{"id":12868,"date":"2019-02-21T13:23:35","date_gmt":"2019-02-21T09:23:35","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/winpot-atm-jackpotting\/12868\/"},"modified":"2019-11-15T15:22:31","modified_gmt":"2019-11-15T11:22:31","slug":"winpot-atm-jackpotting","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/winpot-atm-jackpotting\/12868\/","title":{"rendered":"The ATM of Fortune"},"content":{"rendered":"<p>It sounds like a weird dream: ATMs that look more like slot machines. If you try your luck, you might even be rewarded with a nice bundle of cash. Could it be true?<\/p>\n<h2>WinPot: A jackpotting tool<\/h2>\n<p>In fact, the ability to turn a common ATM into something like a slot machine is real \u2014 and not dreamy at all. Actual <a target=\"_blank\" href=\"https:\/\/securelist.com\/atm-robber-winpot\/89611\/\" rel=\"noopener noreferrer\">malware called WinPot<\/a> can do just that. Perhaps its creators were inspired by the term <em><a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/atm-jackpotting\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">jackpotting<\/a><\/em>, which commonly refers to attacks where cybercriminals force an automated teller machine to spew out money. Whimsically, they decided to make using WinPot look like playing slots for <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/money-mule\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">money mules<\/a>, individuals who pick up the loot from ATMs.<\/p>\n<p>Unlike machines in a casino, WinPot can make the \u201cATM game\u201d a sure-fire win, which could explain the first part of the name. The software helps criminals pick and empty the ATM\u2019s most lucrative cash-dispensing cassette.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/02\/21132353\/winpot-atm-jackpotting-screenshot.png\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-12871\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/02\/21132353\/winpot-atm-jackpotting-screenshot.png\" alt=\"WinPot malware interface\" width=\"278\" height=\"230\"><\/a><\/p>\n<p>The slot machine\u2019s windows display each cassette\u2019s bill denomination and the number of bills inside the cassette. All the mule needs to do is select the cassette with the most money in it and press Spin. The Scan button can be used to recount the bills. WinPot\u2019s creators also provided an emergency Stop button for helping the mule cut the payout short before raising suspicions.<\/p>\n<p>Versions of WinPot are notably diverse, each with its own unique features. For example, certain flavors of the malware operate for a limited period of time (e.g. a month) and then silently deactivate themselves. The core feature set, though, is roughly consistent; the diversity helps it both adapt to new protective measures for ATMs and prevent abuse by mules, who might try to copy the software to keep all of the bounty.<\/p>\n<h3>Jackpot, but not for everyone<\/h3>\n<p>The upshot is, if you notice anything odd about an ATM\u2019s appearance or operation, it\u2019s unlikely to mean good news for you. Cybercriminals go far beyond robbing ATMs. Their arsenals include <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/skimmers-part-one\/7223\/\" rel=\"noopener noreferrer nofollow\">ways to steal cash from bank clients<\/a>: hidden cameras, fake keypads, skimmers, and other devices for obtaining PINs and data from a card\u2019s magnetic strip \u2014 in other words, everything they need to produce a duplicate and use it without your involvement.<\/p>\n<p>Sometimes, though, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/invisible-skimmer-at-atm\/12121\/\" rel=\"noopener noreferrer nofollow\">dangers lurk inside perfectly normal-looking and working ATMs<\/a>. Therefore, it is key to remember the basic \u2026<\/p>\n<h3>\u2026 safety rules when using ATMs<\/h3>\n<ul>\n<li>Activate text-message notifications about withdrawals and transfers to make sure that if someone else gets access to your card, you\u2019ll learn about it sooner rather than later so you can block the card immediately.<\/li>\n<li>Use ATMs that are hard for criminals to approach and reprogram, or to install a device on. A bank branch or other well-guarded location is best.<\/li>\n<li>Stand as close to the terminal as you can and cover the keypad with your hand while entering your PIN. Doing so helps prevent criminals from tracking you with a camera hidden somewhere near the ATM \u2014 or doing it the old-fashioned way, by peeping over your shoulder.<\/li>\n<li>Pay attention to anything strange about the ATM\u2019s external appearance or what is displayed on its screen. If anything arouses your suspicion, err on the side of caution and choose another ATM rather than potentially being left without cash in your account. Better yet, contact the bank. Even if you actually see that tempting WinPot interface with its Spin button, remember: Theft is theft, and <a target=\"_blank\" href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/over-1500-money-mules-identified-in-worldwide-money-laundering-sting\" rel=\"noopener noreferrer nofollow\">thieves go to jail sooner or later<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>Can an ATM turn into a slot machine? WinPot malware helps its owners win big at the \u201cATM game.\u201d<\/p>\n","protected":false},"author":2484,"featured_media":12869,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[401,2036,1233,36,521,2037],"class_list":{"0":"post-12868","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-atm","9":"tag-atmpot","10":"tag-jackpotting","11":"tag-malware-2","12":"tag-threats","13":"tag-winpot"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/winpot-atm-jackpotting\/12868\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/winpot-atm-jackpotting\/15304\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/winpot-atm-jackpotting\/17242\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/winpot-atm-jackpotting\/15399\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/winpot-atm-jackpotting\/14091\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/winpot-atm-jackpotting\/17906\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/winpot-atm-jackpotting\/16944\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/winpot-atm-jackpotting\/22294\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/winpot-atm-jackpotting\/5732\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/winpot-atm-jackpotting\/25698\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/winpot-atm-jackpotting\/11450\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/winpot-atm-jackpotting\/11535\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/winpot-atm-jackpotting\/18603\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/winpot-atm-jackpotting\/22617\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/winpot-atm-jackpotting\/17986\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/winpot-atm-jackpotting\/22174\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/winpot-atm-jackpotting\/22110\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/jackpotting\/","name":"jackpotting"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12868"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12868\/revisions"}],"predecessor-version":[{"id":14505,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12868\/revisions\/14505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12869"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}