It is a complex automated device located in the lower, more protected part of the ATM (safe) and managed by the controller.
A dispenser controls the cash dispensing cassettes.Alexey Stennikov is currently an independent researcher.In 2018, Positive Technologies experts helped eliminate vulnerabilities in ATMs of another major manufacturer, NCR. On October 29, Vladimir Kononovich will talk about the detected vulnerabilities at the Hardwear.io hardware security conference in The Netherlands. Moreover, as an additional security factor, the vendor should enable physical authentication for the operator during firmware installation. To fix the vulnerabilities, credit organizations must request the latest firmware version from ATM manufacturers. The second, CVE-2018-9100, was detected in the firmware of the RM3/CRS dispenser (all versions up to and including 41128 1002 RM3_CRS.BTR and 170329 2332 RM3_CRS.FRM). The first flaw, CVE-2018-9099, was detected in the firmware of the CMD-V5 dispenser (all versions up to and including 141128 1002 CD5_ATM.BTR and 170329 2332 CD5_ATM.FRM). However, our research shows that such equipment is not difficult to find on the open market and analyze, which can be used by criminal groups.īoth vulnerabilities received a CVSSv3.0 score of 6.8. Currently, the attack scenario consists of three steps: Connecting a computer to an ATM, loading outdated and vulnerable firmware, and exploiting the vulnerabilities to access the cassettes inside the safe."Īccording to Vladimir Kononovich, some manufacturers rely on security through obscurity, with proprietary protocols that are poorly studied and the goal of making it difficult for attackers to procure equipment to find vulnerabilities in such devices.
Bugs in the controller code and old encryption keys allowed us to connect to an ATM using our own computer (as in a classic black-box attack), bypass the encryption, and make a cash withdrawal. At a popular website, we bought the same dispensing controller as the one used in Wincor's ATMs.
Vladimir Kononovich, Senior Specialist of ICS Security at Positive Technologies, says: "In the case of Wincor Cineo, we managed to figure out the command encryption used in the interaction between the PC and the controller, and bypass the protection against black-box attacks.
The computer sends encrypted commands to the dispenser, and a hacker cannot withdraw money without encryption keys stored on the ATM computer. This protection is achieved by using end-to-end encryption between an ATM computer and the dispenser. Modern ATMs, including Wincor Cineo, have built-in protection against black-box attacks. In a research performed by Positive Technologies in 2018, 69 percent of ATMs turned out to be vulnerable to such attacks and could be hacked in minutes. In such attacks, a hacker connects to the dispenser via a computer or a mobile device and sends a special code to the dispenser, which results in the ATM dispensing money. Most previous generations of ATMs could not withstand black-box attacks. Diebold Nixdorf has more than 1 million of its ATMs installed worldwide, which makes it the largest ATM manufacturer with a 32 percent share of the global market.
With access to the dispenser controller's USB port, an attacker can install an outdated or modified firmware version (for example, with disabled encryption) to bypass the encryption and make cash withdrawals. Positive Technologies researcers, Vladimir Kononovich and Alexey Stennikov 1 have discovered vulnerabilities in the Wincor Cineo ATMs with the RM3 and CMD-V5 dispensers 2 (Wincor is currently owned by Diebold Nixdorf). Researchers Bypassed Black-Box Attack Protections and Withdrew Cash