A new type of malicious software targeting ATMs has been identified in the digital space, with a success rate of up to 99% according to the developers. This software, known as “EU Atm Malware”, has the capability to hack almost any ATM in Europe and around 60% of ATMs globally, posing a significant risk to banking security worldwide.

The “EU Atm Malware” has been reported to target ATMs from major manufacturers like Diebold Nixdorf, Hyosung, Oki, Bank of America, NCR, GRG, and Hitachi. Cybercriminals can potentially withdraw up to $30,000 from a single ATM using this sophisticated software, making it an appealing tool for illegal activities.

One of the standout features of this malicious software is its automation, making it easy to deploy and operate. However, for those who prefer a more hands-on approach, manual control mode is also available.

The developers of the software are offering flexible purchasing options, including monthly subscriptions, a three-day trial period, and the option to make an initial contribution plus a share of the profits from successful ATM attacks.

This new threat highlights the need for increased cybersecurity measures in the European banking sector, known for its stringent security protocols. Banking institutions globally must adapt to this new challenge and devise strategies to safeguard their systems against such malicious attacks. Only by taking a comprehensive and proactive approach can they effectively protect themselves in the digital age.

/Reports, release notes, official announcements.