Federal prosecutors have indicted 31 additional individuals tied to a Venezuelan criminal organization's sophisticated ATM cash-out scheme that used Ploutus malware to steal millions from U.S. financial institutions, bringing total charges to 87 suspects.

Federal prosecutors in Nebraska have unsealed charges against 31 new defendants allegedly involved in a transnational ATM jackpotting operation that deployed specialized malware to drain cash machines across the United States. The indictments target members of Venezuela's Tren de Aragua (TdA) gang, now designated as a Foreign Terrorist Organization by the U.S. Treasury Department.
The Malware Mechanics
Court documents reveal the attackers used Ploutus malware, a sophisticated toolkit specifically designed to compromise ATM systems. The operation followed a precise sequence:
- Physical Access: Crews pried open ATM housings during non-business hours
- Malware Installation: Replaced hard drives or connected USB devices containing Ploutus
- Remote Control: Used burner phones to send SMS commands triggering cash dispensing
- Cleanup: Malware automatically erased transaction logs to conceal theft
"Ploutus gives attackers full control over the ATM's dispensing mechanism," explained financial security researcher Maria Rodriguez. "Once installed, they can empty cassettes within minutes while bypassing most fraud detection systems."
Operational Structure
Investigators uncovered a hierarchical organization:
- Scouts: Identified vulnerable ATMs in low-traffic areas
- Technicians: Handled malware installation (average 7 minutes per machine)
- Money Mules: Collected dispensed cash at rates up to $8,000/minute
- Launderers: Converted stolen funds through cryptocurrency mixers and shell companies
The Justice Department's Joint Task Force Vulcan tracked financial flows showing 18% of stolen funds being wired to Venezuela to support TdA's broader criminal operations.
Protective Measures for Financial Institutions
Security experts recommend multilayered defenses:
Physical Security
- Install tamper-evident seals on ATM housings
- Implement vibration sensors that trigger service lockdowns
- Use PCI-certified ATM locks resistant to lock-picking
Network Protections
- Segment ATM networks from core banking systems
- Deploy application whitelisting to prevent unauthorized executables
- Monitor for unexpected USB device connections
Fraud Detection
- Implement cash-out thresholds with geolocation alerts
- Use AI-powered video analytics to detect suspicious behavior
- Conduct regular firmware updates from verified sources
"Financial institutions should treat ATMs as critical infrastructure," advised Chris Eason of the Justice Department. "These attacks demonstrate how physical and cyber vulnerabilities create systemic risks."
Legal Implications
The latest indictments carry maximum sentences ranging from 20 years for conspiracy charges to 335 years for the most serious computer fraud counts. Prosecutors are using Section 2339B of Title 18 - material support of terrorism - marking the first application of this statute against ATM-related crimes.
Financial institutions impacted by these attacks can access technical indicators and mitigation guidance through the FS-ISAC's threat intelligence portal.

Comments
Please log in or register to join the discussion