Hackers broke into a network of Citibank ATMs inside 7-Eleven stores and stole customers’ PIN codes, making off with at least $2 million, The Associated Press reported, citing recent court filings.

The court documents reveal a disturbing security hole in the most sensitive part of a banking record – the PIN numbers, The Associated Press reported.

The scam, which took place from October 2007 to March 2008, netted the alleged identity thieves at least $2 million. More importantly for consumers, however, the scam shows criminals were able to access PINs — the numeric passwords that theoretically are among the most closely guarded elements of banking transactions — by attacking the back-end computers responsible for approving the cash withdrawals, the news service reported.

The case against three people in U.S. District Court for the Southern District of New York highlights a significant problem.

Hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet. And despite industry standards that call for protecting PINs with strong encryption — which means encoding them to cloak them to outsiders — some ATM operators apparently aren’t properly doing that. The PINs seem to be leaking while in transit between the automated teller machines and the computers that process the transactions.

"PINs were supposed be sacrosanct — what this shows is that PINs aren’t always encrypted like they’re supposed to be," said Avivah Litan, a security analyst with the Gartner research firm. "The banks need much better fraud detection systems and much better authentication."

It’s unclear how many Citibank customers were affected by the breach, which extended at least from October 2007 to March 2008. The bank has nearly 5,700 Citibank-branded ATMs inside 7-Eleven stores throughout the U.S., but it doesn’t own or operate any of them.

That responsibility falls on two companies: Houston-based Cardtronics, which owns all the machines but only operates some, and Brookfield, Wis.-based Fiserv, which operates the others.

A critical issue in the investigation is how the hackers infiltrated the system, a question that still hasn’t been answered publicly, The Associated Press report said. All that’s known is the hackers broke into the ATM network through a server at a third-party processor, which means they probably didn’t have to touch the ATMs at all to pull off the heist.

They could have gained administrative access to the machines — which means they had carte blanche to grab information — through a flaw in the network or by figuring out those computers’ passwords. Or it’s possible they installed a piece of malicious software on a banking server to capture unencrypted PINs as they passed through.

What that means for consumers is that their PINs were stolen from machines that showed no signs of tampering they could detect. In previous PIN thefts, thieves generally took steps that might draw notice — sending "phishing" e-mails, for example, or installing false-front keypads or even tiny cameras on ATMs.

Getting the PINs is a key step for identity thieves. It lets criminals encode stolen account information onto blank ATM cards and withdraw piles of cash from compromised accounts.Don Jackson, director of threat intelligence for SecureWorks, said he has seen an "alarming" spike in the number of attacks on back-end computers for ATM networks over the past year.

"This was fairly large, but I don’t think it’s anything out of the ordinary — these kinds of scams go on every day," Jackson told The Associated Press. "What makes this case unique is the sheer luck of happening upon these guys and catching them red-handed. But there are a whole lot of other ATM and PIN compromises going on that aren’t reported."

The alleged plot is outlined in court papers supporting the prosecution of three people — Yuriy Rakushchynets, Ivan Biltse and Angelina Kitaeva. They were indicted in March on two counts each of conspiracy and fraud. Prosecutors say their activities generated at least $2 million in illegal profits.

Defense lawyers for all three people did not return calls for comment, and it was not clear where they had been living. The main defendant, Rakushchynets, was described as having Michigan and Florida driver licenses in a February FBI affidavit for an arrest warrant.

Citibank, part of Citigroup, has declined to comment on the technique or how many customers’ accounts were compromised. It said it notified affected customers and issued them new debit cards.

"We want our customers to know that, consistent with legal requirements, we do not hold them responsible for fraudulent activity in their accounts," the bank said in a statement. Cardtronics said it is cooperating with authorities but otherwise declined to comment. Fiserv spokeswoman Melanie Tolley said the intrusion didn’t happen on Fiserv’s servers.

"Fiserv," she said, "is confident in the integrity and security of our system."

In a press release responding to news of the hacked ATMs, Cardtronics said it is “not involved in this criminal prosecution and therefore does not anticipate that it will issue any statements with respect to this case or the alleged conduct of the defendants in this case.”

However, the company added: “All ATMs owned or operated by Cardtronics have encrypted PIN pads, as well as triple data encryption (3DES) as required by the various electronic fund transfer networks. Additionally, Cardtronics’ processing platform complies with the PIN Security Requirements established by the Payment Card Industry (PCI) and has successfully completed a PCI PIN security field review performed by one of the major networks.”

Industry News