Categories: Cyber Security News

Ploutus Malware Drains U.S. ATMs Without a Card or Account — FBI Issues Emergency FLASH Alert

A 19 February 2026 FBI FLASH (FLASH-20260219-001) warns banks and ATM operators about a rise in malware-enabled “jackpotting,” where criminals exploit physical access and software gaps to make machines pay out cash without a real transaction, a pattern now seen across the United States.

The alert focuses on Ploutus, an ATM-targeting malware family that abuses eXtensions for Financial Services (XFS), the software layer that tells dispenser hardware what to do.

Sponsored

In a normal withdrawal the ATM app sends XFS commands for bank approval, but Ploutus lets an intruder issue commands and bypass authorization.

The Federal Bureau of Investigation (FBI) analysts noted the activity while compiling indicators of compromise and other technical details to help organizations respond, reporting that more than 700 of roughly 1,900 jackpotting incidents since 2020 occurred in 2025 and produced over $20 million in losses.

Unlike fraud that steals card data, Ploutus attacks the ATM itself and can dispense cash without a bank card, customer account, or bank approval, so cash-out can happen in minutes.

Howeverm it may not be spotted until the machine is low on cash, and many crews begin by opening the ATM face with widely available generic keys.

Infection mechanism and on-box control

Once physical access is gained, attackers may pull the hard drive, connect it to another computer, copy the malware, reinstall it, and reboot, or they may swap in a foreign drive or external device that already carries the payload, sometimes alongside a plugged-in USB hub or keyboard.

Since many ATMs run Windows, the same approach can be adapted across different manufacturers with only small code changes, and the malicious program talks directly to hardware through XFS, so it may work even when the ATM is offline and network alerts stay quiet.

Sponsored

To stay in place and hide, responders should look for unexpected executables such as Newage.exe, NCRApp.exe, WinMonitor.exe, or sdelete.exe, new folders under paths like C:UsersSSAuto1AppDataLocalP, unauthorized remote tools like AnyDesk or TeamViewer, and registry autoruns or custom services with generic names like “ATM Service” and “Dispenser Service.”

The FBI recommends changing standard locks, adding tamper sensors and camera coverage, enabling disk encryption and hardware device whitelisting.

Validating each ATM against a trusted gold image and baseline hashes, and turning on targeted Windows auditing so USB insertion, file writes, process creation, and log clearing (Event IDs 6416, 4663, 4688, 1102) can be correlated, then report suspected jackpotting to a local FBI field office or IC3.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Ploutus Malware Drains U.S. ATMs Without a Card or Account — FBI Issues Emergency FLASH Alert appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The Lehrer Report: March 5, 2026

Reminder: this weekend is the semi-annual changing of the clocks. Digital devices do it automatically.…

11 minutes ago

A Look Back, March 5

50 Years Ago A 38-year-old Connecticut city planner yesterday assumed his duties as the new…

11 minutes ago

‘I want to see the club survive’: Pulaski Club in Easthampton faces uncertain future after losing liquor license

EASTHAMPTON — The Pulaski Club has to apply for a new liquor license, a fact that…

11 minutes ago

Belchertown emerging as AI leader in local government

BELCHERTOWN — Last week, Gov. Maura Healey announced a partnership with Google to offer all…

11 minutes ago

South Hadley voters to decide on $9M or $11M tax levy override

SOUTH HADLEY — Voters will have the choice between two Proposition 2-1/2 override amounts on…

11 minutes ago

Southampton faces budget deficit, mulls override

SOUTHAMPTON — Budget projections indicate the town is facing an approximately $2 million deficit in…

11 minutes ago

This website uses cookies.