FREE ATMIA Webinar: Rogue Device Attacks

Thursday, May 14, 2020

View Showroom

Company: ATM Industry Association

Live Webinar

ATMIA Webinar: 
Rogue Devices attacks on ATM through internal abusers and supply chain
When an attacker evaluates his next target, he would usually conduct a reconnaissance phase (assuming it’s not just a high-volume attack campaign). Once completed, the attacker will have a full “inventory list” of the security measures taken – vendors, versions etc., he can then decide to go “head-to-head” with those security products or follow Sun Tzu’s advice, realizing that Cyber security products are getting better (and stronger) in the protection they offer.
Following Sun Tzu’s guidelines pushes the attacker to find alternative options – and HW/FW vulnerabilities seems to be the weakest link. As shown on multiple cases, exploiting HID device vulnerabilities can bypass multiple security measures, and impersonate as a legitimate device, without having to confront all those security measures. Having difficulties accessing the internals of the ATM – why not go for the network interface, usually external, and less protected. Another option is to use supply chain, by infecting equipment, that is later introduced as spare parts that find their way into your infrastructure. The fight is unfair, but there is still a lot that we can do.

Register Button
Wednesday, May 27th, 2020
2:00 PM GMT / 3:00 PM BST / 9:00 AM CST
Email Erika Navarrete
Register Button
*ATMIA members have access to ATM focused webinars, best practices, industry reports and more. To learn more about the benefits we offer, visit our website or email Erika NavarreteAmber Howell or Claire Feterl.

Global Sponsor - Diebold Nixdorf
Global Sponsor - NCR
Global Sponsor - Auriga
Global Sponsor - DPL
Global Sponsor - KAL
Global Sponsor - PAI
Global Sponsor - FIS
Global Sponsor - Prosegur
Global Sponsor - Cardtronics
Global Sponsor - Euronet Worldwide
Become a Global Sponsor
Join the Campaign
Global Sponsors