How cheaters use rigged DeckMate 2 shuffling machines in poker games | Kaspersky official blog
We explain how vulnerabilities in DeckMate 2 shuffling machines allowed criminals to gain insights into opponents' hands and win massive sums at poker.
AI Analysis
Technical Summary
The DeckMate 2 is a professional automated card shuffler introduced in 2012 and widely deployed in casinos and private poker clubs worldwide. It uses an internal camera to verify the presence of all 52 cards and to shuffle them, returning the deck to the dealer within 22 seconds. However, researchers demonstrated in 2023 that the device's security design is flawed. The shuffler contains hard-coded system passwords set by the manufacturer, which are identical across devices and difficult to change. Attackers can connect a small device (e.g., a Raspberry Pi or USB-sized module) to the exposed USB port to alter the firmware. They bypass the firmware integrity check by overwriting the stored hash reference, allowing the device to run malicious code undetected. This code accesses the internal camera to capture the exact card order and transmits this information via Bluetooth to an accomplice's phone, who then signals the cheating player. Some models equipped with cellular modems could be targeted remotely via fake base stations, although this vector remains untested. In 2025, law enforcement indicted a criminal group that used pre-hacked DeckMate 2 machines in high-stakes poker games, resulting in over $7 million in losses. The criminals combined this with other cheating methods like marked cards and covert signaling. The manufacturer has since disabled the USB port and improved firmware verification in updated devices, but many second-hand or unmaintained units remain vulnerable, especially in illegal or private venues. The root cause is the reuse of default passwords, exposed update interfaces, and lack of secure firmware validation. The attack requires physical access initially but can be extended with network-based methods on some models.
Potential Impact
For European organizations, especially casinos, private poker clubs, and gambling regulators, this vulnerability poses a significant risk to the integrity and fairness of card games. Exploitation can lead to substantial financial losses, reputational damage, and legal consequences. The ability to predict card order compromises game confidentiality and fairness, undermining trust in gaming establishments. Illegal or unregulated venues, which may use second-hand or unpatched DeckMate 2 devices, are particularly vulnerable, potentially facilitating organized crime and fraud. Additionally, manufacturers and service providers renting these devices face liability risks if compromised units are used in Europe. The threat could also impact European sports betting and gambling sectors indirectly by eroding consumer confidence. While the attack requires physical access for initial compromise, the possibility of remote exploitation on cellular-enabled models increases the attack surface. Regulatory bodies may need to enforce stricter device security standards and auditing to prevent such fraud. Overall, the threat undermines the confidentiality, integrity, and availability of gaming operations.
Mitigation Recommendations
European organizations should immediately audit all DeckMate 2 devices in use, verifying firmware versions and applying manufacturer updates that disable the USB port and improve firmware integrity checks. Change all default and hard-coded passwords to strong, unique credentials, ideally using a secure password manager. Physically secure devices to prevent unauthorized access to USB ports or internal components. For devices rented under pay-per-use plans, confirm with the manufacturer that cellular modems are secured against fake base station attacks or consider disabling cellular connectivity if not required. Implement continuous monitoring for unusual Bluetooth transmissions or unauthorized wireless communications near gaming tables. Avoid using second-hand or unmaintained DeckMate 2 units, especially in private or illegal venues. Train staff and security personnel to recognize signs of device tampering and enforce strict access controls. Regulatory agencies should mandate security standards for gaming devices and conduct regular inspections. Finally, educate players and stakeholders about the risks of illegal gambling venues where such compromised devices are more likely to be used.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Switzerland, Monaco, Malta
How cheaters use rigged DeckMate 2 shuffling machines in poker games | Kaspersky official blog
Description
We explain how vulnerabilities in DeckMate 2 shuffling machines allowed criminals to gain insights into opponents' hands and win massive sums at poker.
