Recent Adaptation of FASTCash Malware for Linux Targets Payment Switches in ATM Heists

Oct 15, 2024Ravie LakshmananFinancial Fraud / Linux

Operatives with ties to North Korea have been using a Linux version of the well-known malware strain FASTCash to illicitly obtain funds in a campaign driven by financial motives.

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

Oct 15, 2024Ravie LakshmananFinancial Fraud / Linux

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

Operatives with ties to North Korea have been using a Linux version of the well-known malware strain FASTCash to illicitly obtain funds in a campaign driven by financial motives.

According to HaxRob, a cybersecurity expert, the malware is introduced into payment switches on compromised networks responsible for processing card transactions to facilitate the unauthorized extraction of cash from ATMs.

FASTCash was initially identified by the U.S. government in October 2018 as being utilized by actors associated with North Korea in a scheme to extract cash from ATMs targeting banks in Africa and Asia since at least the end of 2016, as per reports.

Cybersecurity

“FASTCash operations involve remotely compromising application servers for payment switches in banks to enable fraudulent transactions,” the agencies indicated back then.

“In a specific case in 2017, HIDDEN COBRA operators triggered the withdrawal of cash from ATMs located in more than 30 different nations simultaneously. In another episode in 2018, HIDDEN COBRA actors orchestrated cash withdrawals from ATMs in 23 countries concurrently.”

Prior variants of FASTCash targeted systems running Microsoft Windows (with one sighting as recent as the previous month) and IBM AIX, but recent discoveries reveal samples optimized for infiltrating Linux setups were initially submitted to the VirusTotal platform in mid-June 2023.

The malware materializes as a shared object (“libMyFc.so”) specifically tailored for Ubuntu Linux 20.04. Its purpose is to intercept and manipulate ISO 8583 transaction messages used in debit and credit card processing to initiate illicit fund withdrawals.

Its operation involves altering declined (magnetic swipe) transaction messages due to insufficient funds for a predefined set of cardholder account numbers, authorizing them to draw a random amount of money in Turkish Lira.

Cybersecurity

The amount stolen per illicit transaction ranges from 12,000 to 30,000 Lira ($350 to $875), mirroring a Windows FASTCash artifact (“switch.dll”) previously highlighted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in September 2020.

The researcher highlighted, “[The] identification of the Linux variant further underscores the necessity for proficient detection capabilities, often found lacking in Linux server environments.”

Found this article intriguing? Connect with us on Twitter and LinkedIn for more exclusive updates.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.