FacebookInstagramTwitterContact

 

Number of New Converts Increase           >>           Mum's Horror As Group Text Invite For Daughter's 1st Birthday Party Goes Terribly Wrong           >>           Kid Cudi Engaged To Lola Abecassis Sartore           >>           Kid Cudi Engaged To Lola Abecassis Sartore           >>           Orlando Bloom Reveals Whether Kids Flynn And Daisy Inherited His Taste For Adventure           >>           This hopping robot with flailing legs could explore asteroids in the future           >>           GPT-4 performed close to the level of expert doctors in eye assessments           >>           Media coalition asks the feds to investigate Google’s removal of California news links           >>           Google's wired Nest security camera is cheaper than ever           >>           Israel And Hezbollah: Fears Of Escalation After Flurry Of Attacks           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 05:01 AM

Subuh

: 05:11 AM

Syuruk

: 06:29 AM

Doha

: 06:51 AM

Zohor

: 12:32 PM

Asar

: 03:44 PM

Maghrib

: 06:32 PM

Isyak

: 07:42 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


Russian Hackers Steal $10 Million From Atms Through Bank Networks


Getty Images

 


 December 12th, 2017  |  10:28 AM  |   1686 views

ENGADGET.COM

 

The intruders have exploited transfer systems for 18 months.

 

The recent rash of bank system hacks goes deeper than you might have thought -- it also includes stealing cash directly from ATMs. Researchers at Group-iB have published details of MoneyTaker, a group of Russian hackers that has stolen close to $10 million from American and Russian ATMs over the past 18 months. The attacks, which targeted 18 banks (15 of which were American), compromised interbank transfer systems to hijack payment orders -- "money mules" would then withdraw the funds at machines.

 

The first known attack was in the spring of 2016, when MoneyTaker hit First Data's STAR network (the largest transfer messaging system for ATMs in the US). They also compromised Russia's AW CRB network, and swiped documents for OceanSystems' Fed Link system used by roughly 200 banks across the Americas. And in some cases, the group stuck around after the initial heist -- at least one US bank's documents were stolen twice, while the perpetrators kept spying on Russian bank networks.

 

While it's not clear who's behind MoneyTaker, you're only hearing about them now because they're particularly clever. They've repeatedly switched their tools and methods to bypass software, and have taken care to erase their tracks. For instance, they've 'borrowed' security certificates from the US federal government, Bank of America, Microsoft and Yahoo. One Russian bank did manage to spot an attack and return some of the ill-gotten gains.

 

This particular hack didn't directly affect users, since it was more about intercepting bank-to-bank transfers than emptying personal accounts. However, it illustrates both the sophistication of modern bank hacks and the vulnerability of the banks themselves. While it would be difficult to completely prevent hacks, it's clear that attackers are having a relatively easy time making off with funds and sensitive data.

 


 

Source:
courtesy of ENGADGET

by Jon Fingas

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Sydney Church Stabbing: Australian Bishop Forgives Alleged Attacker

 2024-04-19 00:07:49

Google Sacks Staff Protesting Over Israeli Contract

 2024-04-18 23:31:16