Alice is latest malware that attacked number of ATM  machines for sole purpose of money  in November 2016.It has been considered among the most deadly malware that attacked system till date.Numeric keys and remote  desktop protocols is used for connection and it has no capability to steal information.Use of this malware requires physical access to ATM machines  attacked to drain the cash.This malware works like green dispenser were using last year.

11 14 Alice Malware has been removed from machines that has been penetrated into Russia,Spain and UK

via:malware.stories

The way crook  use Alice for getting access by getting access to USB and  CD-ROM ports,connect the keyboard to access operating system,ATM computers are striped down often for running its bank software but gives access to thieves.The next step is to enter a PIN that finally connect the machine to Alice gang,bank has no control over money and crooks drain all the possible money in the machine.

hacking ATM Alice Malware has been removed from machines that has been penetrated into Russia,Spain and UK

via:securityaffairs.co

Alice is secondary software with no communication tool among malware and PIN ,it show that creator is least concerned with future use of it,he probably interested in collecting data and selling in online market.

Over 432,000 ATM machines has been installed worldwide ,which made it high risk sector to safety banks required a most efficient system.

methbot bots Alice Malware has been removed from machines that has been penetrated into Russia,Spain and UK

via:hackbusters.com

ATM machines has attacked since 2007 ,cyber gangs are no more new entity for the governments and concerned authorities and financial entities has always been on the top priority of bank and states.Recent ATM attacks in Russia, Spain and the United Kingdom are even more ominous whereas early reports show these ATMs were attacked remotely. Although Alice looks to be written for money mules who have physical access to machines, our researchers do show that Alice could be used via RDP, however we have no evidence yet of remote usage.

Apple Airpods: why does Apple have a problem with its manufacture?
SHARE

LEAVE A REPLY