01 logo

The Shadow of the Black Rose

Millions Stolen in 90 Seconds Flat

By Syeed ZeeshanPublished 8 months ago 3 min read

Moscow, Russia – 3:14 AM

The streets were empty, the kind of stillness that only exists in the dead of night. A lone figure in a dark hoodie approached an ATM outside a quiet bank, glancing over his shoulder before inserting a card. But this was no ordinary withdrawal.

The machine beeped once—then began spitting out stacks of cash, faster than human hands could grab them. Within 90 seconds, it had dispensed $40,000. The man stuffed the bills into a duffel bag and vanished into the shadows.

By sunrise, 147 ATMs across 26 cities had been drained the same way. No alarms. No forced entry. Just $13 million—gone.

This was the work of The Black Rose, a cybercrime syndicate that had perfected the art of ATM jackpotting. And this was only the beginning.

Chapter 1: The Hacker’s Gambit

Bucharest, Romania – 6 Months Earlier

Dmitri Kovalchuk, a 28-year-old hacker with a reputation in underground forums, sat in a dimly lit apartment, staring at lines of code. He wasn’t after credit cards or bank logins—he wanted total control.

His breakthrough came in the form of Cutlet Maker, a custom malware that could hijack ATMs remotely. Unlike skimmers or card clones, this attack didn’t need physical tampering. It exploited a fatal flaw in bank networks: unsecured ATM management servers.

Dmitri knew he needed a team. He reached out to Viktor, a former cybercriminal turned middleman, who connected him with Sergei, a Moscow-based enforcer with ties to organized crime.

"We hit the ATMs fast, all at once. No second chances," Sergei said, lighting a cigarette. "You handle the tech. I’ll handle the cash collectors."

The plan was set.

Chapter 2: The Breach

New York City – 2 Weeks Before the Heist

A bank employee in Queens clicked on a seemingly innocent email—"Urgent: Salary Revision Notice." The attachment installed a backdoor, giving Dmitri access to the bank’s internal network.

From there, he moved laterally, escalating privileges until he found the ATM command servers. These systems controlled thousands of cash machines worldwide. With a few keystrokes, he uploaded Cutlet Maker, programming it to lie dormant until the right moment.

"We’re in," Dmitri messaged Viktor.

Over the next week, they repeated the process—phishing employees, breaching banks, infecting ATMs. By the time they were done, they had backdoors in 12 financial institutions across the U.S., Europe, and Asia.

Chapter 3: The Night of the Black Rose

Global – Simultaneous Attacks

At exactly 3:00 AM GMT, the malware activated.

In Tokyo, a man in sunglasses triggered an ATM to dispense ¥5 million yen before slipping into the crowd.

In Berlin, a woman with a rolling suitcase filled it with €500 bills in under two minutes.

In Miami, a team of three hit 15 ATMs in 30 minutes, stuffing cash into backpacks before speeding off in a rented van.

The withdrawals were too fast, too coordinated. Bank fraud alerts lit up, but by the time security teams reacted, the money was already in the wind.

$13 million in under six hours.

Chapter 4: The Unraveling

Interpol HQ – Lyon, France

The heist made headlines, but the real hunt was just beginning. Europol’s Cybercrime Unit and the FBI’s Cyber Division traced the malware’s signature to Dmitri’s earlier work on dark web forums.

Meanwhile, greed fractured The Black Rose. Some mules got sloppy—one was caught on CCTV in Prague, another bragged in a bar in Kyiv.

A single mistake led investigators to Viktor, who flipped under pressure, giving up Dmitri’s location.

Chapter 5: The Fall

Sofia, Bulgaria – Safe House Raid

Dmitri was coding when the door exploded inward. Armed police swarmed the apartment.

"Hands up! You’re done."

He didn’t resist.

Sergei was caught weeks later in Moldova, trying to flee with a suitcase full of cash.

By 2018, over 30 members of the syndicate were arrested. Dmitri received 12 years in a high-security prison.

Epilogue: The Legacy of the Black Rose

The attack forced banks to overhaul ATM security—better encryption, real-time transaction monitoring, and mandatory employee training.

But the threat never truly died.

Some say a copy of Cutlet Maker still circulates in the darkest corners of the web.

And somewhere, another Dmitri is writing code.

Waiting for the next silent heist.

The End.

Author’s Note:

This story is inspired by real ATM jackpotting attacks, including the 2013 global heist involving malware like Ploutus and Cutlet Maker. While names and some details are fictionalized, the techniques and scale of the theft are based on actual cybercrime cases.

cybersecurityhackerssocial media

About the Creator

Syeed Zeeshan

Software engineer with a passion for coding, digital marketing, and crypto (Binance). Tech-savvy, football lover, and always exploring new trends in tech, finance, and innovation.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.