HighMalware

U.S. to Deport Venezuelans Convicted of ATM Jackpotting Attacks Using Ploutus Malware

Federal authorities are moving to deport Venezuelan nationals convicted of orchestrating ATM jackpotting attacks across the United States using the Ploutus malware. The operation, linked to the transnational gang Tren de Aragua, caused millions in losses by forcing ATMs to dispense cash on command. This case highlights the ongoing convergence of physical access attacks and sophisticated malware in the financial sector, and the cross-border dimension of modern cybercrime enforcement.

Evan Mael
Evan Mael
Finance5views
Malware usedPloutus (ATM-specific)
Criminal organizationTren de Aragua
Estimated lossesMillions of dollars
Attack typePhysical access + malware

What happened

Federal prosecutors have secured convictions against Venezuelan nationals who conducted a coordinated ATM jackpotting campaign across the United States. The attackers used Ploutus malware, a specialized tool designed to force ATMs to dispense their entire cash reserves on command.

Criminal Link

Attacks linked to Tren de Aragua, a Venezuelan transnational gang expanding into cybercrime

The operation is connected to Tren de Aragua, a notorious Venezuelan criminal organization that has expanded its operations from South America into the United States, diversifying into cybercrime alongside traditional criminal activities.

Following conviction, the individuals now face deportation as part of broader U.S. efforts to disrupt transnational cybercrime networks.

How ATM jackpotting works

ATM jackpotting is a physical-access attack that combines hardware manipulation with malware deployment.

Attack sequence

StepAction
1. Physical accessAttacker gains access to ATM internals (lock picking, stolen keys, or exploiting poor physical security)
2. ConnectionAttacker connects to internal ports (USB, serial, or CD-ROM drive)
3. Malware deploymentPloutus or similar malware is installed, often by booting from external media
4. Cash-outAttacker or accomplice ("money mule") triggers cash dispensing via keyboard codes or external commands
5. ExtractionCash is collected, malware may be removed to avoid detection
Attack Duration

A skilled attacker can complete a jackpotting attack in under 15 minutes

Why Ploutus is effective

Ploutus was specifically designed for ATM environments:

  • Targets Windows-based ATM platforms
  • Interacts directly with the XFS (eXtensions for Financial Services) layer
  • Can be controlled via keyboard commands or SMS (in some variants)
  • Multiple versions targeting different ATM manufacturers

The Tren de Aragua connection

The involvement of Tren de Aragua highlights how traditional criminal organizations are adopting cyber techniques.

Organization profile

AttributeDetail
OriginTocorón prison, Aragua state, Venezuela
ExpansionNow operates across South America, Central America, and the United States
ActivitiesExtortion, human trafficking, drug trafficking, financial crimes, and increasingly cybercrime
U.S. designationDesignated as a Transnational Criminal Organization (TCO)
Convergence Trend

Transnational criminal organizations are increasingly recruiting technical talent for cyber-enabled crimes

This case demonstrates the convergence of:

  • Traditional organized crime (physical operations, money mules)
  • Cybercrime techniques (specialized malware)
  • Cross-border operations (evading jurisdictional boundaries)

Defensive measures for financial institutions

Organizations operating ATMs should implement layered defenses addressing both physical and software attack vectors.

Physical security controls

ControlImplementation
Tamper-evident sealsApply to all access panels; inspect regularly
Physical alarmsAlert on cabinet opening or vibration
CCTV coverageMonitor all ATMs with adequate lighting and retention
Secure locationsPrioritize ATMs in staffed, well-lit areas
Key managementStrict control of maintenance keys; audit access logs

Software hardening

ControlImplementation
Application whitelistingOnly allow approved executables to run
Disable unused portsUSB, CD-ROM, and serial ports should be disabled in BIOS
Full-disk encryptionProtect against offline attacks
Secure bootPrevent booting from external media
Regular patchingKeep ATM software and OS updated
Endpoint protectionDeploy ATM-specific security solutions
Defense Priority

Physical access prevention is the most effective control—if attackers cannot open the cabinet, software attacks become significantly harder

Detection and response

Warning signs of jackpotting

  • Unusual ATM reboots or downtime
  • Physical evidence of tampering (scratches, broken seals, residue)
  • Anomalous cash dispensing patterns
  • Error logs showing unauthorized software execution
  • Reports of suspicious individuals near ATMs

Incident response steps

  1. Isolate - Take the ATM offline immediately
  2. Preserve - Do not reboot; preserve forensic evidence
  3. Report - Contact law enforcement and your ATM vendor
  4. Investigate - Review CCTV, access logs, and transaction records
  5. Analyze - Conduct forensic analysis of the ATM system
  6. Remediate - Address identified vulnerabilities before returning to service
Evidence Note

Forensic evidence is critical for prosecution—improper handling can compromise criminal cases

Implications for the industry

This case has broader implications for financial sector security:

Immediate concerns

  • Increased targeting: Successful prosecutions may temporarily deter, but jackpotting remains profitable
  • Technique sharing: Malware and techniques spread through criminal networks
  • Insider threats: Criminals may recruit ATM technicians or service personnel

Strategic considerations

FactorImplication
Aging ATM fleetOlder ATMs running Windows XP/7 are more vulnerable
Remote locationsUnattended ATMs in low-traffic areas are higher risk
Third-party servicersSupply chain security extends to maintenance contractors
Insurance coverageReview policies for jackpotting-specific coverage

Conclusion

The conviction and deportation of Venezuelan nationals for Ploutus-based ATM jackpotting represents a law enforcement success, but the underlying threat persists. ATM jackpotting combines low technical barriers with potentially high payouts, making it attractive to both opportunistic criminals and organized groups.

Key Takeaway

Financial institutions should treat ATM security as a physical-plus-cyber problem, not just a software issue

Organizations operating ATMs should:

  1. Audit physical security at all ATM locations
  2. Implement software hardening including whitelisting and encryption
  3. Train staff to recognize tampering indicators
  4. Establish incident response procedures specific to jackpotting
  5. Share threat intelligence with industry peers and law enforcement

Frequently Asked Questions

ATM jackpotting is an attack where criminals gain physical access to an ATM, install malware or connect external devices, and force the machine to dispense all its cash on command. The term comes from the similarity to hitting a slot machine jackpot.

Ploutus is a specialized ATM malware family first discovered in 2013. It targets ATMs running Windows and allows attackers to dispense cash using keyboard commands or external triggers. Multiple variants have been observed targeting different ATM vendors.

Tren de Aragua is a Venezuelan transnational criminal organization that originated in the Aragua state prison system. It has expanded operations across Latin America and into the United States, engaging in various criminal activities including cybercrime, extortion, and human trafficking.

Attackers typically gain physical access by picking locks, using stolen maintenance keys, or exploiting weak physical security. They then connect to internal ports (USB, CD-ROM, or serial connections) to install malware or boot from external media.

Key defenses include physical security improvements (tamper-evident seals, alarms, CCTV), disabling unused ports, implementing whitelisting software, encrypting hard drives, regular security audits, and deploying ATM-specific endpoint protection.

Immediately take the ATM offline, preserve evidence, contact law enforcement and your ATM vendor, review surveillance footage, check for physical tampering signs, and conduct forensic analysis of the ATM software and logs.

Incident Summary

Type
Malware
Severity
High
Industry
Finance
Threat Actor
Venezuelan nationals linked to Tren de Aragua gang
Target
Financial institutions and ATM operators across the United States
Published
Jan 23, 2026

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in