Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Banking Awards
    • Banking Innovation Awards
    • Digital Banking Awards
    • Finance Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    • Financial Awards
    • Private Banking Awards
    • Private Banking Innovation Awards
    • Retail Banking Awards
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >ATM JACKPOTTING FOR DUMMIES: KASPERSKY LAB IDENTIFIED CUTLET MAKER, THE NEW ATM-HACKING MALWARE-KIT DESIGNED FOR NON-PROFESSIONAL CRIMINALS
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Global Banking & Finance Awards 2026 — Now Open for Entries
    Technology

    Atm Jackpotting for Dummies: Kaspersky Lab Identified Cutlet Maker, the New Atm-Hacking Malware-Kit Designed for Non-Professional Criminals

    Published by Gbaf News

    Posted on October 21, 2017

    9 min read

    Last updated: January 21, 2026

    Add as preferred source on Google
    Image of Kim Leadbeater addressing the media about proposed changes to the UK's assisted dying law, emphasizing the removal of High Court judge sign-off to enhance the legislative process.
    Lawmaker Kim Leadbeater discusses UK's assisted dying law changes - Global Banking & Finance Review
    Global Banking & Finance Awards 2026 — Call for Entries

    Kaspersky Lab researchers have discovered a malware targeting ATMs, which was being openly sold on the DarkNet market. Cutlet Maker consists of three components and enables ATM jackpotting if the attacker is able to gain physical access to the machine. A toolset potentially allowing criminals to steal millions was on sale for just £3,788 and came equipped with a step-by-step user guide.

    ATMs continue to be lucrative targets for fraudsters, who use various methods to extract maximum profit. While some rely on physically destructive methods through the use of metal cutting tools, others choose malware infection, enabling them to manipulate cash dispensers from the inside. Although malicious tools for hacking ATMs have been known for many years, the latest discovery shows that malware creators are investing more and more resources into making their “products” available for criminals who are not very familiar with computer science.

    Earlier this year, a Kaspersky Lab partner provided one of our researchers with a previously unknown malicious sample presumably made to infect PCs running inside ATMs. Researchers were curious to see if this malware or something related to it was available to purchase on underground forums. A subsequent search for the unique artifacts of the malware was successful: an advertising offer describing a strain of ATM malware on a popular DarkNet spot – AlphaBay – matched the search query and revealed that the initial sample belonged to a whole commercial malware-kit created to jackpot ATMs. A public post by the malware seller, found by researchers, contained not only the description of the malware and instructions on how to get it, but also provided a detailed step-by-step guide on how to use the malware-kit in attacks, with instructions and video tutorials.

    According to the research, the malware toolkit consists of three elements:

    • Cutlet Maker software, which serves as the main module responsible for communicating with the ATM’s dispenser.
    • c0decalcprogram, designed to generate a password in order to run the Cutlet Maker application and protect it from unauthorised use.
    • Stimulator application, which saves time for criminals by identifying the current status of ATM cash cassettes. By installing this app, an intruder receives exact information on the currency, value and number of notes in each cassette, so can then choose the one containing the largest amount, instead of blindly withdrawing cash one by one.

    To begin the theft, criminals need to gain direct access to an ATM’s insides in order to access the USB port, which is used to upload the malware. If successful, they plug in a USB device which stores the software toolkit. As a first step criminals install Cutlet Maker. Since it is password protected they use a c0decalc program, installed on another device such as a laptop or tablet – this is a kind of “copyright” protection installed by authors of Cutlet Maker in order to prevent other criminals from using it for free. After the code is generated, criminals enter it into Cutler Maker’s interface to start the money removal process.

    Cutlet Maker had been on sale since 27 March 2017, however as researchers discovered, the earliest known sample came on the radars of the security community in June 2016. At that time it was submitted to a public multi-scanner service from Ukraine, but later submissions from other countries were also made. It is not clear if the malware was used in actual in the wild attacks, however the guidelines that came with the malware kit contained videos which were presented by their authors as real life proof of the malware’s efficiency.

    It is unknown who is behind this malware. Regarding potential sellers of the toolkit, language, grammar and stylistic mistakes point to the fact they are non-native English speakers.

