Prevention
- Security Assessment
- Red Teaming
- Compliance Audit
- Pre-IR Assessment
- Compromise Assessment
- Cyber Education
- GIB Crypto

Banks of at least 14 countries including Russia, the UK, the Netherlands and Malaysia have suffered the attacks from this criminal group.
The 'touchless jackpotting' technique employed does not involve any physical manipulations of ATMs.
Bank systems are infected using tools that are widely available in public sources.
The shortest time taken to obtain total control over the banking network – 10 minutes.
How this attack’s malware spreads through internal banking networks and provides for its survivability.
Functional specifics of the ATM malware used to dispense money on demand.
The attack scheme and roles of group members.
Indicators of Compromise and attack prevention tactics.
Logical attacks on ATMs are expected to become one of the key threats targeting banks: they enable cybercriminals to commit fraud remotely from anywhere globally and attack the whole ATM network without being 'on the radar' of security services. That said, this type of attack does not require development of expensive advanced software – a significant amount of the tools used are widely available on the deep web. Every bank is under threat of logical attacks on ATMs and should be protected accordingly.

Chief Technical Officer, Сo‑founder Group‑IB








































































Group-IB’s security ecosystem provides comprehensive protection for your IT infrastructure based on our unique cyber intelligence and deep analysis of attacks and incident response.
Аctionable, finished intelligence to track actors and prevent attacks before they happen
Comprehensive solution to protect corporate network, hunt for threats and respond to even the most complex cyber attacks
Client-side digital identity protection and fraud prevention in real time
Al-driven online platform for external digital risk identification and migration