| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A hacker2 has discovered a way to force ATMs to disgorge their cash by hijacking3 the computers inside them. 一位计算机黑客通过入侵ATM柜员机里的电脑的方式,不用银行卡就能让ATM机疯狂吐钞。 A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them. The attacks demonstrated Wednesday targeted standalone(单独的) ATMs. But they could potentially be used against the ATMs operated by mainstream5 banks. Computer hacker Barnaby Jack4 spent two years tinkering(铸补,熔补) in his Silicon6 Valley apartment with ATMs he bought online. These were standalone machines, the type seen in front of convenience stores, rather than the ones in bank branches. His goal was to find ways to take control of ATMs by exploiting weaknesses in the computers that run the machines. He showed off his results here at the Black Hat conference, an annual gathering7 devoted8 to exposing the latest computer-security vulnerabilities(缺陷,脆弱点) . His attacks have wide implications because they affect multiple types of ATMs and exploit weaknesses in software and security measures that are used throughout the industry. Jack, who works as director of security research for Seattle-based IOActive Inc, showed in a theatrical9 demonstration10(示范,证明) two ways he can get ATMs to spit out(吐出) money: - He found that the physical keys that came with his machines were the same for all ATMs of that type made by that manufacturer. He figured this out by ordering three ATMs from different manufacturers for a few thousand dollars each. Then he compared the keys he got to pictures of other keys, found on the internet. He used his key to unlock a compartment11 in the ATM that had standard USB slots. He inserted a program he had written into one of them, commanding the ATM to dump its vaults12. - He hacked13 into the machines by exploiting weaknesses in the way ATM makers14 communicate with the machines over the internet. Jack said the problem is that outsiders are permitted to bypass the need for a password. He didn't go into much more detail because he said the goal of his talk "isn't to teach everybody how to hack1 ATMs. It's to raise the issue and have ATM manufacturers be proactive about implementing15(实施,执行) fixes." The remote style of attack is more dangerous because an attacker doesn't need to open up the ATMs. It allows an attacker to gain full control of the ATMs and not only order it to spit out money, but also to silently harvest card data from anyone who uses the machines. It also affects more than just the standalone ATMs vulnerable to the physical attack, and could potentially be used against the kinds of ATMs used by mainstream banks. Jack said he didn't think he'd be able to break the ATMs when he first started probing them. Jack said the manufacturers whose machines he studied are deploying16 software fixes for both vulnerabilities, but added that the prevalence of remote-management software broadly opens up ATMs to hacker attacks. 点击收听单词发音
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
上一篇:沙特黑莓手机禁令即将生效 下一篇:英国某市为议员配备iPad 节省增效 |
- 发表评论
-
- 最新评论 进入详细评论页>>