Skip to main content
Today: Today February 19, 2026
HubNews
Blockchain+
Cybersecurity+
Development+
Economy & Finance+
Gaming+
Artificial Intelligence+
Hardware+
Startups
Blockchain+
Cybersecurity+
Development+
Economy & Finance+
Gaming+
Artificial Intelligence+
Hardware+
Startups

HubNews

Receive weekly the main news and analyses about Artificial Intelligence directly in your email.

Sign Up for Free

News

  • Home Page
  • Feed
  • Guides
  • AI Products
  • Top
  • Deep Dives
  • Search

More

  • Games
  • Tools
  • Subscribe Free
  • Podcast

Information

  • About Us
  • Contact
  • FAQ
  • Developers
  • Sponsors

Legal

  • Privacy Policy
  • Terms of Service

© 2026 HubNews.ai. All rights reserved.

Cybersecurity
Arrest of ATM Hackers Transforms Landscape in the US

Arrest of ATM Hackers Transforms Landscape in the US

TL;DR

The U.S. Department of Justice formally charges 87 individuals involved in a major **ATM jackpotting** operation, a technique using **malware** to force ATMs to dispense cash, linked to significant financial crimes with ties to terrorist support, notably the **Tren de Aragua** (TdA).

www.tecmundo.com.br•January 27, 2026•
3 min read
•0 views

The U.S. Department of Justice formally charges 87 individuals involved in a major **ATM jackpotting** operation, a technique that uses **malware** to force ATMs to dispense money. The investigation began six months ago in response to significant financial crimes with implications linked to support for terrorist groups, specifically the **Tren de Aragua** (TdA).

The scheme represents one of the most comprehensive investigations in terms of cybercrime and terrorism, consolidating intense collaboration among various agencies, coordinated by the **Joint Task Force Vulcan** and the **Homeland Security Task Force**. This operation reflects a broader effort to combat financial crimes that fund terrorist activities.

Operation of the Scheme

Those involved in the conspiracy developed a variant of the **Ploutus** malware specifically designed to attack ATMs. The group organized itself into a network with a strategy of targeting different locations simultaneously across various parts of the country.

The process began with a reconnaissance phase, where criminals assessed the security features of the equipment, including alarm systems and police monitoring. After configuring their strategy, they performed non-intrusive tests to gauge the response of authorities.

Malware Installation Methods

The installation of **malware** occurred through three main techniques. The first involved the physical removal of the hard disk for direct software installation. The second, faster method, involved swapping the disk with one that was already compromised. The third used external devices that, when connected, implanted the malware instantly.

Features of Ploutus

The **Ploutus** malware is a sophisticated tool, primarily designed to issue fraudulent commands to the cash dispensing module of ATMs. By activating it, criminals could cause the machine to release all available cash.

Additionally, the software minimized its digital traces by self-destructing, making it difficult for bank security agents to detect.

Profit Distribution and Money Laundering

After attacks, the profits were divided according to an organized structure, indicating a clear hierarchy among crime members. A significant portion of the gains was allocated to the TdA, supporting their criminal and terrorist activities.

Authorities highlighted the complexity of how the money was laundered, with internal transfers to disguise the illicit origin and generate significant profit for the organization.

Wave of Charges

The grand federal jury for the District of Nebraska presented the charges in three distinct waves. The first occurred on October 21, 2025, accusing 32 individuals of various offenses, including bank fraud.

The second wave, on December 9, 2025, brought more severe charges, such as conspiracy to provide support to terrorists. The final stage included another 31 defendants and broadened the accusations to other cybercrimes.

About the Tren de Aragua

The **TdA** started as a gang in the Venezuelan prison system but quickly evolved into an international criminal organization with several illegal operations, including drug and arms trafficking. Its expansion illustrates how financial crimes can be interconnected with networks of terrorism.

Protection of Customer Accounts

Despite the gravity of the crimes, customer accounts remained intact. The stolen money belonged to banks and cooperatives, not affecting personal information or balances. This protection ensured financial security for individuals while investigations were ongoing.

Defendants, if convicted, could face sentences ranging from 20 to 335 years, reflecting the seriousness of the accusations, particularly those related to terrorist groups. This situation highlights the increasing need for vigilance and security in financial systems against cyber threats.

Ongoing Similar Cases

The situation is not isolated. Recently reported by TecMundo, two individuals were convicted of similar crimes, reinforcing the need for ongoing efforts to combat these illicit practices and vigilant monitoring by authorities.

Content selected and edited with AI assistance. Original sources referenced above.

Share

Sources

www.tecmundo.com.br

Primary
https://www.tecmundo.com.br/seguranca/410174-criminosos-que-hackeavam-caixas-eletronicos-sao-presos-nos-estados-unidos.htm

Jan 27, 2026

Enjoyed this article?

Get the best tech news delivered to your inbox every day.

Comments

Write a comment

More in Cybersecurity

Criminals Steal Passwords from Brazilians with Fake Apple Websites
Cybersecurity

Criminals Steal Passwords from Brazilians with Fake Apple Websites

A phishing scheme targets Brazilian iPhone users, using over <strong40 fraudulent domains</strongto collect Apple ID credentials.

HubNews • FEB 11 • 1 min read
Phishing Scam Uses Leaked CPF to Steal Money via PIX
Cybersecurity

Phishing Scam Uses Leaked CPF to Steal Money via PIX

A new phishing campaign exploits leaked CPF data in Brazil to steal money through PIX, the instant payment system, by sending fraudulent SMS messages.

HubNews • FEB 9 • 1 min read
Hackers Exploring OpenClaw for Malware Distribution
Cybersecurity

Hackers Exploring OpenClaw for Malware Distribution

Researchers from Bitdefender Labs have identified that OpenClaw, an automation platform utilizing artificial intelligence, is being used as a means for malware distribution. Analysis revealed that among the skills examined, approximately 17% exhibited malicious behavior in February 2026.

HubNews • FEB 7 • 1 min read