GreenDispenser Malware allows an attacker to walk up to an infected ATM and, with a series of pinpad entries, direct the machine to dispense all of its cash.
Once this has been accomplished, the attacker initates a “deep delete” of GreenDispenser, leaving virtually no trace of the malware,
You probably know the internal computers of ATMs are under lock and key, but you may not know the many of the locks can be opened by a single master key. Hackers in Mexico apparently have copies of that key and are programming the computers to steal your money
once installed on an ATM machine, will display a fake error message that reads: “We regret this ATM is temporary out of service.”
Only the hacker can bypass this error, and the malware unusually requires two-factor authentication. The hacker must first enter a pin code that has been hard-coded into the malware, and then use a smartphone to scan a QR code that appears on the ATM screen.