berichten Sicherheitsforscher von FireEye<\/a>. Aktuell laufe die Malware auf Geldautomaten der US-amerikanischen Hersteller Diebold und NCR.<\/p>\nhttp:\/\/www.heise.de\/newsticker\/meldung\/Trojaner-im-Geldautomaten-Ihre-Karte-wurde-eingezogen-2812494.html<\/p>\n
Bild Martin Knudsen, CC BY-SA 2.0<\/p>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Die neue Malware-Generation f\u00fcr Bankautomaten Suceful liest nicht nur Daten von EC- und Kreditkarten aus, sondern zieht Karten auch ein. Ein mit dem Trojaner Backdoor.ATM.Suceful infizierter Geldautomat kann Karten einziehen und h\u00e4ndigt die Beute auf Kommando an die Ganoven aus, berichten Sicherheitsforscher von FireEye. Aktuell laufe die Malware auf Geldautomaten der US-amerikanischen Hersteller Diebold und […]<\/p>\n","protected":false},"author":3,"featured_media":2390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_wpscp_schedule_draft_date":"","_wpscp_schedule_republish_date":"","_wpscppro_advance_schedule":false,"_wpscppro_advance_schedule_date":"","_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_selected_social_profile":[]},"categories":[61],"tags":[],"class_list":["post-2389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-sicherheit"],"jetpack_featured_media_url":"https:\/\/digisociety.ngo\/wp-content\/uploads\/sites\/23\/2015\/09\/Bild-Martin-Knudsen-CC-BY-SA-2.0.jpg","_links":{"self":[{"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/posts\/2389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/comments?post=2389"}],"version-history":[{"count":0,"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/posts\/2389\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/media\/2390"}],"wp:attachment":[{"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/media?parent=2389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/categories?post=2389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digisociety.ngo\/wp-json\/wp\/v2\/tags?post=2389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}