top of page

Best Practices to Protect Your ATMs from Jackpotting

Updated: May 18

by Tony Mercer, Director of Operations

We’ve recently been notified of Man-In-The-Middle attacks that have resulted in attackers jackpotting ATMs. The most recent attacks are connected to unsecure Remote Monitoring Systems (RMS). Still under investigation, these attacks occurred in Pennsylvania and it is believed the attackers are still active, and additional attacks are possible.

How to Protect Your ATMs from These Attacks

If you operate your own RMS program, we recommend you perform the following changes immediately:

  1. Change All RMS & Remote Passwords and double check that passwords are not set to default values.

  2. Do Not Allow Remote Access to Your RMS Server. If limiting access is not possible, use dual-authentication and make sure each user has their own login. 

  3. Never Share Passwords between accounts including RMS servers, RMS services, and remote access clients. 

  4. Enable TLS & Verification Features on your ATMs - for both RMS and Host authentication. 

  5. Remove Any Unnecessary Accounts. Review all user accounts that have access to RMS servers and remote access clients. 

  6. Configure Passwords to Not be Easily Guessable. We recommend passwords that are 15 characters or greater. 

If you're running your own RMS system and have questions, contact the ATM USA Technical Support team to discuss how you can mitigate your risks.


ATM USA Technical Support


Recent Posts

See All


bottom of page