Kraken has urged BATMTwo ATM owners and operators to change the admin QR code for their ATMs to avoid potential attacks.
Kraken Security Labs has said that a “large number” of Bitcoin (BTC) ATMs are vulnerable to hacking, as the administrators never changed the default admin QR code.
In a Wednesday blog post, Kraken posted research from its Security Labs team, which found that there are “multiple hardware and software vulnerabilities” in the General Bytes BATMTwo ATM range.
“Multiple attack vectors were found through the default administrative QR code, the Android operating software, the ATM management system and even the hardware case of the machine,” the post read.
Kraken’s security team stated that if a hacker gets their hands on the administrative code, they can essentially “walk up to an ATM and compromise it,” while also highlighting issues with the BATMTwo’s lack of secure boot mechanisms, as well as “critical vulnerabilities” in the ATM’s management system. However, General Bytes has reportedly already alerted ATM owners to the vulnerabilities:
The team also found that it was able to gain full access to the Android operating system behind the BATMTwo ATM by simply attaching a USB keyboard to the machine and warned that “anyone” could “install applications, copy files or conduct other malicious activities.”
General Bytes is headquartered in the Czech Republic and, according to Coin ATM Radar, there are currently 6,391 General Bytes ATMs installed worldwide, which represents 22.7% of the global market. However, those figures also account for BATMThree machines that weren’t reported on by Kraken.
The majority of the BATM ATMs are located in the United States and Canada, with a combined figure tallying in at around 5,300, while Europe has around 824 ATMs installed.
Kraken is calling on BATMTwo owners and operators to change the default QR admin code, update the CAS server, and place the ATMs in visible locations for security cameras.
Bitcoin ATM scams
While reports of hacked Bitcoin ATMs appear to be minimal, there is a history of crafty individuals building scams around crypto ATMs.
In March 2019, the Toronto Police issued a public statement calling on the community to locate four men suspected of carrying out a series of “double-spending” transactions that fetched $150,000 worth of funds over a 10-day window. Double-spending consists of canceling transactions before the ATM has had a chance to confirm but keeping the dispensed cash.
The Oakland Press reported on June 22 of this year that two women from Berkeley were scammed out of a combined $15,000 after fraudsters posed as public safety officers and federal employees. The scammers reportedly told the victims that they had outstanding warrants and tax violations and ordered them to pay fines via local Bitcoin ATMs in the area.
And Malwarebytes posted research in August that uncovered a trend of gas station Bitcoin ATM scams in which threat actors would post fake jobs listings to dupe applicants into money laundering.