Skip to main content
Logo GMV

Main navigation

  • Sectors
    • Icono espacio
      Space
    • Icono Aeronáutica
      Aeronautics
    • Icono Defensa y Seguridad
      Defense and Security
    • Icono Sistemas Inteligentes de Transporte
      Intelligent Transportation Systems
    • Icono Automoción
      Automotive
    • Icono Ciberseguridad
      Cybersecurity
    • Icono Servicios públicos Digitales
      Digital Public Services
    • Icono Sanidad
      Healthcare
    • Icono Industria
      Industry
    • Icono Financiero
      Financial
    • Icono Industria
      Services
    • All Sectors

    Highlight

    Slopsquatting
    Slopsquatting: A silent threat born from the hallucinations of LLMs
  • Talent
  • About GMV
    • Get to Know the Company
    • History
    • Management Team
    • Certifications
    • Corporate Social Responsibility
  • Communication
    • News
    • Events
    • Blog
    • Magazine GMV News
    • Press Room
    • Media library
    • Latest from GMV

Secondary navigation

  • Products A-Z
  • GMV Global
    • Global (en)
    • Spain and LATAM (es - ca - en)
    • Germany (de - en)
    • Portugal (pt - en)
    • Poland (pl - en)
    • All branches and all GMV sites
  • Home
  • Communication
  • News
Back
New search
Date
  • Cybersecurity
  • Financial

GMV adapts ATMs to the maximum security levels of the future

03/02/2021
  • Print
Share
banksec_gmv_web

GMV was present at BankSec, the online event organized by Retail Banking Research (RBR) to analyze the characteristics of ATM cyberattacks and recommended the best protection measures against them. It has to be borne firmly in mind here that ATM network protection strategies in each case will depend on the real and perceived threats faced in each part of the world. It is also essential for these protection measures to be continually tweaked and updated as new attacks and operations develop, always striking the right balance between ATM protection and customer convenience.

mapThe map shows the graded worldwide ATM cyberattack risk. The red zone, identified as a “War Zone”, corresponds to countries that have reported the biggest number of attacks and where organized criminal groups are most active. These countries have the highest risk awareness, faced as they are with almost daily occurrence; they have therefore rolled out the highest number of ATM protection measures. At the other end of the scale come the countries in the “Comfort Zone”, where the sensation of risk is lower, the rollout of protection measures slower and, in many cases, insufficient.

The sheer sophistication of attacks in the War Zone” has forced banks to deploy security policies and protection measures that can come up with the quickest response to these attacks. The good practices adopted by these banks should be the baseline for the rest of the banks, especially those located in the “Comfort Zone” and, in general, where protection measures have been found wanting, bringing them up to the level found in the more severely affected areas.
An analysis of the most recent attacks shows that most of the exploited vulnerabilities stem from the use of backdoors by the banks themselves to make their ATMs more user-friendly. For example, the possibility of connecting USBs to ATMs is a weak point that many banks tolerate to enable their technicians to carry out on-site maintenance work.

If we now turn our attention to the ATM networks, we could perhaps define their hallmark trait as stability: stability of the software, of data, transactions and execution in general. We also know that attacks tend to shake up this stability like an earthquake: incomplete transactions, skewed execution sequences, abnormally high or low amounts, etc.

These inherent ATM traits mean that behavior-analysis and anomaly-detection technology really comes into its own here. This needs to be based on a stable and well-known system behavior without suffering any upsets caused by vendor- or model-heterogeneity of the ATM networks. The XFS layer provides this desired stability and uniformity, cancelling out the vendor or model idiosyncrasies while also ensuring direct access to the ATM’s most critical and basic functions. This layer also allows for a complete and very dependable analysis of ATM behavior, flagging up the slightest anomaly and cutting down the number of false positives.
In many cases, however, the detection of anomalies is not enough to fend off an attack; it needs to be rounded out with measures to block off these anomalies. Once more, the XFS layer constitutes the perfect input point not only for analyzing behavior but also detecting anomalies, taking the necessary measures to ward off this suspicious behavior.

We at GMV have developed a new ATM security product, Checker XFS Filtering. At ATM XFS-level it implements a complete ATM-security solution, combining ATM behavior analysis, anomaly detection and filtering of suspicious actions. This new GMV solution is a natural upgrade of its longstanding ATM-security product, Checker ATM Security, to ensure the maximum levels of security.

  • Print
Share

Related

Ciberseguridad Andalucía 2025
  • Cybersecurity
GMV analyzes European cyberdefense challenges at the Andalusia Cybersecurity Conference
GMV participa en la Jornada de presentación de la Estrategia de Tecnologías Cuánticas de España 2025-2030
  • Cybersecurity
GMV participates in the presentation of the Quantum Technologies Strategy for Spain 2025-2030
CCI La Voz de la Industria Andalucia
  • Industry
  • Cybersecurity
CCI The Voice of the Industry of Andalusia (Seville)
15 May

9:00 AM - 3:30 PM

Contact

Isaac Newton, 11 Tres Cantos
E-28760 Madrid

Tel. +34 91 807 21 00

Contact menu

  • Contact
  • GMV around the world

Blog

  • Blog

Sectors

Sectors menu

  • Space
  • Aeronautics
  • Defense and Security
  • Intelligent Transportation Systems
  • Automotive
  • Cybersecurity
  • Digital Public Services
  • Healthcare
  • Industry
  • Financial
  • Services
  • Talent
  • About GMV
  • Shortcut to
    • Press Room
    • News
    • Events
    • Blog
    • Products A-Z
© 2025, GMV Innovating Solutions S.L.

Footer menu

  • Contact
  • Legal Notice
  • Privacy Policy
  • Cookie Policy

Footer Info

  • Commitment to the Environment
  • Financial Information