• ENEN
    • IT IT
    • ES ES
PARTNER LOGIN
  • ENEN
    • IT IT
    • ES ES

Auriga

  • COMPANY

    • About Us

    • Auriga History

    • Group

    • Our Values

    • Our Network

      • Partnerships

      • Certifications

      • Suppliers

    • CSR (ethical code)

      • CSR – Corporate Social Responsibility

  • BANKING

    • Overview

    • Needs

      • Channel Integration

      • Monitoring network

      • Marketing & Customer Relations

      • Accessibility of banking service

      • Corporate Banking

      • Banking Data Analysis

      • Branch of the Future

      • ATM network security

    • Products and Solutions

      • Shared Services

        • WinWebServer Architecture

        • Proactive Network Monitoring

        • One to One Marketing

      • ATM / Kiosks

        • WWS ATM

      • Internet / PC

        • WWS Digital Banking

      • Mobile Banking and Payments

        • WWS Mobile

      • Electronic payments

        • MyBank

      • Bank Marketing & Digital Signage

        • WWS One to One OMNIA

        • WWS Signage

        • WWS Perfect

        • WWS RSS Feed

        • WWS Simply Feed

      • Network Monitoring & Fraud Management

        • WWS Proactive Monitoring OMNIA

        • WWS Fraud Management System

        • WWS Simply Check

      • Call Centre

        • WWS Help Desk

      • Cash Handling

        • WWS Cash Handling

        • WWS Cash Management

      • Digital Invoicing and Document Management

        • WWS e-Invoicing

      • Branch

        • WWS Fill4Me and Bank4Me

        • WWS Greæter

        • WWS Customer Management

      • Business Analytics

        • WWS Business Analytics Management

        • WWS Asset Management

      • Cyber Security Platform

        • Lookwise Device Manager

  • NEWS & MEDIA

    • News

    • Press Release

    • Press Review

    • Blog

    • Videos

    • Infographics

  • RESOURCES

    • White Papers

    • Customer stories

    • Research

    • Brochures

  • CONTACT

    • Contact us

  • CAREERS

    • Work for Us

    • Online application

    • Job vacancies

Blog

  • Home
  • News & Media
  • Blog
  • WHAT WE CAN LEARN FROM FIXS, THE LATEST ATM ATTACK?
WHAT-WE-CAN-LEARN-FROM-FIXS-THE-LATEST-ATM-ATTACK-blog-EN

WHAT WE CAN LEARN FROM FIXS, THE LATEST ATM ATTACK?

03 April 2023 / Blog

A recent report from the MetabaseQ cybersecurity company reveals a new ATM jackpotting malware variant, dubbed FiXS, infecting ATMs in Mexico.

ATM Jackpotting attacks use malware to steal large amounts of cash from an ATM without having to use a credit or debit card.

1.1 FiXS: New ATM Malware, old techniques

Identified in February 2023, FiXS uses techniques and tactics that are similar to those used by previous ATM malware families like Ploutus, Tyupkin, Alice, Ripper or Cobalt.

FiXS gets fraudolent access to the XFS (eXtended Financial Services) middleware which controls the ATM hardware including the cash dispenser.

By connecting to the XFS layer, FiXS sends commands directly to the ATM dispenser to cash it out fully bypassing the transaction authorisation process.

The usage of the XFS layer also turns FiXS into a multi-vendor malware with the ability to attack multiple ATM vendors and models.

1.2 Dissecting FiXS ATM Jackpotting Malware

FiXS is packaged in a dropper that masquerades as the name of a common system executable: conhost.exe. This dropper embeds the malware which is extracted and copied to the ATM File System on a hardcoded temporary directory: FiXS.exe.

FiXS.exe uses the MSXFS.dll library, which allows it to freely interact with the XFS API, therefore granting access to send commands to the ATM hardware like the dispenser. MSXFS.dll allows the malware to attack any ATM implementing the CEN-XFS standard, which makes it la multi-vendor malware.

Interaction with FiXS is done via a connected keyboard, which launches the malware GUI allowing the attacker to display information of the cash units and to send dispensing commands.

