DMR News

Advancing Digital Conversations

FBI Reports Surge In ATM Jackpotting Attacks Driven By Malware And Physical Access

ByJolyen

Feb 20, 2026

FBI Reports Surge In ATM Jackpotting Attacks Driven By Malware And Physical Access

ATM “jackpotting” has moved from a conference-stage demonstration into a sustained criminal operation, with the FBI reporting more than 700 attacks on cash dispensers in 2025 that produced at least $20 million in losses, driven by a mix of physical access methods and malware that gives attackers direct control over machines.

From Onstage Demo To Criminal Method

The technique traces back to 2010, when security researcher Barnaby Jack demonstrated an ATM exploit onstage at the Black Hat security conference and forced a machine to eject cash in front of an audience. More than a decade later, the same class of attack now appears in routine criminal activity, according to a new FBI security bulletin.

The bureau said attackers have “rapidly ramped up” activity in recent years. In 2025 alone, it counted over 700 incidents targeting cash dispensers, with total losses of at least $20 million in stolen notes.

How The Attacks Are Carried Out

The bulletin describes two main approaches. One relies on physical access to the machines, including the use of generic keys to open front panels and reach internal components such as hard drives. The other relies on digital tools, including malware planted on the ATM to force it to dispense cash quickly.

Both approaches focus on the machine itself rather than on customer accounts, a detail the FBI highlighted as a reason the thefts can be completed in a short time and remain unnoticed until after the cash is gone.

Ploutus And The Windows-Based ATM Stack

The FBI singled out one malware family, known as Ploutus. According to the bulletin, it affects a variety of ATM manufacturers and cash dispensers by targeting the Windows operating system that powers many machines. Once installed, Ploutus grants attackers full control over the compromised ATM and allows them to issue instructions that cause the dispenser to release cash without drawing funds from customer accounts.

Ploutus exploits the Extensions for Financial Services, or XFS, software layer. ATMs use XFS to communicate with hardware components such as the PIN keypad, the card reader, and the cash dispensing unit. By abusing this interface, the malware can direct the dispenser to pay out notes on command.

“Ploutus attacks the ATM itself rather than customer accounts, enabling fast cash-out operations that can occur in minutes and are often difficult to detect until after the money is withdrawn,” the FBI said in the bulletin.

Prior Research On XFS Weaknesses

The warning follows earlier work by security researchers who identified problems in XFS software that could allow attackers to trick ATMs into dispensing cash. Those findings focused on weaknesses in the software layer rather than on account compromise, a distinction that matches the FBI’s description of current attacks.

Sources referenced include the FBI security bulletin and prior research by security researchers on XFS-related issues.


Featured image credits: Collections – Get Archive

For more stories like it, click the +Follow button at the top of this page to follow us.

Jolyen

As a news editor, I bring stories to life through clear, impactful, and authentic writing. I believe every brand has something worth sharing. My job is to make sure it’s heard. With an eye for detail and a heart for storytelling, I shape messages that truly connect.

Leave a Reply

Your email address will not be published. Required fields are marked *