how to buy and hack an atm
play

How To Buy And Hack an ATM Leigh-Anne Galloway & Timur Yunusov - PowerPoint PPT Presentation

How To Buy And Hack an ATM Leigh-Anne Galloway & Timur Yunusov About us Appsec/websec/banksec/infosec Incident response (payment investigation) No experience with ATM acquisition L_AGalloway a66at THE BIRTH OF AN IDEA HISTORY OF


  1. How To Buy And Hack an ATM Leigh-Anne Galloway & Timur Yunusov

  2. About us Appsec/websec/banksec/infosec Incident response (payment investigation) No experience with ATM acquisition L_AGalloway a66at

  3. THE BIRTH OF AN IDEA

  4. HISTORY OF ATM’S 1 9 7 2 John 2 0 1 7 1 9 6 7 1 9 6 9 Shepherd-Barron 3.8 million Barclays Lloyds USA

  5. MANUFACTURERS

  6. Identify market options Where to buy an ATM

  7. 4 WAYS TO BUY AN ATM G R E Y M A R K E T L E G A L Resellers, aftermarket ATM maintainers in listings, eBay, private your region, banks and sellers etc. manufacturers ? T H E W I L D C A R D B L A C K M A R K E T Guaranteed ATM but Underground market with a possibility of place imprisonment

  8. Legal and Grey market options

  9. The wildcard option Our CEO endorses the craziest ideas

  10. THE WILDCARD R O AD T R I P O F A L I F E T I M E A journey of over 1800 miles, a 50k euro deposit and the possibility of jail time in Russia

  11. Legal procurement The easiest option

  12. 16 HUSTLE VERIFY AKA SOCIAL ENGINEERING You need to convince a company that you are a legitimate company or have a story that is believable. You might need to establish an NCR 5877 account just for one item. NCR 6676 Cash in FACTOR IN LEAD TIME Most of these suppliers know when stock is due to come in. They might not have what you are looking for straight away NCR 6622 self service KNOW THY ATM Wincor 1500XE USB You need to know the exact model and specification, cassette configuration. Free-standing is your best option. Wincor 2100 XE Cash in LOGISTICS Wincor 2000XE USB Cash out Do you have a suitable place to store this? More on that later.

  13. Logistics A nightmare

  14. DELIVERY DAY E X P E C TAT I O N S R E AL I T Y

  15. POWER AND WEATHER

  16. How does it work, how can I break it?

  17. HOW IT WORKS Card Reader/PIN pad (EPP) Card reader and PIN pad verifies account holder PC Windows XP/7 80% variants of windows DISPENSER PC sends instructions to dispenser which selects correct denomination from cassettes. BANK NETWORK ATM connects to core banking network directly or through inter bank network or via antennae.

  18. ATM NETWORK

  19. ATTACK VECTORS B R U T E F O R C E O S L E V E L H A R D WA R E N E T W O R K Requires somehow getting Operating level attacks take Access via service area or Making use of network: physical access to the vault. advantage of OS level config, drilling, bypassing OS and unauthorised VPN The most popular methods Software vulnerabilities and connecting blackbox directly connection, malware, being explosives bypassing kiosk mode to the dispenser etc vulnerabilities in protocols

  20. HISTORY OF ATTACKS 2 0 1 3 2 0 1 0 2 0 1 2 2 0 1 4 Barnaby Jack Logical Attacks Blackbox PT published research

  21. Very Popular +30% 2016 High risk of being caught

  22. OS LEVEL

  23. OS LEVEL

  24. X F S A P I

  25. HARDWARE

  26. HARDWARE

  27. NETWORK

  28. NETWORK

  29. NETWORK

  30. ATMs everywhere >20 ATMs over a last year

  31. Application control for Application security https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html https://cansecwest.com/slides/2016/CSW2016_Freingruber_Bypassi ng_Application_Whitelisting.pdf https://www.ptsecurity.com/ww-en/about/news/131496/ https://www.ptsecurity.com/ww-en/about/news/240117/ https://www.ptsecurity.com/ww-en/about/news/283971/ https://embedi.com/blog/hack-atm-anti-hacking-feature-and-walk- away-1m-2-minutes/

  32. Controls flow vs Whitelist of dirs (c:\windows\system32, etc) Whitelist of files (c:\windows\system32\calc.exe, ipconfig.exe, etc) Hash comparing (usually SHA-256) Digital signatures (MS, Adobe, etc) Extensions blacklist

  33. Bypassing techniques Code execution in trusted apps (cmd, powershell) Hash collisions Bypassing extensions blacklist Another trusted applications (.NET, Java, PHP, etc) Misconfigurations DLL injections Poor restrictions( CL_Invocation.ps1, CL_LoadingAssembly.ps1 ) Exploits

  34. Attacking AppControls

  35. Product 1 1. From admin to GOD 2. Hello from 90’th 3. %SYSTEMROOT%\System32\ msiexec.exe “signed.msi” 4. Updates over HTTP, no application level signatures 5. Updates with signatures. Round 2, Fight ! …

  36. Product 2 1. Very Safe Mode 2. Open HANDLE before product 3. Remote control over HTTP S 4. No application level signatures 5. Turning protection off || RCE 6. Round 2. Fight! MD5(command) 1. MD5(RCE || turnoff) 2. Del Protector.sys 3. No self-control

  37. Very secure Product 3 Signatures, drivers and two smoking barrels Checking algo: If checked(file)==false while(!timeout){Hashcalc(file);} - Hashcalc(loo***0000***oong-exploit.exe) will be run once - Hashcalc(py T h 0 n.exe) will be run multiple times

  38. Products 4-5-6 1. Local unauthorised privileges escalation (you need to launch exploit.exe to bypass restrictions for launching exploit.exe) 2. Network-based BOF => RCE

  39. Review

  40. Review

  41. Industrial 3G modems Different boxes, same vulnerabilities ( http://blog.ptsecurity.com/2015/12/critical-vulnerabilities-in- 3g4g-modems.html ) 3g/4g downgrading attack + FakeBTS Access to web interface outside of VPN channel Authentication/Authorisation bypasses Proprietary VPN

  42. Industrial 3G modems

  43. Industrial 3G modems

  44. End-To-End tunnel’s binaries RCE

  45. Kudos to PT Research Center @groke @ivachyou @yarbabin Maxim Kozhevnikov Leonid Krolle

  46. https://uk.linkedin.com/in/tyunusov https://uk.linkedin.com/in/leighannegalloway tyunusov@ptsecurity.com lagalloway@ptsecurity.com @a66at @L_AGalloway

Recommend


More recommend