1.3 Attack Modus Operandi – from infection to execution

An ATM Jackpotting attack is extremely sophisticated,  uses in-depth knowledge of the software stack and the hardware setup of ATMs. The attack’s life-cycle has four phases, from preparation to infection & persistence and final execution to achieve the cash-out. Physical accessibility to the ATM is a key factor for the attack.

  1. Preparation: An attack starts with a cybercriminal stealing or acquiring a hard drive from a production ATM. This will contain the entire software stack used by the financial institution, which the attacker can analyse and reverse engineer it to prepare a targeted attack.
  2. Infection: With their malware developed, the threat actor infects an ATM or ASST by physically accessing the device through external keyboards and USB sticks. Once the malware is inside the ATM, they can access access the operating system online and copying the malware; or use an offline method to boot from an external USB to then mount the ATM hard drive and copy the malware.
  3. Persistence: It is important for the malware to be persistent so that it runs automatically at ATM startup. This is achieved by replacing legitimate system executables or by setting autorun at startup time. This way, the malware will run in the background waiting for an activation code and get full access to the XFS middleware to send commands to the dispenser.
  4. Execution & Clean Up: Now the illegitimate extraction of cash can happen. Other threat actors, the so-called “money mules”, physically access the ATM and enter an activation code that wakes up the malware by activating a graphical user interface (GUI). Other activation methods can be the pinpad itself, the use of counterfeit cards or even connecting a mobile device and receiving an SMS. Once the “refund” is complete, some malware complete a cleanup/uninstall mechanism to remove traces of the attack.

1.4 Windows XP / 7 / 10 – all are vulnerable

Some believe ATMs running outdated and unsupported operating systems like Windows XP or Windows 7 are more vulnerable.

While migrating to Windows 10 and keeping patches updated is essential, Windows 10 ATMs are as vulnerable as the ones running Windows 7 or XP.

ATM malware is highly targeted, and does not exploit operating system vulnerabilities, but rather design vulnerabilities of the ATM software stack, like the lack of authentication in the XFS layer.

1.5 ZERO TRUST – the right ATM Cybersecurity Approach

Every organization operating an ATM network is a potential target for jackpotting attacks, making robust and efficient cybersecurity countermeasures essential.

1.5.1 Availability vs Security

The sentence “if it works, don’t touch it” is especially relevant in a critical service environment like ATMs. Any edits or updates of the ATM software and hardware must always be done in a controlled manner.

However, the lack of proactive update policies, plus the physical accessibility of ATMs, creates an inherently vulnerable environment that makes ATM devices very difficult to protect with traditional security technologies.

It is essential to understand that these characteristics or limitations are an inherent part of the nature of these types of devices, for example 24×7 ease of use and accessibility. What we must do is define an appropriate security strategy for the environment we want to protect and turn the weaknesses into strengths.

1.5.2 Enter the “Zero Trust” protection model

“Zero Trust“ assumes your infrastructure will be compromised, and the concept of “never trust, always verify” should be applied to prevent ATM jackpotting and other attacks on ATMs and ASSTs

The Zero Trust model makes suspicious assumptions about the vulnerability of the infrastructure that manages ATM and ASST devices, for example that the remote access system can be manipulated or the maintenance technician or the end user can be attackers.

Auriga advises the most critical points to design a robust Zero Trust ATM and ASST protection model are:

  • Drastic reduction of the attack surface: access to software, hardware and communications is continuously verified and only granted to the minimum set of legitimate resources.
  • Tight control of changes in the ATM: to block any attempt to change software or hardware that has not been explicitly authorized. Hardware changes, made by third-party companies with physical access to the ATM should only be possible in authorised time periods , where a specific security policy that allows changes is applied, and subject to total monitoring of technical operations.

1.6 LOOKWISE DEVICE MANAGER – the Zero Trust Solution for ATMs and ASSTs

Auriga’s Lookwise Device Manager (LDM) allows an organisation to secure its ATMs, ASSTs and other critical devices based on the Zero Trust model.

LDM has been designed based on the knowledge of the ATM infrastructure and the attacker’s tactics and techniques, and that’s why it provides with the most comprehensive layered protection model to protect an ATM at all stages of the attack life-cycle while ensuring full availability to services for customers.

Auriga LDM protects the device against FiXS in the different phases of the attack life cycle (preparation, infection, persistence and execution) thanks to its comprehensive layered protection model that includes hard disk encryption, integrity control of the Windows registry and file system and whitelisting system for applications, hardware devices and communications.

