Skip Navigation

Stop Jackpotting Now

What is Jackpotting

To execute the cyberattack known as “Jackpotting”, a thief (typically disguised as an ATM Technician) needs physical access to an ATM’s computer which is located in the top portion of the ATM (A.K.A Top Hat).  The criminal will load malware onto the computer that allows  him or her to take control of the machine and force it to dispense cash while they are onsite or at a future point in time when their partner is at the ATM pretending to make a withdraw.

3 Solutions From WBS

           1. Alarm The Top Hat                                                            

WBS will alarm the top hat with a door contact sensor and providing an onboard keypad for authorized user disarmament.

           2. High Security Keys

ATM manufacturers’ keys can open multiple like-model ATM top hats and can be readily purchased from third party suppliers.

WBS will replace the universal key to the top hat with a custom, high security key

           3. Video Analytics 

WBS will help you utilize video analytics to trigger custom alerts that will make it easier for security to proactively monitor what is happening

This entry was posted on Tuesday, February 20th, 2018 at 4:13 pm. Both comments and pings are currently closed.

Comments are closed.