US Secret Service Warns of Uptick in ATM DMA Jackpotting Attacks
- Feb 12
- 2 min read
In recent months, multiple US law enforcement agencies have responded to ATM jackpotting attacks targeting Direct Memory Access (DMA) of various ATM models and manufacturers by bypassing traditional security controls – resulting in significant financial loss and operational disruption. DMA attack vulnerabilities may exist across all ATM manufacturers and models. Attackers gain physical access to the ATM’s upper enclosure (top hat), power it down, open the main computer case (housing), connect malicious hardware (such as a DMA card or PCILeech device) to an internal port, and then power the ATM back up to directly access the memory by installing and/or executing malware on the ATM. This method is effective regardless of ATM brand or model, and older models may lack BIOS (Basic Input/Output System)1 or other firmware update support Technical Details and Attack Vectors
Device Components Used in Recent Attacks The following images represent typical components recovered from ATM DMA incidents. These devices, which can include a Raspberry Pi, DMA card, PCI adapter card, hot spot device, and an external USB power supply, can be used to facilitate direct access to ATM memory and bypass security controls. |

Mitigation Recommendations Successful mitigation requires a multi-layered strategy and may include the following actions.
|
Contact Your ATM Manufacturer for Further Guidance and Support |
Background DMA is a standard technology on most computers that provides the hardware with the ability to directly interact with the memory of the system for increased performance of large data transfers. DMA is legitimately used in standard technologies like PCI Express (PCIe), FireWire, Thunderbolt, PCMCIA (PC Card), CardBus, and ExpressCard. |


Comments