English 中文网 漫画网 爱新闻iNews 翻译论坛
当前位置: Language Tips> 阅读天地> 新闻选读

Hacker ATM attacks show security holes

[ 2010-08-02 13:40]     字号 [] [] []  
免费订阅30天China Daily双语新闻手机报:移动用户编辑短信CD至106580009009

上周,在美国拉斯韦加斯举行的电脑安全专业大会“黑帽大会”上,一位计算机黑客向观众展示了不用银行卡就能让ATM机疯狂吐钞的“绝技”,让现场观众看得目瞪口呆。这位黑客名叫杰克,其实是一位资深的计算机安全研究人员,他花了两年的时间研究各种独立ATM机,并找到了这些设备的漏洞。他发现同一厂商制造的同一型号ATM机使用的钥匙都是一样的,他在展示时用钥匙打开一台ATM里含有标准USB装置的部件,插入他自己写的破解程序,然后顺利操控ATM电脑,让机器自己吐出钞票。杰克展示的另一种攻击方式则更具威胁性,他是通过网络对ATM系统进行远程操控,利用ATM厂商与ATM机网络连接中的漏洞入侵ATM机的电脑系统,不用任何密码便能自如操控ATM机。杰克在会上没有深入说明入侵ATM方法的具体操作细节,以及涉及的ATM厂商。他强调,他“不是在教大家破解ATM机 ”,而是要让ATM厂商提高警觉。



A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.

A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.

The attacks demonstrated Wednesday targeted standalone ATMs. But they could potentially be used against the ATMs operated by mainstream banks.

Computer hacker Barnaby Jack spent two years tinkering in his Silicon Valley apartment with ATMs he bought online. These were standalone machines, the type seen in front of convenience stores, rather than the ones in bank branches.

His goal was to find ways to take control of ATMs by exploiting weaknesses in the computers that run the machines.

He showed off his results here at the Black Hat conference, an annual gathering devoted to exposing the latest computer-security vulnerabilities.

His attacks have wide implications because they affect multiple types of ATMs and exploit weaknesses in software and security measures that are used throughout the industry.

Jack, who works as director of security research for Seattle-based IOActive Inc, showed in a theatrical demonstration two ways he can get ATMs to spit out money:

- He found that the physical keys that came with his machines were the same for all ATMs of that type made by that manufacturer. He figured this out by ordering three ATMs from different manufacturers for a few thousand dollars each. Then he compared the keys he got to pictures of other keys, found on the internet.

He used his key to unlock a compartment in the ATM that had standard USB slots. He inserted a program he had written into one of them, commanding the ATM to dump its vaults.

- He hacked into the machines by exploiting weaknesses in the way ATM makers communicate with the machines over the internet. Jack said the problem is that outsiders are permitted to bypass the need for a password. He didn't go into much more detail because he said the goal of his talk "isn't to teach everybody how to hack ATMs. It's to raise the issue and have ATM manufacturers be proactive about implementing fixes."

The remote style of attack is more dangerous because an attacker doesn't need to open up the ATMs.

It allows an attacker to gain full control of the ATMs and not only order it to spit out money, but also to silently harvest card data from anyone who uses the machines. It also affects more than just the standalone ATMs vulnerable to the physical attack, and could potentially be used against the kinds of ATMs used by mainstream banks.

Jack said he didn't think he'd be able to break the ATMs when he first started probing them.

Jack said the manufacturers whose machines he studied are deploying software fixes for both vulnerabilities, but added that the prevalence of remote-management software broadly opens up ATMs to hacker attacks.



英一提款机双倍吐钱 百人排队取款



(中国日报网英语点津 Helen 编辑)