SMARTFENCE

Image

Logical and black-box attacks are a global ATM industry-wide threats. Irrespective of the modus operandum used by the criminal, all ATM brands and models are potentially at risk.
Multiple modus operandi have already been used by criminals in many countries and with success, and, although there are already various protection solutions available in the market today they all tend to be very expensive to implement and most important they do not protect against all these types of attacks. Taking away the possibility to operate cash handler module in an unauthorized manner is the most effective prevention criminals withdrawing cash from the ATM without accessing the ATM’s safe. SmartFence is a revolutionary technology with an innovative approach to the problem.

SmartFence takes prompt action by shutting down the cash handler module when unauthorized and suspicious operational behavior is detected based on our patented solution.

SMARTFENCE INTEGRATION
SmartFence can work autonomously or it can seamlessly be integrated with Smartstain technology, whether the ATM already has a Smartstain system or when installed into the ATM at late stage.

Image

EASY TO IMPLEMENT
SmartFence can easily be implemented in the majority of ATM models available in themarket.

ANTI-SABOTAGE
SmartFence is installed inside the safe nearby the cash handler module. SmartFence is completely autonomous, not requiring any external connections and is immune to ATM violations.

CONNECTIVITY WITH ON-SMART
SmartFence can be easily connected with ON-Smart, allowing full on-line monitoring and notifications via 4G/3G GPRS communications.

EFFECTIVE IN ALL ATTACK TECHNIQUES
Whether it’s a software, online or off-line, network or external hardware intrusion attack, SmartFence will effectively detect suspicious activity of the ATM cash handler module preventing unauthorized cash handling.

SMARTFENCE PROTECTS THE ATM AGAINST


MALWARE IN THE NETWORK (ONLINE)
Criminals are able to inject malicious software such as malware onto the ATM PC via the network. The malware can intercept the communications between the ATM and host and with this, capture information or cause unauthorized dispensing of cash from the machine.
 

MALWARE INSTALLED ON THE ATM (OFFLINE)
Malware inserted by removable media (for example, DVD, CD or USB) or via connecting a notebook PC or other electronic devices (as described above), into the ATM PC and then rebooting the machine.
The ATM will then boot to the removable media or start executing the injected software to copy the malware onto the ATM hard disk. The ATM is rebooted again allowing the ATM to start up as normal. However, now the ATM is infected with malware which runs on its hard disk and can be activated to get the CHM to dispense cash on request of the criminal.
The difference between Logical attacks compared to Physical attacks is that logical attacks can be far more precise as criminals are certain of the outcome of the attack whereas physical attacks can be less successful as hardware and materials react differently every time to explosives and physical abuse.

BLACK BOX ATTACKS
Criminals gain access to the communications of the machine’s Cash Handling Module (CHM) inside the terminal. By doing this, they are able to bypass the ATM PC and connect an intelligent electronic device directly to the CHM. Criminals are then able to send unauthorized commands to dispense cash from this machine.
We see different forms of gaining access to the CHM either by drilling holes in the ATM fascia or having access to the upper ATM compartment where the PC is housed or even the ATM safe is breached. They can then connect a notebook PC or other electronic devices to communicate directly with the CHM.


ASSOCIATIONS


Image Image Image Image Image

CERTIFICATIONS AND COMPLIANCE


Image Image Image Image Image Image