It's the IT version of robbing a bank.
Attacks on ATMs are infamous in cybersecurity. But according to recent research from Eclypsium, the reason might be flawed drivers.
The stance from Eclypsium is clear: when a driver is screwed, so is security.
In a recent study, "Screwed Drivers Open ATMs to Attack," Eclypsium dove into the discussion about the risks that malicious or insecure drivers pose to Windows-based systems. According to the research, the conversation boils down to two main points:
Eclypsium has examined driver risks before, but is now looking to apply the research to ATMs or point-of-sale (POS) systems.
"Attackers can deliver malware by compromising the banking network connected to the device, by compromising the device's connection to card processors, or by gaining access to the ATM's internal computer. And much like traditional attacks, attackers or malware often need to escalate privileges on the victim device to gain deeper access into the system."
This is where drivers enter the picture:
"By taking advantage of the functionality in insecure drivers, attacks or their malware can gain new privileges, access information, and ultimately steal money or customer data."
When it comes to mitigating the issue of "screwed drivers," Eclypsium says there are a few barriers to entry.
For three primary reasons, the research notes why problematic drivers are hard to address:
Interested in this research? Check it out here.