Morning Overview

FBI warns terrifying ATM jackpotting surge is stealing millions in cash

Federal prosecutors have charged more than a dozen suspects across multiple states in connection with ATM jackpotting schemes that collectively drained millions of dollars from bank machines using malware and specialized tools. The cases, spanning Georgia, New York, and Florida, represent a sharp escalation in a crime that turns ordinary cash dispensers into unguarded vaults. With alleged losses exceeding $6 million in the largest prosecution alone, the wave of indictments signals that both organized criminal rings and state-linked actors are exploiting weak points in the nation’s ATM infrastructure at an accelerating pace.

Malware Turns ATMs Into Slot Machines

ATM jackpotting works by installing malicious software or connecting external devices to a cash machine’s internal computer, forcing it to spit out bills on command without any legitimate card transaction. The technique requires hands-on access to the machine itself, which is why the U.S. Secret Service warned that standalone and retail ATM locations are the most exposed targets. Unlike card skimming, which harvests customer data for later fraud, jackpotting bypasses the banking network entirely and empties the cassette in minutes, leaving little digital trace of the theft beyond error codes and sudden cash depletion.

That distinction matters for consumers and banks alike. A skimmed card can be canceled and reissued; a jackpotted ATM represents an immediate, unrecoverable cash loss to the financial institution that owns or operates the machine. The speed of the attack, often completed in under an hour per location, makes it difficult for branch staff or remote monitoring systems to intervene before the money is gone. Criminals typically work in teams: one member gains physical access, another installs the malware or device, and a third collects the dispensed cash, sometimes rotating rental cars and disguises to make surveillance footage less useful to investigators.

Georgia Ring and the $6 Million International Scheme

A federal case in the Middle District of Georgia illustrates how these crews operate on the ground. According to court documents, thefts and attempts occurred around September 14 through 16, 2024, at specific bank ATMs in the state, with additional attempted activity tied to Florida. In that matter, detailed by prosecutors in the Georgia indictment, authorities seized cash, keys, and electronic devices from the suspects, and the case involves the use of malware to manipulate the machines. The bust was updated in January 2026, reflecting ongoing investigative work across state lines and suggesting that investigators are still tracing related activity and potential accomplices.

That Georgia prosecution fits into a broader pattern that federal officials say is increasingly international in scope. The Department of Justice’s Office of Public Affairs announced that additional defendants were charged in an international ATM jackpotting scheme, with indictments filed on October 21, 2025, and January 21, 2026. The charges include bank fraud, bank burglary, and computer damage, and the alleged losses exceed $6 million overall. The scale of that figure, drawn from a single prosecutorial thread, suggests the true national cost is considerably higher when accounting for cases that never reach federal court or go unreported by smaller financial institutions that quietly absorb losses or pass them to insurers rather than publicizing security failures.

New York Conspiracy Netted Over $400,000 in Days

A separate indictment from the Northern District of New York shows how quickly jackpotting losses can compound when crews move methodically from one target to the next. Six men were charged in connection with a conspiracy that struck multiple financial institutions in December 2023, stealing over $400,000 across four events in specific New York counties. The indictment, updated on October 4, 2024, describes coordinated activity over a short window of time, with defendants allegedly traveling between locations and exploiting similar weaknesses in each ATM they attacked. Four separate hits producing that sum in a single month points to a repeatable playbook rather than an isolated exploit or one-off vulnerability.

The New York and Georgia cases share a common thread: small teams deploying proven malware against machines in locations where physical security is limited and late-night oversight is minimal. Most public discussion of ATM crime still centers on card skimming, which generates far more individual victim complaints and consumer-facing disputes. But jackpotting’s per-incident haul dwarfs typical skimming losses, and the operational model (traveling crews hitting multiple states in rapid succession) makes it harder for local law enforcement to build cases without federal coordination. Agencies such as the Federal Bureau of Investigation and the U.S. Marshals have been involved in the international scheme prosecutions, reflecting the cross-jurisdictional demands of these investigations and the need to track suspects who may move quickly between states or even leave the country after a series of attacks.

North Korean Links and the FASTCash Threat

Domestic criminal rings are not the only concern for banks and payment processors. A joint cyber alert from CISA, the Treasury Department, the FBI, and U.S. Cyber Command flagged ATM cash-out activity linked to North Korea’s so-called FASTCash 2.0 tradecraft, which has targeted financial institutions around the world. That operation uses malware to intercept transaction messages on payment switch servers, enabling fraudulent ATM withdrawals across dozens of countries simultaneously. The technique, described in interagency advisories on North Korean cyber activity, differs from the physical-access jackpotting seen in the Georgia and New York cases because it compromises the banking network remotely rather than tampering with individual machines, effectively turning any connected ATM into a potential cash-out point once the central switch is under attacker control.

The overlap between state-sponsored and criminal jackpotting creates a compounding problem for the banking sector, which must defend against both hands-on and remote exploitation. Defending against physical tampering requires hardened ATM enclosures, better surveillance, and faster anomaly detection at the branch level, including alerts when cassettes empty faster than expected or service panels are opened outside authorized maintenance windows. Defending against FASTCash-style remote attacks demands network-level monitoring and patching of payment switch applications, a responsibility that falls on processors and core banking vendors rather than individual branches. Most mid-size banks lack the resources to address both threat vectors at once, and existing guidance has focused more on awareness than on imposing specific technical standards, leaving a patchwork of defenses that sophisticated attackers can probe for weaknesses.

Regulatory Gaps, Resource Strain, and What Comes Next

The federal response to jackpotting and related cash-out schemes has so far leaned heavily on after-the-fact prosecutions rather than prescriptive security rules. Law enforcement agencies have issued public alerts and technical advisories, but there is no single nationwide baseline for ATM hardening, remote monitoring, or incident reporting. That fragmented approach is especially risky during periods of fiscal uncertainty, when agencies and financial regulators must plan for potential funding interruptions. The Department of Homeland Security has warned that a prolonged appropriations lapse could disrupt some cybersecurity operations, and its notice on a possible government funding lapse underscores how resource constraints may slow the development and enforcement of new defensive measures just as jackpotting tactics are becoming more sophisticated.

For banks, credit unions, and independent ATM operators, the recent indictments are both a warning and a roadmap. The details emerging from Georgia, New York, and the international cases show attackers repeatedly exploiting predictable weaknesses: lightly guarded machines, delayed detection of abnormal cash flows, and legacy systems that are difficult to patch or monitor in real time. Industry groups and regulators are likely to face growing pressure to translate investigative lessons into concrete requirements around software updates, physical security audits, and rapid reporting of suspected jackpotting attempts. Until those standards are widely adopted, the combination of organized criminal crews, advanced malware, and state-linked operations will continue to test the resilience of the cash access systems that millions of Americans rely on every day.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.