CARDS OF BANK HACK IT THIS IS SECURITY
The good news is that if you have not had a call from your bank, and your account balance is as it should be, you are — probably — safe. But it would not be a bad idea to change your card’s ATM pin right away. But how did this one server hackhit 90 ATMs and affect 3.2 million (and counting) cards of 19 Indian banks?
ATM and Switch
ATM-makers such as NCR or Diebold Nixdorf provide the machine and the software for a bank at its preferred location. The bank the connects the machine to its servers. Companies such as FSS, CMS and Hitachi Payment Services provide the ‘switch’ — a payment transfer engine that allows the ATM software to connect to interbank networks. Most switches are in remote locations, not at the ATM itself. A bank branch that has an ATM is likely to managing its own switch, but the rest may be maintained by agencies such as Hitachi.
How infection spread?
The 90 affected ATMs in the present case connected to the one infected server at one precise point in time. So the hackers got information of all the people who used those ATMs, and cloned their cards. Since customers often use non-home bank ATMs, the impact spread to 19 banks.
Really a hack?
Hitachi claims it was not hacked at all. “We had appointed an external audit agency certified by PCI in the first week of September, to check the security of our systems for any breach or compromise based on a few suspected transactions that were highlighted by banks for whom we manage ATM networks.
Weak points
Most ATMs are basically PCs running on Windows XP, which makes them vulnerable as Microsoft itself has stopped support for the operating system. Also, most ATMs work on XFS standard — a set of standardistion norms for ATM software — which is really old.
How To Check Hacks?
One: ensure physical safety of the ATM, so that no virus can be planted physically. Secondly, the XFS standard must be improved to help the software protect itself better. Lastly, “authenticated dispensing” must be implemented to exclude attacks via ‘fake processing centres’ that imitate the bank software, and also encrypt all data transmitted between all hardware units and the PCs inside ATMs.