As per sources, a threat actor is advertising a new ATM malware family, dubbed “EU ATM Malware,” claiming it can compromise 99% of devices in Europe and approximately 60% of ATMs worldwide. Priced at $30,000, this malware targets machines from leading vendors including Diebold Nixdorf, Hyosung, Oki, Bank of America, NCR, GRG, and Hitachi. According to DailyDarkweb, the malware is designed from scratch and boasts the potential to generate up to $30,000 per ATM. It is fully automated, making deployment and operation straightforward and efficient, but also supports a manual operation mode for added flexibility. The seller offers the malware with various payment options, including a monthly subscription or an initial fee plus a share of profits from successful jackpotting operations. Customers can also test the malware with a three-day trial payload. If these claims are true, the malware represents a significant threat to the global banking industry. The ease of deployment and potential high returns make it a lucrative tool for cybercriminals, posing a severe risk to ATM security worldwide.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...