Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

0
Medium
Malwarerce
Published: Sat Dec 20 2025 (12/20/2025, 13:48:00 UTC)
Source: The Hacker News

Description

The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in connection with a multi-million dollar ATM jackpotting scheme. The large-scale conspiracy involved deploying malware named Ploutus to hack into automated teller machines (ATMs) across the U.S. and force them to dispense cash. The indicted members are alleged to be part of Tren de Aragua (TdA, Spanish for

AI-Powered Analysis

AILast updated: 12/20/2025, 14:23:41 UTC

Technical Analysis

The indictment by the U.S. Department of Justice exposes a sophisticated ATM jackpotting operation involving 54 individuals linked to the Venezuelan gang Tren de Aragua (TdA), designated as a foreign terrorist organization. The attackers deployed Ploutus malware, first identified in Mexico in 2013, which targets Windows-based ATMs, including those manufactured by Diebold. The malware allows remote issuance of unauthorized commands to the ATM's cash dispensing module, forcing it to dispense currency without legitimate transactions. The attack requires physical access to the ATM to install the malware, achieved either by replacing the ATM’s hard drive with one preloaded with Ploutus or by connecting a removable USB device. Prior to installation, threat actors conduct reconnaissance to assess security measures and ensure alarms are not triggered. Ploutus also includes anti-forensic capabilities to delete evidence of its presence, complicating detection and forensic analysis. The operation has resulted in over 1,500 jackpotting incidents in the U.S. since 2021, with losses exceeding $40 million. The stolen funds are allegedly used to finance TdA’s broader criminal and terrorist activities, including drug trafficking and human trafficking. The malware’s reliance on physical access combined with remote control capabilities makes it a hybrid cyber-physical threat. The attack exploits legacy ATM operating systems (notably Windows XP and later versions) and weaknesses in physical ATM security. The indictment highlights the use of money mules and a hierarchical command structure to coordinate cash withdrawals and laundering. This threat underscores the ongoing risks posed by outdated ATM infrastructure and the need for integrated cyber and physical security controls.

Potential Impact

For European organizations, particularly banks and financial institutions operating ATMs with Windows-based systems, this threat poses a significant risk of direct financial loss through unauthorized cash withdrawals. The hybrid nature of the attack—requiring both physical intrusion and malware deployment—means that physical security lapses can lead to severe cyber-physical breaches. Beyond financial losses, such attacks can erode customer trust, damage brand reputation, and incur regulatory penalties under GDPR and financial compliance regimes. Additionally, if similar criminal groups operate in Europe or collaborate with TdA affiliates, the threat could extend to European ATMs, especially in countries with older ATM fleets. The use of stolen funds to finance terrorism also raises concerns about broader national security implications. European banks may face increased operational costs due to the need for enhanced security measures and incident response. The malware’s ability to erase evidence complicates forensic investigations, potentially delaying detection and remediation. Overall, the threat could disrupt ATM availability, cause financial damage, and contribute to organized crime and terrorism financing within Europe.

Mitigation Recommendations

European financial institutions should implement a multi-layered defense strategy that includes: 1) Upgrading ATM operating systems to supported, secure versions and applying all security patches promptly to eliminate known vulnerabilities exploited by Ploutus. 2) Enhancing physical security controls around ATMs, such as tamper-evident seals, reinforced locks, and surveillance cameras to deter and detect unauthorized access. 3) Deploying intrusion detection systems specifically designed for ATM environments to monitor for unusual commands or cash dispensing activities. 4) Implementing strict access control policies and background checks for personnel with physical access to ATMs. 5) Using endpoint detection and response (EDR) tools on ATM systems to identify and block malware installation attempts. 6) Conducting regular security audits and penetration testing focused on ATM infrastructure to identify and remediate weaknesses. 7) Establishing rapid incident response protocols to isolate compromised ATMs and coordinate with law enforcement. 8) Collaborating with ATM manufacturers and cybersecurity vendors to develop and deploy anti-jackpotting technologies and firmware updates. 9) Raising awareness among ATM maintenance staff about social engineering and physical security risks. 10) Sharing threat intelligence with European financial sector Information Sharing and Analysis Centers (ISACs) to stay informed about emerging jackpotting tactics and indicators of compromise.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/12/us-doj-charges-54-in-atm-jackpotting.html","fetched":true,"fetchedAt":"2025-12-20T14:23:21.388Z","wordCount":1307}

Threat ID: 6946b15e987e301cd64ae78a

Added to database: 12/20/2025, 2:23:26 PM

Last enriched: 12/20/2025, 2:23:41 PM

Last updated: 12/20/2025, 6:38:58 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats