{"id":7790,"date":"2017-02-06T11:00:54","date_gmt":"2017-02-06T16:00:54","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=7790"},"modified":"2017-02-10T07:35:52","modified_gmt":"2017-02-10T12:35:52","slug":"everything-need-know-alice-atm-malware","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/everything-need-know-alice-atm-malware\/","title":{"rendered":"Everything You Need to Know About the \u201cAlice\u201d ATM Malware"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Over the past decade, only eight different ATM malware \u201cfamilies\u201d have ever been detected. A new malware family, called \u201cAlice,\u201d was detected last year; it was first reported on more than a month ago, but researchers believe that it\u2019s been in operation since at least 2014. According to Trend Micro, the malware is a \u201cstripped down\u201d malware that exists solely to make ATMs spit out cash. What makes this particular type of malware unique is that it doesn\u2019t require a malicious person to control it through the ATM\u2019s keypad.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Malicious attacks on ATMs have rapidly increased over the last several years. That\u2019s why it may be safer to use credit cards and mobile payment methods (if you are able to do so). If you use mobile payment apps, remember to ensure that your information is safe by regularly checking your device for malware. Click here to fully scan your device: <\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7530\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/Security-Scan.png\" alt=\"Security Scan\" width=\"300\" height=\"78\" \/><\/a><\/center><b>Go Ask Alice: How it Works<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are a few different ways that Alice can infect an ATM. The first two ways involve using a USB or CD to transfer the code onto the ATM. The third way \u2014 which is better for hackers who want to avoid public places with security cameras \u2014 is to hack a bank\u2019s network to gain access to the ATMs. However, this type of attack is less likely to work as well with larger banks, which have better security. Still, just because it isn\u2019t as likely to happen, it doesn\u2019t mean that larger banks should neglect improving their overall security in response to the Alice malware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before Alice infects an ATM, it scans the machine to make sure it\u2019s running on an ATM. Once its location is confirmed, Alice will issue a series of prompts; if the location is incorrect, the malware will terminate itself. In order for the malware to officially launch, and access the money inside the ATM, the hacker will need to enter a PIN code. The hacker can then dispense all of the ATM\u2019s money (by launching the malware multiple times if there are withdrawal limits).<\/span><\/p>\n<p><b>Why Alice is Worrisome<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As mentioned, Alice is unlike other ATM malware families. Alice shows that ATM malware is getting much better, and that hackers are increasingly able to adapt their malware to a variety of platforms. This is further exemplified by the alarming increase in ATM malware over the last few years. Currently, the Alice malware uses easily available commercial software, but in the future this type of malware is likely to use fully customized software.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new ATM malware is on the rise, and it\u2019s more dangerous than ever. Learn more about it, and how you can protect yourself now.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-7790","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=7790"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7790\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=7790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=7790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=7790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}