    
  • Tweet
  • News
  • Press Release
  • Press Review
  • Blog
  • Videos
  • Infographics

DO YOU WANT INSIGHTS FROM THE WORLD’S BANKING INDUSTRY?

JOIN THE AURIGA COMMUNITY TO BE ALWAYS UPDATED ON:

News on software solutions

Invitations to industry events

Customer stories

Reports

Market research

...and much more!

LET'S CONNECT
CONTACT

HEADQUARTER - BARI
Via Don Luigi Guanella, 17
70124 Bari - Italy

TEL: +39.080.5692111

info@aurigaspa.com

Milan office
Rome office
Brussels office
London office
Madrid office
Mexico City office

BUSINESS CONTACTS
Niccolo Garzelli - Auriga - Footer

Niccolò Garzelli Milan office
niccolo.garzelli@aurigaspa.com

MARK ALDRED London office
mark.aldred@aurigaspa.com

brendan-thorpe-contacts

BRENDAN THORPE London office
brendan.thorpe@aurigaspa.com

Stefano Cipollone Milan office
stefano.cipollone@aurigaspa.com

MARTIN ESPINELMexico City office
martin.espinel@aurigaspa.com

lukasz-feluch

ŁUKASZ FELUCHVarsaw office
lukasz.feluch@aurigaspa.com

RUDY DE WOLFBrussels office
rudolf.dewolf@aurigaspa.com

angel arenillas

ÁNGEL ARENILLAS YUSTEMadrid office
angel.arenillas@aurigaspa.com

Kelum-Dissanayake-Auriga-Footer

Kelum Dissanayakekelum.dissanayake@aurigaspa.com

EXPLORE
  • About Us
  • WinWebServer
  • Blog
  • White Papers
  • Research
LATEST NEWS
  • Hybrid-Branch-Digital-and-Physical-Blog-ENG-Auriga

    The Hybrid Branch: Blending Digital and Physical Banking

    14/04/2025
  • Access to cash

    Maintaining ATMs and Access to Cash: a Worldwide Issue

    14/04/2025
  • service-delivery-manager-job-vacancies-auriga

    Service Delivery Manager – Brussels (Belgium)

    09/04/2025

Connect with us

SUBSCRIBE TO THE NEWSLETTER

Join the Auriga community

Let's connect

Auriga Spa - Copyright © 2025 - All rights reserved | Legal Notice | Privacy Policy | Whistleblowing Policy | Social Media Policy
P.I. 05566820725 - Capital € 1.196.055 i.v. - R.E.A. 426675

TOP
Gestisci Consenso

We, and third party websites you may interact with via our site, use cookies to collect site usage data and improve your experience, this includes permanent and profiling cookies. By clicking ‘Accept’ you agree to allow cookies, however you can disable this through your browser settings at anytime. If you opt to totally or partial disable cookies, this might compromise some features on the website. For more information on our cookie policy, go to the Legal Notice page.

Functional Always active
L'archiviazione tecnica o l'accesso sono strettamente necessari al fine legittimo di consentire l'uso di un servizio specifico esplicitamente richiesto dall'abbonato o dall'utente, o al solo scopo di effettuare la trasmissione di una comunicazione su una rete di comunicazione elettronica.
Preferenze
L'archiviazione tecnica o l'accesso sono necessari per lo scopo legittimo di memorizzare le preferenze che non sono richieste dall'abbonato o dall'utente.
Statistiche
L'archiviazione tecnica o l'accesso che viene utilizzato esclusivamente per scopi statistici. L'archiviazione tecnica o l'accesso che viene utilizzato esclusivamente per scopi statistici anonimi. Senza un mandato di comparizione, una conformità volontaria da parte del vostro Fornitore di Servizi Internet, o ulteriori registrazioni da parte di terzi, le informazioni memorizzate o recuperate per questo scopo da sole non possono di solito essere utilizzate per l'identificazione.
Marketing
L'archiviazione tecnica o l'accesso sono necessari per creare profili di utenti per inviare pubblicità, o per tracciare l'utente su un sito web o su diversi siti web per scopi di marketing simili.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}