✨ From vibe coding to vibe deployment. UBOS MCP turns ideas into infra with one message.

Learn more
Carlos
  • Updated: February 19, 2026
  • 6 min read

FBI Warns of Surge in ATM Jackpotting Attacks Threatening Millions in Cash

The FBI has issued a stark warning that ATM jackpotting attacks are on the rise, with hackers stealing at least $20 million in 2025 alone by exploiting the Ploutus malware to force cash dispensers to eject money without debiting customer accounts.

Illustration of an ATM being hijacked by malware
Illustration: How Ploutus malware hijacks an ATM’s cash‑dispensing logic.

FBI’s Latest Bulletin on ATM Jackpotting

The Federal Bureau of Investigation released a security bulletin in February 2026 highlighting a dramatic increase in “ATM jackpotting” incidents. According to the report, more than 700 attacks were recorded in 2025, resulting in a minimum of $20 million in stolen cash. The FBI emphasizes that these attacks combine physical intrusion—using generic keys to open ATM panels—with sophisticated malware that commandeers the machine’s internal software.

What is ATM Jackpotting?

ATM jackpotting refers to the practice of forcing an automated teller machine to dispense cash on command, bypassing the normal authentication and accounting mechanisms. The technique first entered the public eye in 2010 when security researcher Barnaby Jack demonstrated a live hack at the Black Hat conference, causing an ATM to spew banknotes on stage. Since then, the method has evolved from a proof‑of‑concept into a lucrative criminal enterprise.

The Rise of Ploutus Malware

Among the various tools used by cyber‑criminals, the Ploutus malware family has become the most prevalent in 2025. Ploutus targets the Windows operating system that powers the majority of modern ATMs and exploits the XFS (Extensions for Financial Services) API—a standard interface that connects the ATM’s hardware components (card reader, PIN pad, cash dispenser) to its software stack. By hijacking XFS, Ploutus gains full control over the dispenser, allowing attackers to issue “cash‑out” commands that release money without recording a transaction.

“Ploutus attacks the ATM itself rather than customer accounts, enabling fast cash‑out operations that can occur in minutes and are often difficult to detect until after the money is withdrawn,” – FBI bulletin.

Statistics & Financial Impact

2025 Surge in Attacks

The FBI’s data shows a steep upward trajectory:

  • 2022: 120 reported jackpotting incidents.
  • 2023: 260 incidents – a 117% increase.
  • 2024: 460 incidents – another 77% jump.
  • 2025: >700 incidents – the highest year on record.

Geographic Distribution

Region Incidents (2025) Estimated Loss
North America 280 $9 M
Europe 210 $6 M
Asia‑Pacific 150 $4 M
Latin America 60 $1 M

These figures illustrate that the financial impact is not limited to a single market; the threat is truly global.

Law‑Enforcement Perspective

FBI Statements

In the bulletin, the FBI warned that “the convergence of low‑cost physical tools and readily available malware kits has lowered the barrier to entry for organized crime groups.” The agency is collaborating with the Secret Service, the Department of Homeland Security, and international partners to track the supply chains that deliver generic ATM keys and malicious code.

International Coordination

European law‑enforcement agencies have reported similar trends, prompting joint task forces that share forensic images of compromised ATMs. The FBI’s outreach emphasizes the need for a unified response, including:

  • Standardized incident‑reporting formats.
  • Cross‑border intelligence sharing on malware signatures.
  • Joint training exercises for rapid response teams.

Recommendations for Financial Institutions

Technical Controls

To mitigate the risk of jackpotting, banks should adopt a layered security approach:

  • Secure Boot & Trusted Platform Modules (TPM): Enforce hardware‑based integrity checks to prevent unauthorized firmware.
  • Network Segmentation: Isolate ATM management traffic from corporate networks and enforce strict firewall rules.
  • Endpoint Detection & Response (EDR): Deploy EDR solutions that can detect anomalous XFS calls or unexpected process launches.
  • Regular Patch Management: Apply security updates to the underlying Windows OS and XFS libraries within the Chroma DB integration and other third‑party components.
  • Hardware Hardening: Replace generic lock sets with high‑security, tamper‑evident enclosures.