AI-Powered Analysis
Technical Analysis
The DeckMate 2 is a professional automated card shuffler introduced in 2012 and widely deployed in casinos and private poker clubs worldwide. It uses an internal camera to verify the presence of all 52 cards and to shuffle them, returning the deck to the dealer within 22 seconds. However, researchers demonstrated in 2023 that the device's security design is flawed. The shuffler contains hard-coded system passwords set by the manufacturer, which are identical across devices and difficult to change. Attackers can connect a small device (e.g., a Raspberry Pi or USB-sized module) to the exposed USB port to alter the firmware. They bypass the firmware integrity check by overwriting the stored hash reference, allowing the device to run malicious code undetected. This code accesses the internal camera to capture the exact card order and transmits this information via Bluetooth to an accomplice's phone, who then signals the cheating player. Some models equipped with cellular modems could be targeted remotely via fake base stations, although this vector remains untested. In 2025, law enforcement indicted a criminal group that used pre-hacked DeckMate 2 machines in high-stakes poker games, resulting in over $7 million in losses. The criminals combined this with other cheating methods like marked cards and covert signaling. The manufacturer has since disabled the USB port and improved firmware verification in updated devices, but many second-hand or unmaintained units remain vulnerable, especially in illegal or private venues. The root cause is the reuse of default passwords, exposed update interfaces, and lack of secure firmware validation. The attack requires physical access initially but can be extended with network-based methods on some models.
Potential Impact
For European organizations, especially casinos, private poker clubs, and gambling regulators, this vulnerability poses a significant risk to the integrity and fairness of card games. Exploitation can lead to substantial financial losses, reputational damage, and legal consequences. The ability to predict card order compromises game confidentiality and fairness, undermining trust in gaming establishments. Illegal or unregulated venues, which may use second-hand or unpatched DeckMate 2 devices, are particularly vulnerable, potentially facilitating organized crime and fraud. Additionally, manufacturers and service providers renting these devices face liability risks if compromised units are used in Europe. The threat could also impact European sports betting and gambling sectors indirectly by eroding consumer confidence. While the attack requires physical access for initial compromise, the possibility of remote exploitation on cellular-enabled models increases the attack surface. Regulatory bodies may need to enforce stricter device security standards and auditing to prevent such fraud. Overall, the threat undermines the confidentiality, integrity, and availability of gaming operations.
Mitigation Recommendations
European organizations should immediately audit all DeckMate 2 devices in use, verifying firmware versions and applying manufacturer updates that disable the USB port and improve firmware integrity checks. Change all default and hard-coded passwords to strong, unique credentials, ideally using a secure password manager. Physically secure devices to prevent unauthorized access to USB ports or internal components. For devices rented under pay-per-use plans, confirm with the manufacturer that cellular modems are secured against fake base station attacks or consider disabling cellular connectivity if not required. Implement continuous monitoring for unusual Bluetooth transmissions or unauthorized wireless communications near gaming tables. Avoid using second-hand or unmaintained DeckMate 2 units, especially in private or illegal venues. Train staff and security personnel to recognize signs of device tampering and enforce strict access controls. Regulatory agencies should mandate security standards for gaming devices and conduct regular inspections. Finally, educate players and stakeholders about the risks of illegal gambling venues where such compromised devices are more likely to be used.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/hacked-card-shufflers/54865/","fetched":true,"fetchedAt":"2025-12-02T17:07:16.497Z","wordCount":2031}
Threat ID: 692f1cc417aa519cfe209dae
Added to database: 12/2/2025, 5:07:16 PM
Last enriched: 12/2/2025, 5:07:33 PM
Last updated: 12/4/2025, 8:44:33 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12997: CWE-639 Authorization Bypass Through User-Controlled Key in Medtronic CareLink Network
LowCVE-2025-14007: Cross Site Scripting in dayrui XunRuiCMS
LowCVE-2025-64763: CWE-693: Protection Mechanism Failure in envoyproxy envoy
LowCVE-2025-20388: The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. in Splunk Splunk Enterprise
LowCVE-2025-20385: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. in Splunk Splunk Enterprise
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.