Incident Response.

Direct Memory Access (DMA) Attack

Thursday February 12th, 2026

We have received multiple reports of an increase in a new jackpotting attack targeting ATMs across the UnitedStates called Direct Memory Access (DMA).  All ATM manufacturers are susceptible to this type of attack which bypasses traditional security controls.  The methodology is very similar to Hard Drive Attacks but targets the systems memory instead of the hard drive.

We recommend the following actions are taken immediately:
Verify top hat of ATM is alarmed and create a response plan for active alarms to include historical footage review.
Confirm BIOS and firmware are up to date with the latest security releases.
Verify HDE encryption is enabled on all ATMs.
Inspect for tampering daily.
Increase monitoring through Command Center or other remote management tools.
Report any suspicious activity to the NOC immediately.
These attacks are highly coordinated and often occur after hours. Quickreporting and verification of system integrity are critical in preventinglosses.

For a deeper look at current jackpotting trends and prevention strategies, download our Comprehensive Jackpotting Prevention Guide Developed in collaboration with the U.S.Secret Service, this whitepaper outlines the latest attack methods, detection techniques, and the 12 layers of defense Cook Solutions Group recommends to safeguard your ATMs. It’s an essential resource for fraud and security teams working to stay ahead of coordinated threats.