How the Lazarus Group is Emptying Millions from ATMs
FASTCash: How the Lazarus Group is Emptying Millions from ATMs
Last month, the US government issued an alert that Lazarus has been conducting “FASTCash” attacks against ATMs from banks in Asia and Africa. Symantec researchers have since uncovered the key component used by Lazarus to fraudulently empty ATMs of cash.
Known initially for its espionage operations and high-profile attack against Sony Pictures, Symantec’s research shows increasing financial motivation behind the Lazarus group’s attacks, including the targeting of the Bangladesh Central Bank and the group’s WannaCry ransomware operation. This recent wave of FASTCash attacks demonstrates that financially motivated attacks are not simply a passing interest for Lazarus, but one of its core activities.
To make fraudulent withdrawals, Lazarus first breaches the banks’ networks and compromises the switch application servers handling ATM transactions.Once these servers are compromised, previously unknown malware (Trojan.Fastcash) is deployed, which intercepts fraudulent cash withdrawal requests and sends fake approval responses, in turn allowing the attackers to steal cash from ATMs.
Stats NZ: Economic Impacts On New Zealand From Conflict In The Middle East – Report
Advertising Standards Authority: ASA Annual Report 2025 - Platform-Neutral Regulation Keeps Pace With Digital Advertising
Science Media Centre: Lead Pipes Banned For New Plumbing – Expert Reaction
New Zealand Young Physicists Trust: Auckland To Host The ‘World Cup Of Physics’ In 2027; Search Begins For Student-Designed Tournament Logo
Oxfam Aotearoa: Top CEO Pay Increased 20 Times Faster Than Workers’ Pay In 2025
Bill Bennett: TUANZ Report - Networks Built, Value Missing

