Ploutus Malware Drains U.S. ATMs Without Cards or Accounts as FBI Issues FLASH Alert


The FBI issued FLASH-20260219-001 on February 19, 2026, warning about Ploutus malware jackpotting attacks on U.S. ATMs. Criminals gain physical access to machines and use malware to dispense cash without cards, accounts, or bank approval. Banks and ATM operators face urgent risks from this growing threat.

Ploutus targets the eXtensions for Financial Services (XFS) layer that controls cash dispensers. Normal withdrawals need bank authorization. This malware sends direct commands to hardware. Attackers empty machines in minutes. The FBI reports over 700 incidents in 2025 alone from 1,900 total cases since 2020. Losses exceed $20 million.

Attackers often start with generic keys to open ATM panels. They swap hard drives, plug USB devices, or connect keyboards. Many ATMs run Windows, so malware adapts easily across brands. Offline machines work too since commands hit hardware directly.

FBI said – “More than 700 jackpotting incidents occurred in 2025 producing over $20 million in losses.”

Attack Indicators Table

IndicatorDescriptionTypical Location
Newage.exeSuspicious executableATM root directories
NCRApp.exeMalware disguised as NCR appSystem32 folder
WinMonitor.exeMonitoring process masqueradeStartup folder
sdelete.exeSecure delete tool for cleanupTemp directories

Look for new folders like C:\Users\SSAuto1\AppData\Local\P.

Infection Methods

Attackers use these physical tactics:

  • Remove and infect ATM hard drive externally.
  • Insert pre-loaded USB drive or hub.
  • Connect malicious keyboard for commands.
  • Exploit open service panels with standard keys.

XFS bypass works offline. No network traffic alerts fire.

Suspicious Registry and Services

Monitor these persistence mechanisms:

  • Autorun keys under generic names like “ATM Service.”
  • Custom services: “Dispenser Service,” “Cash Manager.”
  • Unauthorized remote tools: AnyDesk, TeamViewer installs.

Remote access tools signal insider threats or external C2.

Defensive Hardening Steps

The FBI lists immediate actions:

  • Replace standard ATM locks with high-security versions.
  • Install tamper-evident sensors and CCTV coverage.
  • Enable full disk encryption on ATM drives.
  • Implement hardware device whitelisting.

Validate each machine against trusted gold images and file hashes.

Windows Event IDs to Monitor

Track these for compromise signs:

  • 6416: USB device insertion.
  • 4663: File write operations.
  • 4688: Process creation.
  • 1102: Log clearing attempts.

Correlate events across ATMs for attack patterns.

Impact Statistics

FBI data shows escalation:

YearIncidentsLosses
2020-20241,200$15M+
2025700+$20M+
Total1,900+$35M+

Cash shortages tip off victims late. Networks miss offline attacks.

Why Ploutus Succeeds

ATMs prioritize uptime over security. Generic locks invite tampering. XFS standardization aids portability. Windows prevalence lowers barriers. Losses hit banks directly without customer card fraud.

Report incidents to local FBI offices or IC3 portal immediately.

FAQ

What triggers the FBI Ploutus jackpotting alert?

FLASH-20260219-001 warns of 700+ incidents in 2025 with $20M+ losses.

How does Ploutus dispense cash without cards?

Malware sends direct XFS commands to ATM hardware, bypassing bank auth.

Which executables signal Ploutus infection?

Newage.exe, NCRApp.exe, WinMonitor.exe, sdelete.exe.

What physical access do attackers need?

Generic keys open most ATM panels for drive/USB swaps.

Which Windows events detect ATM compromise?

IDs 6416, 4663, 4688, 1102 for USB, files, processes, log clears.

What FBI-recommended hardening stops Ploutus?

High-security locks, tamper sensors, disk encryption, device whitelisting.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages