Cyber criminals targeted US cash machines with tools that force them to spit out cash in hacking schemes known as “jackpotting.”
The two ATM makers Diebold Nixdorf Inc. and NCR Corp. did not identify any victims or say how much money had been lost.
Jackpotting has been rising worldwide in recent years, though it is unclear how much cash has been stolen because victims and police often do not disclose details.
Hackers who use this method drag the ATM to a trap in order to steal the money it stocks.
The attacks were reported earlier on Saturday by the security news website Krebs on Security, which said they had begun last year in Mexico. The companies confirmed to Reuters on Saturday they had sent out the alerts to clients.
NCR said in a Friday alert that the cases were the first confirmed “jackpotting” losses in the United States.
It said its equipment had not been targeted in the recent attacks, but that it was still a concern for the entire ATM industry.
The alert said: “This should be treated by all ATM deployers as a call to action to take appropriate steps to protect their ATMs against these forms of attack,”
Diebold Nixdorf said in a separate Friday alert that US authorities had warned the company that hackers were targeting one of its ATM models, known as Opteva, which went out of production several years ago.
Krebs on Security reported that a confidential US Secret Service alert sent to banks said the hackers targeted stand-alone ATMs typically located in pharmacies, big box retailers and drive-thru ATMs.
Reuters was unable to obtain a copy of the Secret Service report and an agency representative declined comment. Officials with the Federal Bureau of Investigation could not immediately be reached.
Russian cyber security firm Group IB has reported that cyber criminals remotely attacked cash machines in more than a dozen countries across Europe in 2016. Similar attacks were also reported that year in Thailand and Taiwan.