By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
Computing

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

News Room
Last updated: 2026/02/20 at 4:39 AM
News Room Published 20 February 2026
Share
FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, M Lost in 2025
SHARE

Ravie LakshmananFeb 20, 2026Financial Crime / Banking Security

The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of more than $20 million in 2025.

The agency said 1,900 ATM jackpotting incidents have been reported since 2020, out of which 700 took place last year. In December 2025, the U.S. Department of Justice (DoJ) said about $40.73 million has been collectively lost to jackpotting attacks since 2021.

“Threat actors exploit physical and software vulnerabilities in ATMs and deploy malware to dispense cash without a legitimate transaction,” the FBI said in a Thursday bulletin.

The jackpotting attacks involve the use of specialized malware, such as Ploutus, to infect ATMs and force them to dispense cash. In most cases, cybercriminals have been observed gaining unauthorized access to the machines by opening an ATM face with widely available generic keys.

There are at least two different ways by which the malware is deployed: Removing the ATM’s hard drive, followed by either connecting it to their computer, copying it to the hard drive, attaching it back to the ATM, and rebooting the ATM, or replacing it entirely with a foreign hard drive preloaded with the malware and rebooting it.

Regardless of the method used, the end result is the same. The malware is designed to interact directly with the ATM hardware, thereby getting around any security controls present in the original ATM software.

Because the malware does not require a connection to an actual bank card or customer account to dispense cash, it can be used against ATMs of different manufacturers with little to no code changes, as the underlying Windows operating system is exploited during the attack.

Ploutus was first observed in Mexico in 2013. Once installed, it grants threat actors complete control over an ATM, enabling them to trigger cash-outs that the FBI said can occur in minutes and are harder to detect until after the money is withdrawn.

“Ploutus malware exploits the eXtensions for Financial Services (XFS), the layer of software that instructs an ATM what to physically do,” the FBI explained.

“When a legitimate transaction occurs, the ATM application sends instructions through XFS for bank authorization. If a threat actor can issue their own commands to XFS, they can bypass bank authorization entirely and instruct the ATM to dispense cash on demand.”

The agency has outlined a long list of recommendations that organizations can adopt to mitigate jackpotting risks. This includes tightening physical security by installing threat sensors, setting up security cameras, and changing standard locks on ATM devices.

Other measures involve auditing ATM devices, changing default credentials, configuring an automatic shutdown mode once indicators of compromise are detected, enforcing device allowlisting to prevent connection of unauthorized devices, and maintaining logs.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Best portable power station: Save  on Jackery Explorer 300 Best portable power station: Save $70 on Jackery Explorer 300
Next Article M1 MacBook Air Out of Stock at Walmart as Lower-Cost MacBook Nears M1 MacBook Air Out of Stock at Walmart as Lower-Cost MacBook Nears
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Koko’s collapse exposes fault lines in Kenya’s carbon market
Koko’s collapse exposes fault lines in Kenya’s carbon market
Computing
After four years of Russia’s invasion, time to stop underestimating Ukraine
After four years of Russia’s invasion, time to stop underestimating Ukraine
News
Best gaming headset deal: Logitech G435 hits 50% off at Amazon
Best gaming headset deal: Logitech G435 hits 50% off at Amazon
News
Nascent tech, real fear: how AI anxiety is upending career ambitions
Nascent tech, real fear: how AI anxiety is upending career ambitions
Software

You Might also Like

Koko’s collapse exposes fault lines in Kenya’s carbon market
Computing

Koko’s collapse exposes fault lines in Kenya’s carbon market

13 Min Read
30 Days of Affiliate Content Ideas That Scale Across Platforms
Computing

30 Days of Affiliate Content Ideas That Scale Across Platforms

8 Min Read

What Is Social Media Engagement? 13 Tips To Improve It in 2025

14 Min Read
Why I Built a Web of Trust Browser Extension for Nostr | HackerNoon
Computing

Why I Built a Web of Trust Browser Extension for Nostr | HackerNoon

0 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?