It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
Sixty million euro has been stolen from bank accounts in a massive cyber bank raid after fraudsters raided dozens of financial institutions around the world....
"If all of the attempted fraud campaigns were as successful as the Netherlands example we describe in this report, the total attempted fraud could be as high as 2bn (£1.6bn)."
"They have identified 60 different servers, many of them in Russia, and they have identified one alone that has been used to steal 60m euro," Kiley said. "There are dozens of servers still grinding away at this fraud – in effect stealing money."
It mentions so-called "mule accounts" so I assume there was shifting among multiple accounts.
Originally posted by LightSpeedDriver
reply to post by kosmicjack
"They have identified 60 different servers, many of them in Russia, and they have identified one alone that has been used to steal 60m euro," Kiley said. "There are dozens of servers still grinding away at this fraud – in effect stealing money."
What a professional attitude the linked article reports. Leaving compromised servers running? Really??? Like you, I suspect this may not be a hacking attempt. I read only today or yesterday that the chief guy from RBS (or another of the affected banks) said they hoped to have the problem fixed "soon". No mention of a hack.
ETA And even if the servers in the part above are not under their control, it is trivial to block access.edit on 26/6/12 by LightSpeedDriver because: ETA
"It can get around some of the mechanisms that alert the banking system to abnormal activity."
Sky News defence and security editor Sam Kiley said: "It does include British financial institutions and has jumped over to North America and South America.
Originally posted by silent thunder
reply to post by kosmicjack
This I don't know. I wonder if the program covers its tracks somehow or erases the information about where the money was headed. It mentions so-called "mule accounts" so I assume there was shifting among multiple accounts.
Anyone out there with experitise in electronic security for banks?
Originally posted by Laokin
You would have to be one of the big fish in the banking cartel already to accomplish something of this magnitude, in which case would give him a hell of a lot of power to conceal...
June 27, 2012
Operation High Roller, as it is now known, is a sophisticated attack on the customer accounts of 60+ banks, via internet banking, that has netted the bad guys between £46 million and £1.6 billon, depending on which article you read.
As you might have read yesterday, Operation High Roller relies on malware on a victim's PC that alters the way an internet banking site of a bank looks and reacts. The malware obtains legitimate logon and validation details from a user by tricking the user into thinking that they are responding to the banks website.
Once in possession of the details, the attacker is then able to use those details to transfer money out of the victim's bank account all while displaying an error, or 'please wait' screen to the user. Furthermore, to cover the bad guys' tracks, the malware will also remove evidence of the fraudulent transfers from the internet banking transaction list and block access to downloadable statements so it can't be traced or recovered.