Home Malware Programs Backdoors Tyupkin

Tyupkin

Posted: October 14, 2014

Threat Metric

Ranking: 13,424
Threat Level: 8/10
Infected PCs: 314
First Seen: October 14, 2014
Last Seen: October 8, 2023
OS(es) Affected: Windows

Tyupkin is a Trojan that allows criminals to compromise ATM machines, afterward letting them withdraw up to forty bills in a single transaction. Although Tyupkin is most often seen in the nation of Russia, malware researchers also have seen Tyupkin infections confirmed in regions as far abroad as Malaysia and North America. Because Tyupkin installs itself via physical access to the machine in question, proper physical security is essential in limiting Tyupkin's distribution – and preventing automated teller machines from giving 'free' money to criminals.

A Thief that Goes Straight to the Source

Although many forms of finance-oriented threats prefer to carry off from bank customers or 'skim' for credit card details, Tyupkin is designed with a different target in mind: the physical banknotes stored in ATM machines. Criminals install Tyupkin by breaking into an ATM machine's internal CD drive and loading a bootable CD with this threat. If Tyupkin fails to gain full control over the ATM machine's keypad, Tyupkin will delete itself.

However, the newest variants of Tyupkin operate on a strict schedule and take basic security steps to prevent normal ATM customers from gaining access to its money-clasping functions. Unless configured otherwise, Tyupkin only allows access on two days of the week, Sunday and Monday nights. It also requires that the login user enter a specific unlock key based on a seed that Tyupkin displays on the screen. Since only Tyupkin's designers know the algorithm used with the seed to generate the appropriate key, these precautions prevent both normal customers and security researchers from gaining full access to Tyupkin.

Once the criminals enter the key, Tyupkin allows them to view basic information on the currencies available in the machine, and withdraw up to forty bills from an internally-stored cassette. In contrast to most Point-of-Sale or POS Trojans, such as Project Hook, Tyupkin does not try to collect card information from the machine's customers.

How an Eye in the Sky can Save Your Business

Major aliases of Tyupkin Trojans include BKDR_PADPIN.A or Backdoor:MSIL/Sidkey.A, and new variants of this threat are under regular development. Although roughly two-thirds of all estimated Tyupkin infections reside within Russia, businesses in other nations also have been confirmed for being at risk of these attacks. Both Tyupkin's installation and its cash-withdrawal functions require criminals to have unobserved access to the ATM machine, and, thus, adequate storefront security is the most obvious defense against all known Tyupkin variants.

Some of Tyupkin's versions also include extra functions, such as being able to terminate McAfee Solidcore or disable LAN. Since threat database updates provide the greatest assurance of your security products being able to identify and remove Tyupkin, Tyupkin's development history only provides further fuel to the importance of updating security solutions regularly.

Loading...