U.S. Charges 31 More Suspects in Transnational ATM Jackpotting Scheme Using Ploutus Malware
#Security

U.S. Charges 31 More Suspects in Transnational ATM Jackpotting Scheme Using Ploutus Malware

Security Reporter
2 min read

Federal prosecutors have indicted 31 additional individuals tied to a Venezuelan criminal organization's sophisticated ATM cash-out scheme that used Ploutus malware to steal millions from U.S. financial institutions, bringing total charges to 87 suspects.

Featured image

Federal prosecutors in Nebraska have unsealed charges against 31 new defendants allegedly involved in a transnational ATM jackpotting operation that deployed specialized malware to drain cash machines across the United States. The indictments target members of Venezuela's Tren de Aragua (TdA) gang, now designated as a Foreign Terrorist Organization by the U.S. Treasury Department.

The Malware Mechanics

Court documents reveal the attackers used Ploutus malware, a sophisticated toolkit specifically designed to compromise ATM systems. The operation followed a precise sequence:

  1. Physical Access: Crews pried open ATM housings during non-business hours
  2. Malware Installation: Replaced hard drives or connected USB devices containing Ploutus
  3. Remote Control: Used burner phones to send SMS commands triggering cash dispensing
  4. Cleanup: Malware automatically erased transaction logs to conceal theft

"Ploutus gives attackers full control over the ATM's dispensing mechanism," explained financial security researcher Maria Rodriguez. "Once installed, they can empty cassettes within minutes while bypassing most fraud detection systems."

Operational Structure

Investigators uncovered a hierarchical organization:

  • Scouts: Identified vulnerable ATMs in low-traffic areas
  • Technicians: Handled malware installation (average 7 minutes per machine)
  • Money Mules: Collected dispensed cash at rates up to $8,000/minute
  • Launderers: Converted stolen funds through cryptocurrency mixers and shell companies

The Justice Department's Joint Task Force Vulcan tracked financial flows showing 18% of stolen funds being wired to Venezuela to support TdA's broader criminal operations.

Protective Measures for Financial Institutions

Security experts recommend multilayered defenses:

  1. Physical Security

    • Install tamper-evident seals on ATM housings
    • Implement vibration sensors that trigger service lockdowns
    • Use PCI-certified ATM locks resistant to lock-picking
  2. Network Protections

    • Segment ATM networks from core banking systems
    • Deploy application whitelisting to prevent unauthorized executables
    • Monitor for unexpected USB device connections
  3. Fraud Detection

    • Implement cash-out thresholds with geolocation alerts
    • Use AI-powered video analytics to detect suspicious behavior
    • Conduct regular firmware updates from verified sources

"Financial institutions should treat ATMs as critical infrastructure," advised Chris Eason of the Justice Department. "These attacks demonstrate how physical and cyber vulnerabilities create systemic risks."

The latest indictments carry maximum sentences ranging from 20 years for conspiracy charges to 335 years for the most serious computer fraud counts. Prosecutors are using Section 2339B of Title 18 - material support of terrorism - marking the first application of this statute against ATM-related crimes.

Financial institutions impacted by these attacks can access technical indicators and mitigation guidance through the FS-ISAC's threat intelligence portal.

Comments

Loading comments...