    “Cutlet Maker requires almost no advanced knowledge or professional computer skills from the criminal, transforming ATM hacking from a sophisticated offensive cyber operation into yet another illegal way to earn money that is available to practically anyone who has several thousand dollars to purchase the malware. This may potentially become a dangerous threat to financial organisations. But what is more important is that while operating, Cutlet Maker interacts with the ATMs software and hardware, encountering almost no security obstacles at all. This should be changed in order to harden ATM machines,” says Konstantin Zykov, security researcher at Kaspersky Lab.

    In order to protect ATMs from attacks with the help of malicious tools like Cutlet Maker and in addition to providing reliable physical security to ATMs, Kaspersky Lab specialists advise financial organisations security teams to do the following:

    • Implement strict default-deny policies preventing any unauthorised software from running on the ATM.
    • Enable device control mechanisms to restrict the connection of any unauthorised devices to the ATM.
    • Use a tailored security solution to protect your ATMs from attacks from the likes of the Cutlet Maker malware.

    For better ATM protection Kaspersky Lab also recommends to use a proper security solution, such as Kaspersky Embedded Systems Security.

    Kaspersky Lab products successfully detect and block the Cutlet Maker malware.

    To read more about how Cutlet Maker works, read the recent blogpost on Securelist.com.

    This analysis continues Kaspersky lab’s ongoing research into financial malware targeting ATMs. You can learn more about the evolution of ATM attacks in Kaspersky Lab’s report on Future attack scenarios against ATM authentication systems.

    Kaspersky Lab researchers have discovered a malware targeting ATMs, which was being openly sold on the DarkNet market. Cutlet Maker consists of three components and enables ATM jackpotting if the attacker is able to gain physical access to the machine. A toolset potentially allowing criminals to steal millions was on sale for just £3,788 and came equipped with a step-by-step user guide.

    ATMs continue to be lucrative targets for fraudsters, who use various methods to extract maximum profit. While some rely on physically destructive methods through the use of metal cutting tools, others choose malware infection, enabling them to manipulate cash dispensers from the inside. Although malicious tools for hacking ATMs have been known for many years, the latest discovery shows that malware creators are investing more and more resources into making their “products” available for criminals who are not very familiar with computer science.

    Earlier this year, a Kaspersky Lab partner provided one of our researchers with a previously unknown malicious sample presumably made to infect PCs running inside ATMs. Researchers were curious to see if this malware or something related to it was available to purchase on underground forums. A subsequent search for the unique artifacts of the malware was successful: an advertising offer describing a strain of ATM malware on a popular DarkNet spot – AlphaBay – matched the search query and revealed that the initial sample belonged to a whole commercial malware-kit created to jackpot ATMs. A public post by the malware seller, found by researchers, contained not only the description of the malware and instructions on how to get it, but also provided a detailed step-by-step guide on how to use the malware-kit in attacks, with instructions and video tutorials.

    According to the research, the malware toolkit consists of three elements:

    • Cutlet Maker software, which serves as the main module responsible for communicating with the ATM’s dispenser.
    • c0decalcprogram, designed to generate a password in order to run the Cutlet Maker application and protect it from unauthorised use.
    • Stimulator application, which saves time for criminals by identifying the current status of ATM cash cassettes. By installing this app, an intruder receives exact information on the currency, value and number of notes in each cassette, so can then choose the one containing the largest amount, instead of blindly withdrawing cash one by one.

    To begin the theft, criminals need to gain direct access to an ATM’s insides in order to access the USB port, which is used to upload the malware. If successful, they plug in a USB device which stores the software toolkit. As a first step criminals install Cutlet Maker. Since it is password protected they use a c0decalc program, installed on another device such as a laptop or tablet – this is a kind of “copyright” protection installed by authors of Cutlet Maker in order to prevent other criminals from using it for free. After the code is generated, criminals enter it into Cutler Maker’s interface to start the money removal process.

