Two Venezuelan nationals sentenced for deploying malware to empty ATMs across the southeastern US, highlighting persistent vulnerabilities in legacy banking hardware and the need for layered security controls.
Federal prosecutors in South Carolina have sentenced two Venezuelan nationals for orchestrating a sophisticated ATM jackpotting scheme that stole hundreds of thousands of dollars from banks across the southeastern United States. Luz Granados, 34, and Johan Gonzalez-Jimenez, 40, pleaded guilty to conspiracy and computer crimes for using malware to force ATMs to dispense all available cash. Both face deportation after serving their sentences and paying restitution totaling over $400,000.

The Attack Method: Physical Access and Malware Deployment
The scheme followed a consistent pattern that exploited both physical and digital vulnerabilities. According to the Justice Department, the attackers would approach ATMs at night, remove the outer casing, and connect a laptop directly to the machine's internal components. This physical access allowed them to install malware that bypassed the ATM's security protocols.
The malware variant identified in this case is a variant of Ploutus, a known ATM jackpotting malware family that has been active for years. The attackers used multiple deployment methods:
- Direct installation via external devices (like USB thumb drives)
- Hard drive replacement - swapping the ATM's original hard drive with one already infected with the malware
- Direct connection to internal systems to install the malware
Once deployed, the malware forced unauthorized cash withdrawals until the machine was empty. Critically, the malware also deleted evidence to conceal the attacks from bank employees and security systems. All stolen funds came directly from bank reserves rather than individual customer accounts, targeting institutions in South Carolina, Georgia, North Carolina, and Virginia.
Why Legacy ATMs Remain Vulnerable
This case exposes a persistent problem in banking infrastructure: many ATMs still run on outdated operating systems and lack modern security controls. The Ploutus malware family has been documented since at least 2013, yet it continues to be effective against certain ATM models.
The attack relies on several systemic weaknesses:
Physical Security Gaps: Many ATMs are installed in locations with inadequate physical protection. The outer casings can be opened with basic tools, and internal components are accessible once the case is removed. Banks often prioritize convenience and cost over robust physical security for ATM installations.
Legacy Operating Systems: Many older ATMs run on Windows XP or Windows 7, operating systems that no longer receive security updates. These systems lack modern security features like secure boot, application whitelisting, and robust intrusion detection.
Insufficient Network Segmentation: While ATMs typically connect to bank networks through dedicated lines, the internal systems often lack proper segmentation. Once an attacker gains physical access, they can often reach broader network components.
Lack of Integrity Monitoring: Many ATMs don't have robust file integrity monitoring or behavioral analysis that would detect unauthorized changes to system files or unusual cash dispensing patterns.
The Broader Criminal Network
The South Carolina case is part of a larger pattern. The District of South Carolina shared evidence with Nebraska authorities, leading to a federal grand jury in Nebraska indicting 54 individuals in a related ATM jackpotting conspiracy. These indictments allegedly involve thefts of millions from ATMs across the United States.
Notably, the Nebraska indictments target Jimena Romina Araya Navarro, an entertainer and alleged leader of the Tren de Aragua Venezuelan gang, who was sanctioned by the Department of the Treasury's Office of Foreign Assets Control in December. This connection suggests organized criminal groups are coordinating these attacks across state lines.
The Justice Department has also announced that five other Venezuelan nationals face immediate deportation for similar ATM jackpotting thefts across multiple U.S. states, indicating this is a coordinated campaign rather than isolated incidents.
Practical Security Recommendations for Banks
Financial institutions must implement a defense-in-depth strategy that addresses both physical and digital vulnerabilities:
Physical Security Enhancements
- Tamper-evident seals and sensors: Install sensors that trigger alerts when ATM casings are opened or tampered with
- Improved casing design: Use reinforced casings with multiple locking mechanisms and internal sensors
- Environmental monitoring: Deploy cameras and motion sensors around ATM installations, especially for standalone machines
- Regular physical inspections: Conduct frequent, unannounced inspections of ATM hardware for signs of tampering
Digital Security Controls
Operating System Modernization: Migrate ATMs to supported operating systems like Windows 10 IoT Enterprise or specialized ATM OS versions that receive regular security updates
Application Whitelisting: Implement strict application control policies that only allow authorized software to run
File Integrity Monitoring: Deploy monitoring systems that detect unauthorized changes to system files, configuration files, and executable binaries
Behavioral Analytics: Implement systems that monitor for unusual patterns, such as:
- Unusual cash dispensing rates
- Attempts to access restricted system functions
- Unauthorized connection attempts
- Changes to security settings
Network Segmentation: Isolate ATM networks from broader bank infrastructure using firewalls and micro-segmentation
Secure Boot Implementation: Ensure ATMs use hardware-based secure boot to prevent loading of unauthorized operating systems or bootloaders
Regular Security Audits: Conduct penetration testing and vulnerability assessments specifically targeting ATM systems
Incident Response and Monitoring
- Real-time Alerting: Implement systems that alert security teams immediately to suspicious ATM activity
- Remote Monitoring Capability: Enable secure remote monitoring of ATM health and security status
- Forensic Readiness: Ensure ATMs maintain audit logs that can survive tampering attempts
- Coordination with Law Enforcement: Establish protocols for rapid reporting and evidence preservation when attacks occur
The Role of ATM Manufacturers
ATM manufacturers must also take responsibility for security by:
- Designing for Security: Building physical and digital security into the design phase, not as an afterthought
- Regular Security Updates: Providing timely patches for discovered vulnerabilities
- Security by Default: Shipping ATMs with secure configurations enabled by default
- Transparency: Disclosing vulnerabilities and providing clear remediation guidance
Regulatory and Industry Considerations
The Financial Services Information Sharing and Analysis Center (FS-ISAC) provides guidance for ATM security, but adoption varies. Financial regulators should consider:
- Minimum Security Standards: Establishing baseline security requirements for ATM deployments
- Regular Reporting: Requiring banks to report ATM security incidents and near-misses
- Incentives for Modernization: Providing regulatory incentives for banks that invest in modernizing ATM security
Conclusion
The deportation of these Venezuelan nationals represents law enforcement's response to a specific case, but the underlying vulnerabilities remain. ATM jackpotting continues to be a viable attack vector because many institutions have not prioritized security upgrades for legacy systems.
The Ploutus malware family has been known for over a decade, yet it remains effective. This persistence suggests that security investments in physical ATM protection and modern digital controls have been insufficient. Banks must recognize that ATMs are not just cash dispensers but critical network endpoints that require the same security consideration as other IT systems.
For security professionals, this case serves as a reminder that physical access attacks remain a significant threat, especially when combined with digital exploits. Defense strategies must address both vectors simultaneously, as attackers will exploit whichever weakness is easier to target.
The ongoing nature of these attacks, evidenced by the 54 indictments in Nebraska and the continued sentencing of perpetrators, indicates that coordinated, organized criminal groups view ATM jackpotting as a profitable enterprise. Until banks and manufacturers implement comprehensive security controls, these attacks will likely continue.
Related Resources:

Comments
Please log in or register to join the discussion