April 11, 2026 Newsletter
Jackpotting is a cash-out attack where criminals make an ATM dispense money on command—not by withdrawing from an account, but by taking control of the machine or its cash-dispensing component.
Malwarebytes summarizes this as a “logical attack” that manipulates an ATM’s system using malware or a “black box” device once physical access is achieved.
Think of it as turning the ATM into a vending machine for cash.
How this scheme allegedly worked (the repeatable playbook)
Based on DOJ statements and reporting, the approach is methodical and operationally disciplined—not a smash-and-grab.
Reconnaissance first
Teams scout targeted ATMs and assess visible security measures, then test whether opening the hood/door triggers alarms or draws a law enforcement response.
Get physical access
Jackpotting typically requires direct access to the top box/service area (even if briefly). This is the bridge between “physical security” and “cyber compromise.”
Install Ploutus malware
Reporting describes Ploutus being installed by either:
swapping the hard drive with a preloaded one, or
connecting a removable thumb drive to load the malware.
Force the cash dispenser to pay out
The malware issues unauthorized commands to the ATM’s Cash Dispensing Module to dispense cash.
Cover tracks, split proceeds, move money
DOJ described Ploutus as being designed to delete evidence to conceal deployment, and proceeds were split and moved among members to conceal origin.
At national scale, The Hacker News reports DOJ cited 1,529 jackpotting incidents in the U.S. since 2021 and ~$40.73M in losses attributed to this network as of August 2025.
Why this matters beyond the cash loss
1) Jackpotting is an operational risk event
This is not just money leaving the cassette. It triggers:
ATM downtime and customer disruption
emergency service calls and vendor dispatch
branch/vestibule closures and physical repairs
fraud operations surge + incident handling costs
2) The attack surface is “hybrid” by design
ATMs are managed through vendors, serviced in the field, updated on schedules, and physically accessible. That combination makes them uniquely exposed to:
short-window physical access
removable media/service ports
legacy OS and constrained patch cycles
shared vendor tooling and credentials
3) The targeting pattern is a warning
When a crew can run dozens of attempts across many locations, they’re optimizing for repeatability. Reporting indicates credit unions were heavily targeted in at least one indictment period.
The Record from Recorded Future
What to do now: a practical control checklist
Below is the control stack InfoSight typically prioritizes for ATM environments. The point is not “one magic product.” The point is closing the specific doors jackpotting relies on: access + execution + payout + escape.
A) Physical hardening (deny access)
Upgrade top-box locks and reinforce cabinet/door integrity; eliminate easy pry points.
Add/verify tamper detection on doors and service panels; ensure alarms route to a monitored channel.
Reduce exposure of off-premise machines; improve lighting/camera coverage; tighten after-hours access controls.
Apply service-port controls (covers, internal relocation, tamper seals) and enforce technician authentication procedures.
B) Endpoint controls on the ATM (deny execution)
Application allowlisting (default-deny) so unapproved binaries cannot run.
Disable or restrict:
unused USB/storage devices
boot from external media
local admin tools not required for operations
Patch the OS and ATM middleware on a disciplined cadence aligned to vendor constraints.
Harden logging on the ATM host and forward logs centrally (don’t leave evidence local-only).
(These measures directly cut off the USB/hard-drive swap paths described in reporting.)
C) Network segmentation and vendor access (limit blast radius)
Place ATMs in tightly controlled network segments with least-privilege routing.
Lock down remote administration:
MFA for any remote access
short-lived vendor credentials
full session logging
Monitor for unusual connections from ATM subnets (new destinations, tools, or protocols).
D) Detection + response that matches the attack tempo (contain fast)
Correlate physical tamper events with cyber telemetry:
door open + unexpected process execution
service access outside maintenance windows
Run a simple, rehearsed playbook:
disable ATM / isolate segment
preserve disk images/logs
coordinate with vendor and law enforcement
Put this into a 24x7 monitoring model; jackpotting is fast and often happens off-hours.
E) Program governance (make it sustainable)
Treat ATMs as a named asset class in vulnerability management (not “misc endpoints”).
Perform recurring control validation:
port exposure checks
allowlist drift reviews
vendor access audits
Run tabletop exercises for jackpotting scenarios (physical + cyber + comms).
InfoSight take
This case reinforces a simple operational truth: a cash-out crew doesn’t need to outsmart your entire enterprise—only your ATM weak points and your response speed. The defensive advantage comes from layered friction (deny access), technical prevention (deny execution), tight segmentation (limit impact), and fast monitoring/response (contain before repeat hits).
InfoSight supports financial institutions with hardening, vulnerability management, and 24x7 monitoring/response that ties cyber signals to real operational outcomes—reducing the window where an ATM can be turned into a cash dispenser for criminals.
Source
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.
Enter your details below to download the PDF.