{"id":26261,"date":"2019-04-01T04:07:09","date_gmt":"2019-04-01T08:07:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=26261"},"modified":"2020-04-13T15:52:27","modified_gmt":"2020-04-13T19:52:27","slug":"beehiveoristic-engine","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/beehiveoristic-engine\/26261\/","title":{"rendered":"Bee-Hive-oristic engine for ATM protection"},"content":{"rendered":"<p>What does it usually take to implement new protective technologies? It takes understanding of the threat model, a reliable solution, and approval from the budget holders. To get this approval you usually need to explain how an innovation will affect your business: its benefits, basically, preferably in terms of monetary value. That is why we are announcing a new security solution for ATM protection that has monetary benefits everyone can clearly see.<\/p>\n<h2>The problem<\/h2>\n<p>How do cybercriminals usually liberate money from an ATM? <a target=\"_blank\" href=\"https:\/\/securelist.com\/atm-malware-is-being-sold-on-darknet-market\/81871\/\" rel=\"noopener noreferrer\">Cutlet Maker<\/a> and <a target=\"_blank\" href=\"https:\/\/securelist.com\/atm-robber-winpot\/89611\/\" rel=\"noopener noreferrer\">WinPot<\/a> attacks require the attacker to open the ATM door and connect a laptop to the ATM\u2019s USB port. We have seen <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/sas-2017-atm-malware\/14509\/\" rel=\"noopener noreferrer nofollow\">cases<\/a> of malefactors literally drilling into an ATM to connect their equipment to some technological bus connector, or <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/atm-attack-3\/15161\/\" rel=\"noopener noreferrer nofollow\">plug in some hacking equipment<\/a>. Finally, criminals <a target=\"_blank\" href=\"https:\/\/www.independent.ie\/incoming\/detectives-on-the-hunt-for-atm-thieves-after-machine-stolen-in-early-hours-of-this-morning-37946067.html\" rel=\"noopener noreferrer nofollow\">can actually steal the ATM <\/a>and try to break into its cash cassettes somewhere safe.<\/p>\n<p>The common part of those methods is that they require physical access to the internals of the machine. That is why we decided to add an additional layer to existing security solutions: a physical layer.<\/p>\n<h2>The solution<\/h2>\n<p>How can we protect an ATM on a physical level? Maybe we can make it stronger. However, that would only slow the criminals down, and, perhaps, scare away some newbies. No, hardening the shell is not a good solution. It is better to add something that will actually drive criminals away from the ATM. Something cybercriminals do not expect to see inside an ATM. That is why we invented the Bee-Hive-oristic engine.<\/p>\n<p>The Bee-Hive-oristic engine is based on time-proven apiculture technology. Have you ever seen someone try to rob a beehive? Usually you can see them running away \u2014 quite fast. With the Bee-Hive-oristic engine, we combine an ATM\u2019s internals with the honeycomb, all in one box. To get to any ATM\u2019s connectors or cash, malefactors will first need to remove honeycombs, and bees are not going to like it.<\/p>\n<h2>The benefits<\/h2>\n<p>Of course it is not that simple. To effectively use Bee-Hive-oristic technology, you need qualified personnel for maintenance operations and cash-in-transit services. That is why together with launching \u00a0solutions based on this technology, we will also start online courses for security beekeepers \u2014 probably on <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky ASAP platform<\/a>. It\u2019s true educating employees costs money, but in return you will get benefits such as honey, propolis, and beeswax.<\/p>\n<p>You can sell the honey as-is or pack it into branded cans and use as an additional value for your customers. Propolis is a valuable component of many traditional medicine recipes. As for beeswax, you can make candles with it, and use them for lighting of your office, thus saving money on electrical bills.<\/p>\n<p>Also think about the reputational gains of having hives inside your ATMs. Nature-friendly technologies are at high value now.<\/p>\n<p>Combined with <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/embedded-systems?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Embedded Systems Security<\/a> this technology will keep your ATMs safe on physical and informational levels.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.<\/p>\n","protected":false},"author":700,"featured_media":26259,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1975,401,519,1977],"class_list":{"0":"post-26261","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-april-1","10":"tag-atm","11":"tag-banking","12":"tag-fake"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/beehiveoristic-engine\/26261\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/beehiveoristic-engine\/15540\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/beehiveoristic-engine\/13085\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/beehiveoristic-engine\/17463\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/beehiveoristic-engine\/15612\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/beehiveoristic-engine\/17108\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/beehiveoristic-engine\/22539\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/beehiveoristic-engine\/11581\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/beehiveoristic-engine\/18194\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/beehiveoristic-engine\/22393\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/beehiveoristic-engine\/22329\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/fake\/","name":"fake"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/26261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=26261"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/26261\/revisions"}],"predecessor-version":[{"id":34895,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/26261\/revisions\/34895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/26259"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=26261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=26261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=26261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}