Hackers Stole Hundreds of Millions in Massive Malware Bank Heist

Illustration for article titled Hackers Stole Hundreds of Millions in Massive Malware Bank Heist

In what may be one of the biggest bank heists to date, hackers have apparently siphoned hundreds of millions of dollars from over 100 banks in 30 nations. And according to the upcoming Kaspersky Lab report, this could be "the most sophisticated attack the world has seen to date."

Advertisement

The analysis from Kaspersky Lab, which comes out Monday and was acquired by The New York Times, comes after the cybersecurity firm was called in to investigate a rogue, cash-spewing ATM in Ukraine a little over a year ago. But according to The Times, the ATM was just the beginning:

The bank's internal computers, used by employees who process daily transfers and conduct bookkeeping, had been penetrated by malware that allowed cybercriminals to record their every move. The malicious software lurked for months, sending back video feeds and images that told a criminal group — including Russians, Chinese and Europeans — how the bank conducted its daily routines, according to the investigators.

Advertisement

Once they had the necessary info, the hackers were able to impersonate bank officers, leaving them free to transfer money from banks in the US, Russia, Japan, and Switzerland (among others) to various international dummy accounts. According to the report, the sheer size of this attack could make it "one of the largest bank thefts ever." And while the cybercriminals siphoned at least $300 million globally, Kaspersky Lab believes the total could be nearly three times that.

So far, none of the banks have actually been named, but the majority of them are apparently located in Russia, with Japan and the US also taking quite a bit of the brunt. What's more, since the hackers only swiped $10 million at a time, the attacks likely didn't raise any eyebrows while they were being carried out. Though the banks involved have been made aware, they have yet to inform any customers. Which, while troubling in its own right, is made worse by the fact that the hack is apparently still ongoing.

And according to the Kaspersky report, it all started the same way practically every other major hack starts: email. You can read more about the hack over at The New York Times here, and in the meantime, for god's sake—stop clicking sketchy emails. [The New York Times]

Image via Getty

Advertisement

Share This Story

Get our newsletter

DISCUSSION

Ncogneegro
NcogNeegro

I work in IT, and the sheer number of people that open attachments to emails that are CLEARLY malware or phishing attempts is staggering.

The people who make the decisions rarely understand how this stuff works and refuse to take this shit seriously. Direct cyber attacks, where someone from the outside hammers at your firewalls to get in to your network is too dangerous, too ineffective, and too easily traced. The Sony hacks started with someone getting access to an employees password, not from 2000 koreans or whatever sitting in super computer setups typing in code.

Most if not all of these breaches occur because someone got fucking careless.

Change your goddamn passwords frequently. Make them complex, and STOP OPENING EMAIL ATTACHMENTS IF YOU DON"T KNOW WHAT IS IN IT!!!

That said. I find this story a little hard to swallow. One, anything digital can be traced. Two EVERY IT shop I have worked in has had one or a few "Know It All" IT types that sit on their asses, try to impress everyone with what they know, scoff at customer interaction and just monitor their servers all fucking day. There had to be a million tells that something was going on. And monitoring video!? They should have seen the bandwidth at at least one bank. And in the US, a IP address from China or Europe means, at least that some kid with too much time was fucking with you.