Automatic teller machines (ATMs) may soon be facing more malware attacks as criminals develop better creation tools that others can add to their arsenal.
ATM malware has been on the scene since around 2009 after the Skimer malware was spotted infecting ATMs, allowing attackers to grab victims' bank account numbers and PINs.
Trend Micro and GMV Secure e-solutions have developed predictions for the future of ATM malware and the companies say there are two main ways it will develop in future: malware creation kits and open source software.
Researchers Juan Jesús León and David Sancho believe that the current malware landscape is made up of two distinct groups.
Simple malware families for use in network attacks are able to disable security on ATM endpoints after a lengthy setup process. León and Sancho say an ATM infection is just a way to monetise the criminals' efforts and dispense money.
Complex malware families have physical components or measures to further crime business plans, say León and Sancho. They believe additional features such as switching networks off are able to strip any current protection.
Physical intrusion attacks are also creating tension between cybercriminals as some ‘go rogue' and start conducting attacks of their own. León and Sancho say there is distrust amongst developers and ‘money mules' which demands more complex malware.
The researchers believe there are two ways ATM malware will develop in future.
Malware creation kits will allow developers to customise malware for every attack. This could eventually see a criminal marketplace amongst gangs who resell the kits to other criminals.
“This would continue the increasing complexity of physical ATM malware we are currently seeing,” the researchers say.
The second way ATM malware may develop is through the use of open source tools for criminals. The tools would allow hackers to complete their network intrusion process.
“Why open source? We hypothesize that given the simplicity of the tool, that would be a great way for the criminals to hinder further investigation on the machines. Since the tool would be publicly accessible, there would be no more clues left behind in those very sensitive machines,” León and Sancho state.
While they admit these predictions may not eventuate, the current ATM malware landscape is pointing in that direction. They urge all stakeholders should take their predictions into account when protecting their assets in future.
“Don't say we didn't warn you,” they conclude.