Ready-to-Use Malware for Bitcoin ATMs Found for Sale Online:Report

Ready-to-Use Malware for Bitcoin ATMs Found for Sale Online:Report

According to a blog post published on August 7, security software maker Trend Micro, based in Tokyo, Bitcoin (BTC) made automatic teller machine (ATM) malware available for online purchase. For the price of $ 25,000, criminals can purchase bitcoin ATM malware with the card used with EMV and Pass-Field Communication (NFC) capabilities.

EMV chips were originally developed by leading credit card providers to store information on integrated circuits rather than magnetic strips, whereas NFC enables two electronic devices to exchange data wirelessly.

Malicious software exploited bitcoin ATM vulnerabilities, which allows fraudsters to get BTC equivalent to $ 6,750, Euros, U.S. Dollars. According to Trend Micro, the seller has received over 100 online reviews for both malware and other products.

Another forum thread revealed that the seller also provides regular ATM malware that has been updated for EMV standards. Further research has shown that in order to disable the malware alarm, the menu exploits the vulnerability to disconnect the ATM.

Another recent study by cyber security company Duo Security unveiled a network of thousands of scripts related scams related to Twitter, advertising fake “liabilities”. The project included 88 million Twitter accounts, in which researchers used machine learning techniques to train a bot classifier. The classification detected 15,000 bots spread in fake competitions and impersonated some of the most famous figures and businesses in the Cryptocurrency industry.

In July, Valve Corporation removed a game from its Steam video game marketplace, which allegedly hacked users’ computers in Monero. Steam took action after complaints from many users, who said that the game setup file contains a Trojan virus and malware that is hidden in the form of steam.exe processes and launcher.

About The Author

Related posts

Leave a Reply

Your email address will not be published. Required fields are marked *