The U.S. Department of Justice has announced a new indictment charging 31 individuals in connection with a multi-million dollar ATM "jackpotting" scheme that has targeted banks across the United States. This action, part of a Homeland Security Task Force operation, brings the total number of individuals charged in the conspiracy to 87. The indictment alleges that the defendants, many of whom are Venezuelan and Colombian nationals, conspired to commit bank fraud and computer intrusion. Notably, several members of the violent transnational gang Tren de Aragua (TdA) have been identified among the accused, illustrating a dangerous fusion of traditional organized crime with sophisticated cybercrime techniques.
The conspiracy revolves around a technique known as "ATM jackpotting." This is a type of logical attack where criminals use specialized malware and/or physical access to an ATM to force it to dispense all its cash on command. The operation was large-scale, involving coordinated teams of "money mules" who would travel to ATMs to collect the stolen cash.
The indictment includes 32 counts, covering charges such as:
The involvement of the Tren de Aragua (TdA) gang is a significant development. TdA is a powerful and violent gang originating from Venezuela, known for extortion, kidnapping, and drug trafficking. Their expansion into high-tech financial crimes like ATM jackpotting shows an evolution in their capabilities and a diversification of their criminal enterprise.
ATM jackpotting attacks typically involve several steps:
Physical Security: Strengthen physical security controls on all ATMs. This includes using high-security locks, installing alarms on cabinet doors, and conducting regular physical inspections.
Application Whitelisting: Implement application whitelisting on the ATM's underlying operating system (often Windows). This prevents any unauthorized executables, including malware, from running.
Harden the OS: Apply security hardening baselines to the ATM's operating system, disable autorun features for USB devices, and restrict boot sequences to the primary hard drive.
Network Segmentation: Isolate the ATM network from other parts of the bank's corporate network. Monitor traffic for any suspicious outbound connections.
File Integrity Monitoring: Use file integrity monitoring to detect any unauthorized changes to critical system files or the addition of new files on the ATM's hard drive.
Implementing application whitelisting on the ATM's operating system is one of the most effective controls against jackpotting malware.
Mapped D3FEND Techniques:
Hardening the ATM's OS by disabling unused ports, services, and autorun features reduces the attack surface.
Mapped D3FEND Techniques:
Physically securing USB ports and other inputs prevents attackers from easily connecting devices to install malware.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats