Jackpot with a Side of Malware: Inside the Ploutus ATM Heist Ring
A sweeping federal indictment exposes a high-tech criminal network that emptied ATMs across the U.S. using advanced malware.
It began with a click, a whir, and the quiet hum of an ATM dispensing cash - on command, and on cue. But this was no ordinary withdrawal. Across the United States, dozens of ATMs have been forced to spit out millions of dollars in an orchestrated spree that reads less like a bank robbery, and more like a cyber-thriller. This week, the Department of Justice unmasked the latest chapter in the saga, charging 31 alleged conspirators with orchestrating a nationwide “jackpotting” rampage powered by Ploutus malware - a tool that has haunted banks for over a decade.
Fast Facts
- 31 individuals indicted for ATM jackpotting using Ploutus malware.
- Over $5.4 million stolen from at least 63 ATMs between 2024 and 2025.
- Targets were primarily credit union ATMs across the country.
- The operation involved members of the Venezuelan gang Tren de Aragua.
- Ploutus malware was first detected in Mexico in 2013 and has evolved since.
The Anatomy of a Jackpotting Conspiracy
The grand jury indictment, unsealed Monday, details a complex plot that married street-level surveillance with digital subterfuge. Gang members, allegedly including illegal immigrants tied to the notorious Venezuelan syndicate Tren de Aragua, would first scout out vulnerable ATMs - often those belonging to smaller credit unions with less robust physical security. They’d test the waters by discreetly opening the ATM doors to see if alarms triggered a law enforcement response. If the coast was clear, the real action began.
Armed with thumb drives or replacement hard drives loaded with Ploutus, the crew would physically connect to the ATM’s internals. Once deployed, the malware would override the machine’s security, allowing the criminals to command the ATM to rapidly eject cash - sometimes tens of thousands of dollars at a time. In effect, the machines were transformed into unwitting accomplices in a digital-age heist.
Ploutus is no ordinary malware. First surfacing in Mexico in 2013, it has since evolved into what Google researchers called “one of the most advanced ATM malware families.” Its versatility means it can infect a variety of ATM brands, including industry giants like Diebold Nixdorf. Law enforcement and cybersecurity agencies have battled variants of Ploutus for nearly a decade, but the latest indictments highlight just how persistent and adaptable these criminal networks remain.
This latest bust comes on the heels of charges against 56 others last month, suggesting a vast, interconnected operation. The accused face a slew of charges, including bank fraud, burglary, and computer fraud. With millions stolen and dozens implicated, the case is a stark reminder of the evolving threat landscape facing financial institutions.
Reflections on a Digital Crime Wave
As banks and credit unions race to harden their defenses, criminals continue to innovate, exploiting the intersection of physical access and digital vulnerability. The Ploutus saga isn’t just about lost cash; it’s a wake-up call for the industry, law enforcement, and the public alike. In the world of cybercrime, yesterday’s heist is tomorrow’s blueprint - and the next jackpot may be just a malware update away.
WIKICROOK
- ATM Jackpotting: ATM jackpotting is a cyberattack where criminals force ATMs to dispense cash illegally by exploiting software or hardware vulnerabilities.
- Ploutus: Ploutus is advanced ATM malware that enables attackers to dispense cash and erase evidence, posing a major threat to financial institutions.
- Hard Drive Swap: A hard drive swap involves physically replacing a device’s storage unit to install, run, or hide unauthorized code, often bypassing security controls.
- Tren de Aragua: Tren de Aragua is a Venezuelan crime group known for cyberattacks, extortion, and trafficking, posing a significant international cybersecurity risk.
- Grand Jury Indictment: A grand jury indictment is a formal charge issued after evidence review, allowing prosecution of alleged cybercrimes such as hacking or data breaches.