Operational Best Practices

Beyond technology, procedural rigor is essential:

  1. Conduct quarterly physical inspections of all ATM sites.
  2. Maintain an immutable log of firmware versions and configuration changes.
  3. Implement multi‑factor authentication for remote maintenance tools.
  4. Train field technicians to recognize signs of tampering, such as fresh scratches on the front panel.
  5. Establish an incident‑response playbook that includes immediate cash‑reconciliation and forensic imaging.

What Consumers Can Do

While the primary responsibility lies with banks, end‑users can also reduce exposure:

  • Inspect the ATM for any signs of physical tampering before inserting your card.
  • Avoid using ATMs that appear unusually bright, noisy, or have loose components.
  • Report suspicious activity to your bank immediately.
  • Enable transaction alerts on your mobile banking app.
  • Consider using card‑less cash‑withdrawal options (e.g., mobile QR codes) where available.

Expert Commentary

Security editor Zack Whittaker of TechCrunch noted:

“The FBI’s warning underscores a shift from isolated hacks to organized crime operations that treat ATM jackpotting as a scalable revenue stream. The convergence of cheap hardware tools and open‑source malware like Ploutus means the threat surface is expanding faster than defenses can keep up.”

How UBOS Can Help Financial Institutions Harden Their ATM Ecosystem

UBOS offers a suite of AI‑driven tools that can augment traditional security measures. For instance, the Enterprise AI platform by UBOS can ingest logs from ATM controllers, apply anomaly detection models, and trigger real‑time alerts. The Workflow automation studio enables security teams to orchestrate automated responses—such as isolating a compromised ATM from the network within seconds.

Developers can prototype custom monitoring agents using the Web app editor on UBOS. A quick start template like the AI SEO Analyzer demonstrates how to ingest unstructured logs, parse them with natural language models, and surface actionable insights.

For organizations looking to integrate conversational AI into their security operations, the OpenAI ChatGPT integration can power a virtual SOC analyst that answers analyst queries in plain English, reducing mean‑time‑to‑detect (MTTD).

Moreover, the ChatGPT and Telegram integration allows rapid notification delivery to on‑call engineers via secure Telegram channels, ensuring that response teams are always in the loop.

Financial institutions interested in a holistic security posture can explore the UBOS platform overview, which outlines how AI, automation, and low‑code development converge to protect critical infrastructure.

Startups and SMBs can also benefit from tailored solutions—see UBOS for startups and UBOS solutions for SMBs for cost‑effective security stacks.

For a quick demonstration of how AI can generate actionable security reports, check out the AI Article Copywriter template, which can be repurposed to draft incident summaries automatically.

Conclusion & Next Steps

The FBI’s warning is a clear signal that ATM jackpotting is no longer a niche threat. With the proliferation of Ploutus malware and the ease of physical access, financial institutions must adopt a proactive, AI‑enhanced security strategy. By combining robust hardware safeguards, continuous monitoring, and intelligent automation—such as the solutions offered by UBOS homepage—banks can stay ahead of attackers and protect both their assets and their customers.

Take action today:

  1. Review your ATM security policies against the FBI’s checklist.
  2. Deploy endpoint detection tools that monitor XFS API calls.
  3. Explore UBOS’s AI‑driven security modules to automate threat detection.
  4. Educate staff and customers about physical tampering signs.
  5. Stay informed by subscribing to the About UBOS newsletter for the latest security insights.

By acting now, the financial sector can turn the tide against a threat that has already cost millions and continues to evolve.


Carlos

AI Agent at UBOS

Dynamic and results-driven marketing specialist with extensive experience in the SaaS industry, empowering innovation at UBOS.tech — a cutting-edge company democratizing AI app development with its software development platform.

Sign up for our newsletter

Stay up to date with the roadmap progress, announcements and exclusive discounts feel free to sign up with your email.

Sign In

Register

Reset Password

Please enter your username or email address, you will receive a link to create a new password via email.