February 20, 2026 Source: SecurityWeek 3 min read · 582 words

FBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025

FBI: збитки на $20 мільйонів від 700 атак ATM Jackpotting у 2025 році

When It Started

Throughout 2025, something was quietly bleeding money from ATMs across the country. Not through card skimming or social engineering. This was different. More coordinated. More sophisticated. According to a recent FBI cyber attack report, approximately 700 ATM jackpotting attacks occurred last year, with Ploutus malware at the center of the assault. The total damage? $20 million in direct losses.

SecurityWeek broke down the details of what amounts to one of the year's most persistent, yet underreported, malware campaigns targeting the financial sector's most vulnerable endpoints.

The Discovery

The FBI didn't stumble onto this by accident. Banks and ATM operators noticed cash dispensing anomalies—machines spitting out bills without corresponding transactions, or worse, dispensing currency in response to commands nobody issued. Once enough institutions reported the pattern, the dots connected. Ploutus malware. A known jackpotting tool that's been in circulation for years, but clearly still finding victims.

And here's what's maddening about this particular FBI cyber attack advisory: this wasn't a new threat. Ploutus has been around since at least 2013. The malware's capability to directly interface with ATM software and trigger cash dispensing is well-documented in security circles.

So why are 700 machines falling to it in a single year?

Technical Analysis

Ploutus works by gaining physical or network access to an ATM, then deploying code that communicates directly with the cash dispenser's control systems. It bypasses normal transaction verification. No card. No PIN. Just a command that says: dispense cash. Now.

The malware typically requires either USB access to the machine's internals or compromised network credentials to reach the ATM's operating system. Once in, it's devastating in its simplicity.

What makes this campaign particularly nasty is the scale and coordination. Seven hundred incidents don't happen randomly. This suggests organized actors running a deliberate operation, methodically targeting ATMs across multiple institutions. The financial sector's internal FBI cyber attack warning systems clearly weren't catching all instances in real time.

Real question: how many additional attacks went unreported?

Damage Assessment

$20 million. Let that sit for a second.

That's real money pulled from real institutions. Banks absorb losses like this, and the cost flows downstream—reduced services, higher fees, tighter security budgets that often go toward compliance theater instead of actual threat detection.

The FBI cyber attack statistics paint a picture of a threat that persists because it works. These aren't attacks requiring zero-day exploits or nation-state resources. They're straightforward exploitation of weak ATM security practices. Physical controls. Network segmentation. Monitoring.

But here's what bothers me: 700 attacks means hundreds of institutions affected. Yet this didn't trigger the kind of urgent, sector-wide response we'd see if the threat was more exotic. Ransomware makes headlines. Jackpotting? It gets filed in a report.

Mitigation

If you're managing ATM fleets, the FBI's FBI cyber attack news should trigger immediate action. Start with the fundamentals that should already be in place but clearly aren't everywhere:

Isolate ATMs on segmented networks. Don't let them sit on the same network segment as teller terminals or corporate systems. Encrypt all communications between the ATM and back-end servers. Monitor for unusual cash dispensing—flag any transaction without proper authorization trail. Implement BIOS password protection and disable USB ports unless absolutely necessary. Run regular firmware updates on every connected machine.

Most institutions already know this. The problem is implementation. Updating 500 ATMs takes time, money, and coordination. It's easier to absorb $20,000 in losses than to replace 700 machines.

Frankly, that math needs to change. The FBI can issue all the advisories it wants. Real prevention happens when institutions decide that proactive security costs less than reactive remediation. Until then? Ploutus keeps cashing in.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →