DOJ Charges 54 in ATM Jackpotting Scheme with Ploutus Malware

Published:

spot_img

Dec 20, 2025Ravie LakshmananCybercrime / ATM Security

Major Indictment in ATM Jackpotting Scheme

The U.S. Department of Justice has unveiled details of a significant indictment involving 54 individuals linked to a large-scale ATM jackpotting operation that siphoned millions of dollars from automated teller machines across the country. This illicit activity involved the use of malware called Ploutus, which allowed perpetrators to forcibly extract cash from ATMs by exploiting their systems.

Connection to a Notorious Gang

The individuals indicted are reportedly affiliated with Tren de Aragua (TdA), a Venezuelan gang that has been designated as a foreign terrorist organization by the U.S. State Department. This group has been implicated in a range of criminal offenses, including drug trafficking, human smuggling, extortion, and more. Earlier this year, in July 2025, U.S. authorities imposed sanctions on the gang’s leader, Hector Rusthenford Guerrero Flores, also known as Niño Guerrero, explicitly for his role in these diverse criminal enterprises.

Details of the Indictment

On December 9, 2025, the Justice Department announced charges against a segment of 22 individuals for engaging in bank fraud, burglary, and money laundering. These charges highlight how TdA has utilized jackpotting tactics to embezzle huge amounts of money while redistributing their ill-gotten gains among gang members. Additionally, a second group of 32 individuals faces various charges including conspiracy to commit bank fraud, among others, indicating the extensive collaboration within the criminal network.

Potential Consequences for the Defendants

The potential repercussions for those indicted are severe, with the possibility of prison sentences ranging from 20 to 335 years if convicted. According to Acting Assistant Attorney General Matthew R. Galeotti, these accused parties employed meticulous surveillance and burglary strategies to infect ATMs with malware and subsequently steal and launder money, partly to finance TdA’s terror-related activities.

Execution of the Jackpotting Scheme

The operation involved recruiting individuals tasked with infiltrating ATMs across the nation. They would first gather intelligence on the security measures in place at various machines. The next step involved opening the ATM and installing the Ploutus malware via a replaced hard drive or a USB stick. Once active, the malware could issue unauthorized commands to the ATM, triggering cash withdrawals without any legitimate authorization.

In a troubling twist, the Ploutus malware was engineered to erase its traces, keeping bank personnel unaware of the breach. Members of the conspiracy were then able to divide the stolen funds according to pre-established agreements.

Understanding Ploutus Malware

Originally identified in Mexico in 2013, Ploutus exploits vulnerabilities in ATM systems, particularly those running older versions of Windows. Initial discoveries reported by cybersecurity firm Symantec showcased how attackers could gain access to ATMs through weaknesses in Windows XP-based machines. More comprehensive analyses conducted later revealed Ploutus’s capabilities to control various brands of ATMs and execute cash withdrawals remotely.

Once the malware is active on an ATM, it allows a “money mule” to retrieve large amounts of cash quickly, provided they have the necessary equipment to access the machine physically, like a master key and a physical keyboard.

Scale of the Jackpotting Incident

Since 2021, the U.S. has reported a staggering total of 1,529 jackpotting incidents, with an estimated loss of $40.73 million to these international criminal networks as of August 2025. This alarming trend highlights a growing concern over the effectiveness of ATM security measures and sets off urgent calls for increased cybersecurity protections in the financial sector.

U.S. Attorney Lesley Woods remarked on the significant financial losses attributed to this conspiracy, emphasizing that much of the drained money was redirected to fund the terrorist activities of Tren de Aragua’s leaders.

spot_img

Related articles

Recent articles

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme In a significant cybersecurity breach, Drift has disclosed that the attack on April 1,...

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network A routine investigation into a single financial fraud complaint in New Delhi has...

Abu Dhabi Chamber Strengthens Economic Resilience at Multaqa Al Tujjar Forum for Private Sector Leaders

Abu Dhabi Chamber Strengthens Economic Resilience at Multaqa Al Tujjar Forum for Private Sector Leaders Abu Dhabi recently hosted the Multaqa Al Tujjar: Private Sector...

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches In a recent statement, the Cybersecurity Council of the UAE highlighted a troubling trend...