availability of gaming operations.

Mitigation Recommendations

European organizations should immediately audit all DeckMate 2 devices in use, verifying firmware versions and applying manufacturer updates that disable the USB port and improve firmware integrity checks. Change all default and hard-coded passwords to strong, unique credentials, ideally using a secure password manager. Physically secure devices to prevent unauthorized access to USB ports or internal components. For devices rented under pay-per-use plans, confirm with the manufacturer that cellular modems are secured against fake base station attacks or consider disabling cellular connectivity if not required. Implement continuous monitoring for unusual Bluetooth transmissions or unauthorized wireless communications near gaming tables. Avoid using second-hand or unmaintained DeckMate 2 units, especially in private or illegal venues. Train staff and security personnel to recognize signs of device tampering and enforce strict access controls. Regulatory agencies should mandate security standards for gaming devices and conduct regular inspections. Finally, educate players and stakeholders about the risks of illegal gambling venues where such compromised devices are more likely to be used.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/hacked-card-shufflers/54865/","fetched":true,"fetchedAt":"2025-12-02T17:07:16.497Z","wordCount":2031}

Threat ID: 692f1cc417aa519cfe209dae

Added to database: 12/2/2025, 5:07:16 PM

Last enriched: 12/2/2025, 5:07:33 PM

Last updated: 12/4/2025, 8:44:33 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats