As per sources, a threat actor is advertising a new ATM malware family, dubbed “EU ATM Malware,” claiming it can compromise 99% of devices in Europe and approximately 60% of ATMs worldwide. Priced at $30,000, this malware targets machines from leading vendors including Diebold Nixdorf, Hyosung, Oki, Bank of America, NCR, GRG, and Hitachi. According to DailyDarkweb, the malware is designed from scratch and boasts the potential to generate up to $30,000 per ATM. It is fully automated, making deployment and operation straightforward and efficient, but also supports a manual operation mode for added flexibility. The seller offers the malware with various payment options, including a monthly subscription or an initial fee plus a share of profits from successful jackpotting operations. Customers can also test the malware with a three-day trial payload. If these claims are true, the malware represents a significant threat to the global banking industry. The ease of deployment and potential high returns make it a lucrative tool for cybercriminals, posing a severe risk to ATM security worldwide.
In early 2026, Rapid7 observed a sophisticated cyberattack attributed to the Iranian state-sponsored group MuddyWater, masquerading under the Chaos ransomware brand in what appears...
A newly identified China-affiliated cyber espionage group, tracked as UAT-8302, has been linked to a series of intrusions aimed at government institutions across South America and ...
Google has expanded its Binary Transparency initiative for Android to strengthen protection against software supply chain attacks. The new system creates a public cryptographic led...