Description

The U.S. Department of Justice has charged 54 individuals for their involvement in a large-scale ATM jackpotting scheme that targeted machines across the United States. According to prosecutors, the group used specialized ATM malware to illegally force machines to dispense cash, resulting in losses worth millions of dollars. The operation was not a typical card-skimming fraud; instead, it relied on direct manipulation of ATMs through a mix of cyber techniques and physical access. Authorities describe the scheme as highly organized, involving clearly defined roles such as scouting locations, deploying malware, and collecting cash. At the center of the attacks was Ploutus malware, a well-known tool designed specifically to compromise ATMs. Attackers physically accessed ATM machines, connected external devices or replaced internal components, and installed the malware to gain control of the cash-dispensing system. Once activated, Ploutus allowed criminals to issue commands that made ATMs release money on demand. Some variants of the malware are also capable of deleting logs and traces, making forensic investigation more difficult. This hybrid attack method bypasses many traditional cybersecurity controls because it exploits both software weaknesses and physical security gaps. Investigators allege that the individuals charged are linked to a transnational criminal network, with reported ties to the Venezuelan gang Tren de Aragua. The stolen funds were allegedly laundered and used to support wider criminal activities. Defendants face serious charges, including bank fraud, computer intrusion, and conspiracy, with potential sentences ranging from decades to life imprisonment. The case highlights the growing threat of coordinated cyber-physical attacks on financial infrastructure and underscores the need for stronger ATM security, monitoring, and law-enforcement collaboration worldwide.