    Cutlet Maker had been on sale since 27 March 2017, however as researchers discovered, the earliest known sample came on the radars of the security community in June 2016. At that time it was submitted to a public multi-scanner service from Ukraine, but later submissions from other countries were also made. It is not clear if the malware was used in actual in the wild attacks, however the guidelines that came with the malware kit contained videos which were presented by their authors as real life proof of the malware’s efficiency.

    It is unknown who is behind this malware. Regarding potential sellers of the toolkit, language, grammar and stylistic mistakes point to the fact they are non-native English speakers.

    “Cutlet Maker requires almost no advanced knowledge or professional computer skills from the criminal, transforming ATM hacking from a sophisticated offensive cyber operation into yet another illegal way to earn money that is available to practically anyone who has several thousand dollars to purchase the malware. This may potentially become a dangerous threat to financial organisations. But what is more important is that while operating, Cutlet Maker interacts with the ATMs software and hardware, encountering almost no security obstacles at all. This should be changed in order to harden ATM machines,” says Konstantin Zykov, security researcher at Kaspersky Lab.

    In order to protect ATMs from attacks with the help of malicious tools like Cutlet Maker and in addition to providing reliable physical security to ATMs, Kaspersky Lab specialists advise financial organisations security teams to do the following:

    • Implement strict default-deny policies preventing any unauthorised software from running on the ATM.
    • Enable device control mechanisms to restrict the connection of any unauthorised devices to the ATM.
    • Use a tailored security solution to protect your ATMs from attacks from the likes of the Cutlet Maker malware.

    For better ATM protection Kaspersky Lab also recommends to use a proper security solution, such as Kaspersky Embedded Systems Security.

    Kaspersky Lab products successfully detect and block the Cutlet Maker malware.

    To read more about how Cutlet Maker works, read the recent blogpost on Securelist.com.

    This analysis continues Kaspersky lab’s ongoing research into financial malware targeting ATMs. You can learn more about the evolution of ATM attacks in Kaspersky Lab’s report on Future attack scenarios against ATM authentication systems.

    More from Technology

    Explore more articles in the Technology category

    Image for The Data Intelligence Gap: Why Precision Is Becoming Critical in Enterprise Sales
    The Data Intelligence Gap: Why Precision Is Becoming Critical in Enterprise Sales
    Image for How Data Observability Is Evolving in Financial Services
    How Data Observability Is Evolving in Financial Services
    Image for When Is a Dedicated Server the Right Choice for Your Business?
    When Is a Dedicated Server the Right Choice for Your Business?
    Image for Enter Now for Best IT/Technology Recruitment Agency 2026
    Enter Now for Best IT/Technology Recruitment Agency 2026
    Image for The Rise of Intelligent Automation: How Technology Is Redefining Work and Efficiency
    The Rise of Intelligent Automation: How Technology Is Redefining Work and Efficiency
    Image for How Automation Technologies Are Transforming Everyday Business Operations
    How Automation Technologies Are Transforming Everyday Business Operations
    Image for Asprofin Bank Announces Financing Initiative for Modular ‘Nanocenter’ Data Infrastructure
    Asprofin Bank Announces Financing Initiative for Modular ‘Nanocenter’ Data Infrastructure
    Image for Basel IV vs. The AI Bots: Why the Banking Rulebook Must Evolve in the Age of Algorithmic Herding
    Basel Iv Vs. The AI Bots: Why the Banking Rulebook Must Evolve in the Age of Algorithmic Herding
    Image for NordQuant Deploys Distributed Systems to Enhance Enterprise Digital Capabilities Introduction
    NordQuant Deploys Distributed Systems to Enhance Enterprise Digital Capabilities Introduction
    Image for Calling Entries for Data Center Deal of the Year 2026
    Calling Entries for Data Center Deal of the Year 2026
    Image for Nominations Now Open for Best Website Design Company 2026
    Nominations Now Open for Best Website Design Company 2026
    Image for Call for Entries: Best Digital Innovation Company (Non-Financial / Cross-Industry) 2026
    Call for Entries: Best Digital Innovation Company (Non-Financial / Cross-Industry) 2026
    View All Technology Posts
    Previous Technology PostThe Seven Wonders of Automatic Digital Recording and Session Replay
    Next Technology PostSas Enables EU Gdpr Compliance for Global Companies