Remote ATM Control: Kaspersky Lab Details $1BILLION Online Bank Heist

1bn online bank heist

Remote ATM control: Kaspersky Lab details $1bn online bank heist (EXCLUSIVE) (RT, Feb 16, 2015):

Internet security company Kaspersky Lab says the banking industry could be experiencing “a new era in cybercrime.” The company has been investigating a $1 billion attack on financial institutions by a sophisticated hacking group.

The IT security firm says the hackers from the Carabanak group used a complex virus system which was later named after them. It is not like the simple Trojan horse malware used to by-pass security systems, but something much more complex and unique, according to documents exclusively seen by RT.

Russian cyber-security company Kaspersky Lab was invited to look into the matter, after an ATM in the Ukrainian capital Kiev started giving out cash randomly without anyone inserting a card or touching any buttons in late 2013.

The attackers did not look to exploit weaknesses in the company’s software. Instead, they took screenshots of computers at 20-second intervals and were able to learn the victims’ internal procedures. They were then able to copy these and impersonate the victim in order to process fraudulent transactions.

Anton Shingarev, Chief of Staff at Kaspersky Lab, said the complex nature of the malware used was unprecedented and it was “the most highly sophisticated criminal attack we have ever seen.”

He added that the cyber-criminals used methods that were used by governments in the past, while each attack took approximately two months and around 10 criminals were working on a daily basis on it.

Kaspersky Lab said that most of the victims were located in Russia, the US, Germany, China and Ukraine. The hacking group targeted 30 banks. One customer lost in the region of $7.3 million because of ATM fraud, while another had $10 million stolen due to hackers entering the person’s online banking page.

The money would then be sent to accounts set up mainly in the US and China.

“They managed to get access to the whole banking system. They managed to remotely control ATM’s and they managed to transfer money from one account to another. Due to the extreme level of complexity, banks did not realize they were coming under attack,” Shingarev told RT.

Worryingly, the criminals were able to bypass advanced control and fraud detection systems, which the financial industry has been reliant on for years for internet security. The hackers went down another route to avoid these security systems by using industry-wide funds transfers (the SWIFT network), which would allow them to update the balances of those holding an account in the bank.

For example, the hackers could alter the data for an account that held $1,000 and add extra funds to make the balance $10,000. The criminals would then withdraw $9,000 bringing the balance back to $1,000. As the customer lost no money, he or she would be none the wiser and not raise any alarm.

The attackers were also not too greedy deliberately limiting the amount stolen from each victim to $10 million. This was to ensure that red flags were not raised and law enforcement agencies did not carry out a thorough investigation.

kaspersky

Geographical distribution of targets according to C2 data (image by Kaspersky Lab)

Kaspersky Lab says that little is known about the criminals, as they have now been detected and the IT security firm cannot reveal any details on them. They did mention that the criminals had been working for around two years and they did leave traces which Kaspersky Lab is now studying.

“It’s like an arms race. Security companies develop better protection and criminals develop better malware to bypass it,” Shingarev added.

The Carbanak malware used by the cyber-criminals proved to be very successful in helping the attackers steal around $1 billion. Kaspersky Lab is worried about the increasing sophistication of attacks.

“Despite increased awareness of cybercrime within the financial services sector, it appears that spear phishing attacks and the old exploits (for which patches have been disseminated) remain effective against larger companies. Attackers always use this minimal effort approach in order to bypass a victim ?s defenses,” a press release from the company stated.

3 thoughts on “Remote ATM Control: Kaspersky Lab Details $1BILLION Online Bank Heist”

  1. Why is this story making headlines now? So that they can get the excuse to censor the web. I am not surprised at the story, the timing, or any of it. They want to destroy the alternative news outlets…….believe me.
    Stealing from the banks……it is a drop in the bucket for those crooks…….and this story is being used to fool the people again.
    Once upon a time when a person put his money in the bank, and it was there any time he wanted it, that was different. But, they keep no money on deposit.
    Does anyone else remember the story three years ago? When the head of the IMF wanted banks to hold five cents on deposit for every dollar of asset they claimed?
    The banks would have had to borrow the five cents.
    The idea was tabled, and never brought up again.
    What a sham.

    Reply
  2. Does calling this 7.0 quake just to hit the Japan coast an “aftershock” make sense to you? Comparing it to the 3/11 quake, they are now calling it an aftershock. What rubbish is this? They are evacuating towns, awaiting a Tsunami and calling it an aftershock….

    http://enenews.com/quake-magnitude-7-hits-northeast-japan-strongest-hit-country-2013-felt-along-entire-pacific-coastline-1000-km-followed-multiple-aftershocks-one-centered-japan-trench-official-event-related

    Reply

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.