The malware records the magnetic stripe information on the back of a card as well as the PIN (Personal Identification Number), which would potentially allow criminals to clone the card in order to withdraw cash.
The collected card data, which is encrypted using the DES (Data Encryption Standard) algorithm, can be printed out by the ATM’s receipt printer, Trustwave wrote.
The malware is controlled via a GUI that is displayed when a so-called “trigger card” is inserted into the machine by a criminal. The trigger card causes a small window to appear that gives its controller 10 seconds to pick one of 10 command options using the ATM’s keypad.
A criminal can then view the number of transactions, print card data, reboot the machine and even uninstall the malware. Another menu option appears to allow the ejection of an ATM’s cash cassette.
Whoa. This is BAD.
Seriously, though – DES? Cmon, any first year computing student learns that DES has already been outdated by it’s bigger and badder brother, the Advanced Encryption Standard.
See? I do learn things in Introduction to Systems! 🙂
However, the REAL WTF here is why ATMs all over the world are running WINDOWS in the first place. I’m no Apple fanboy (har, har), but even I recognise that Windows isn’t the most hacker-proof OS out there.