February 7, 2017 By Larry Loeb 2 min read

The Indian government revealed that over 70 percent of the automated teller machines (ATMs) in the country currently run Windows XP. Since this particular flavor of Windows has not been updated since 2014, its widespread use as an ATM operating system is concerning. Cybercriminals can exploit the many well-known system security issues that affect this outdated system.

A Massive Migration

Finance Minister Arun Jaitley said the government was working with “banks and other parties” to upgrade these machines, according to Softpedia. He reported that roughly 22,000 ATMs would need to be migrated to more current systems — likely Windows 10.

Jaitley did not provide a target date for such a migration, nor did he specify the hardware or software it would require. The finance minister did, however, admit that it would take a long time to complete.

Microsoft Supports Its Outdated ATM Operating System

To keep the ATMs up and running, Jaitley noted, some stakeholders engaged Microsoft to provide custom support for their specific machines. While this support enabled the machines to function, the migration from XP should still be carried out as soon as possible.

This situation highlights the problem with older technologies: When tools fall behind the times, they require capital to upgrade. In this case, while most big banks with plenty of resources continually upgrade their machines, the ATMs typically found in convenience stores and other retail locations have fallen behind.

Stakeholders Don’t Feel the Pain

Although any reasonable threat model for an ATM will include breaching, stakeholders may not be able to see actual breaches occurring or understand the issues stemming from outdated machines. In other words, they may not be feeling the pain.

The economic incentive to replace these machines may actually be negative, since there is currently no standard hardware or software platform. Why migrate at all if you are not sure where you are migrating to? However, failure to do so puts ATM users — their customers — at risk.

The current situation suggests that India has a long way to go when it comes to securing ATMs today and in the future.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today