
The Federal Bureau of Investigation (FBI) has issued a flash cyber-alert outlining a sharp increase in malware-enabled ATM jackpotting incidents nationwide, highlighting a growing threat that financial institutions and ATM operators must urgently address.
According to the advisory (FLASH-20260219-001), cybercriminals are increasingly deploying sophisticated malware — particularly variants of the Ploutus family — to force Automated Teller Machines (ATMs) to dispense cash without any legitimate transaction or bank authorization.
These attacks exploit software vulnerabilities and weak physical security, allowing criminals to take direct control of ATM hardware.
About 1,900 cases of ATM jackpotting have been documented across the United States since 202, the FBI says.
Notably, over 700 of these occurred in 2025 alone, inflicting more than $20 million in losses, in a rapid escalation.
Unlike traditional skimming or card fraud, malware-enabled jackpotting targets the ATM’s internal software and hardware, bypassing the need for customer account access altogether.
Once successfully installed — often via physical access to the machine’s internals — the malware can issue cash-dispense commands directly to the ATM’s payout mechanisms.
The advisory details several common infection techniques criminals use, including:
“The malware can be used across ATMs of different manufacturers with very little adjustment to the code as the Windows operating system is exploited during the compromise,” according to the notice.
Bitdefender has documented a range of jackpotting-related threats over the years.
Last year, authorities charged 54 people, many tied to the Venezuelan Tren de Aragua gang, for their role in deploying Ploutus malware in coordinated ATM jackpotting schemes across multiple states.
Similar jackpotting rings have been disrupted abroad — for example, Italian police arrested criminals using “black box” interfaces that commandeered multiple ATMs.
Older reports noted attackers leveraging creative equipment like Raspberry Pi devices to bypass security and open ATMs in Texas.
Security researchers have even shown on video, in a controlled environment, how ATM malware can be introduced to force cash dispensers to eject money in minutes.
Operational defenders and incident responders are urged to watch out for unusual executable files — including unfamiliar binaries like newage.exe, color.exe, and others — not normally found on ATM hard drives. Additional warning signs include:
To mitigate this evolving threat, the FBI recommends a combination of physical, technical, and process-based controls:
The Bureau encourages affected organizations and observers to report suspicious activity to local FBI field offices and through the IC3 portal, helping to build a more complete picture of ongoing jackpotting threats.
tags
Filip has 17 years of experience in technology journalism. In recent years, he has focused on cybersecurity in his role as a Security Analyst at Bitdefender.
View all posts