Notebookcheck Logo

FBI warns of rising malware-enabled ATM “jackpotting” attacks

The FBI’s IC3 FLASH advisory warns of malware-enabled ATM jackpotting incidents and includes technical indicators and mitigation steps for operators.
ⓘ Freepik.com
The FBI’s IC3 FLASH advisory warns of malware-enabled ATM jackpotting incidents and includes technical indicators and mitigation steps for operators.
The FBI issued an IC3 FLASH advisory warning of increased malware-enabled ATM jackpotting in the U.S., naming Ploutus malware, sharing IOCs, and outlining mitigation steps.

The FBI released an IC3 FLASH advisory on February 19, 2026, warning of an increase in malware-enabled ATM “jackpotting” incidents across the U.S. The bureau says the alert is meant to distribute technical details and indicators of compromise (IOCs) so banks, ATM operators, and service providers can harden machines and spot compromises earlier.

The scale is not trivial. The FBI says that out of 1,900 jackpotting incidents reported since 2020, more than 700, with over $20 million in losses, occurred in 2025 alone.

What “ATM jackpotting” is in this advisory

In jackpotting, criminals don’t need to steal card data or drain customer accounts. Instead, they aim at the ATM itself, using malware to force the machine to dispense cash without a legitimate transaction. The FBI frames these events as fast “cash-out” operations that may only be noticed after the money is already gone.

Ploutus and the role of XFS

The advisory points to jackpotting malware, including the Ploutus family. The FBI says Ploutus targets eXtensions for Financial Services (XFS)... the software layer that tells the ATM hardware what actions to perform. In a normal flow, the ATM application sends commands through XFS as part of a transaction that requires bank authorization. If an attacker can issue their own commands to XFS, the FBI says they can bypass authorization entirely and instruct the ATM to dispense cash on demand.

Common infection paths: physical access comes first

The FBI’s write-up emphasizes that many attacks start with physical access, often by opening an ATM face using widely available generic keys. From there, the FBI lists common deployment methods, including removing the hard drive, copying malware onto it using another computer, reinstalling it, and rebooting the ATM,or swapping the drive with a “foreign” drive or external device preloaded with malware before rebooting.

Why Windows-based ATMs are in scope

The FBI says the malware can be used across different ATM manufacturers with relatively little adjustment because the compromise exploits the Windows operating system on affected ATMs. The malware is described as interacting directly with ATM hardware and dispensing cash without requiring access to a bank customer account.

IOCs, the FBI says defenders should look for

The advisory lists a range of digital indicators observed on affected ATMs running Windows, including suspicious executables such as Newage.exe, Color.exe, Levantaito.exe, NCRApp.exe, sdelete.exe, Promo.exe, WinMonitor.exe, WinMonitorCheck.exe, Anydesk1.exe, plus associated files/scripts like C.dat and Restaurar.bat, and newly created directories. It also includes multiple MD5 hashes tied to observed artifacts.

Beyond file artifacts, the FBI flags potential abuse of remote access tools (for example, unauthorized TeamViewer/AnyDesk) and looks for unusual persistence via abnormal autoruns and custom services under Windows registry/service locations.

Physical/log indicators that can reveal staging

Because jackpotting often involves onsite tampering, the FBI also calls out “physical interaction indicators,” including USB insertion events and detection of connected devices like USB keyboards, USB hubs, and flash drives. Operational red flags include ATM door-open alerts outside maintenance windows, unexpected low/no-cash states, unauthorized devices connected, and hard drive removal.

Mitigation guidance: “gold images,” removable media auditing, and layered physical controls

One of the most actionable sections is the FBI’s emphasis on baselining and integrity: it recommends validating ATM files/hashes against a controlled “gold image” and treating deviations, especially unsigned or newly introduced binaries, as potential compromise.

The FBI also recommends a targeted audit policy around removable storage usage, controlled file access, and process creation to detect staging activity that can evade network monitoring.

On the physical side, the FBI’s advice is straightforward: make it harder to get into the machine and easier to spot tampering. That includes upgrading locks so generic keys won’t work, adding alarms for service panels, using sensors to detect unusual movement or heat, limiting access to the cashbox, and ensuring cameras properly cover the ATM, with footage retained long enough to be useful.

It also mentions hardening steps like device whitelisting to block unauthorized hardware connections, firmware integrity checks (including TPM-based integrity checks at boot), and disk encryption to reduce the chance that malware can be introduced by removing and modifying a drive outside the machine.

What the FBI asks organizations to report

For incident reporting, the FBI encourages organizations to contact their local FBI field office or submit through IC3, and it requests practical details such as bank/branch identifiers, ATM make/model, vendor info, and available logging.

Please share our article, every link counts!
Mail Logo
Google Logo Add as a preferred
source on Google

No comments for this article

Got questions or something to add to our article? Even without registering you can post in the comments!
No comments for this article / reply

static version load dynamic
Loading Comments
Comment on this article
> Expert Reviews and News on Laptops, Smartphones and Tech Innovations > News > News Archive > Newsarchive 2026 02 > FBI warns of rising malware-enabled ATM “jackpotting” attacks
Darryl Linington, 2026-02-23 (Update: 2026-02-23)