Synergent Blog

ATM Jackpotting Attacks Are Accelerating—Is Your Credit Union Prepared?

Dec 4, 2025 | Blog, Fraud

ATM jackpotting, once a rare, overseas threat, has now become a fast-growing and highly coordinated attack method targeting U.S. financial institutions. Criminals are gaining physical access to ATMs, installing malware or rogue devices, and forcing machines to dispense cash on command. These events can drain an ATM in minutes, often with no member transaction tied to the loss.

For credit unions, jackpotting is no longer an IT problem, it’s an enterprise risk issue that affects member trust, operational continuity, fraud losses, and insurance exposure.

Why Jackpotting Is Rising

Organized criminal groups have adapted traditional cyberattacks to the ATM environment. They use specialized tools and social engineering tactics to bypass physical barriers, manipulate software, and exploit outdated configurations.

They succeed when a credit union’s ATM environment has gaps in:

  • Physical access controls
  • Password management
  • Encryption configurations
  • Software updates
  • Operating system hardening

The good news: jackpotting is preventable with the right foundational controls in place.

Immediate Actions CEOs Should Prioritize

These steps materially reduce the likelihood of a jackpotting event and demonstrate strong oversight to regulators and auditors.

1. Strengthen Physical Security at the ATM

  • Require pick-resistant keys for ATM hoods to prevent universal key access.
  • Install alarms on the top hat of the ATM to detect unauthorized access before malware is deployed.
  • Ensure battery backup so alarms continue functioning during power loss.

Why it matters: Nearly every known jackpotting case begins with unauthorized physical access.

2. Eliminate Default Settings and Strengthen Password Practices

  • Remove all default passwords across all devices.
  • Assign unique, complex credentials to every ATM and system account.
  • Enforce password rotation every 90 days.

Why it matters: Default credentials remain one of the most exploited weaknesses in jackpotting attacks.

3. Encrypt All ATM Communications

  • Ensure all ATM network traffic uses a secure version of TLS (currently TLS 1.2e).
  • Retire outdated or legacy encryption.

Why it matters: Criminal devices can inject commands into unencrypted channels.

4. Keep Every ATM Component Updated

  • Apply patches consistently across the operating system, firmware, and application software.
  • Establish a formal patching cadence and documentation process.

Why it matters: Jackpotting often exploits known vulnerabilities that have already been patched, just not deployed.

5. Harden the ATM Environment

These measures help prevent unauthorized access and stop malware from running:

  • Disable Windows AutoPlay
  • Restrict ATM accounts to minimal privileges
  • Disable keyboard input for non-authorized use
  • Limit file and registry access
  • Apply strict Group Policies that lock down functionality

Why it matters: A locked-down operating system stops most jackpotting malware from executing.

6. Deploy Full Hard-Drive Encryption

Full disk encryption ensures that even if criminals remove a hard drive or boot from external devices, the data is unreadable.

Why it matters: Criminal groups often extract data, clone drives, or deploy malware offline.

7. Secure the ATM Core-to-Dispenser Communication

  • Require encryption between the ATM computer core and the cash dispenser.
  • Only allow authenticated commands to be processed.

Why it matters: This eliminates “black box” attacks, where criminals bypass the ATM software entirely.

8. Require Annual Third-Party Penetration Testing

  • Simulate real attack scenarios every year.
  • Validate that physical, logical, and network controls are working as intended.
  • Identify misconfigurations before criminals do.

Why it matters: Regulators increasingly expect independent validation of ATM security.

The Credit Union Imperative

Jackpotting is not a theoretical threat; it is already affecting credit unions across the country. Recovery can include:

  • Cash losses
  • Machine replacement
  • Branch downtime
  • Insurance complications
  • Member perception challenges
  • Regulatory scrutiny

Acting now creates a strong defensive posture and reinforces your commitment to member safety and operational resilience. To take further action, credit unions should work directly with their ATM terminal vendor.

The most effective strategy is a layered one, combining physical protections, cyber controls, encryption, monitoring, and regular testing. Credit unions that invest in these foundational safeguards dramatically reduce their exposure to jackpotting and ensure secure, uninterrupted access for their members.

About the Author

Rebekah Higgins, Chief Growth Officer at Synergent, brings nearly three decades of experience partnering with credit unions of all sizes. A recognized subject matter expert in payments and fraud, she is known for her strategic vision, collaborative leadership, and innovative approach. Rebekah’s deep industry insight and forward-thinking mindset continue to drive Synergent’s growth and empower credit unions to thrive in an evolving financial landscape.