Shut Down: How Security Thwarted a 5-Year-Long $25 Million Heist

BY:

For a prime example of why companies need high-end security, take a look at how a bank thwarted a 5-year-long $25 million heist.

If your business happens to work with highly sensitive data, its incredibly important that you have the best security systems available on the market. An excellent example of the type of protection a security system can provide occurred when a gang tried to hack $25 million from a bank, and the bank solved the problem. Heres a look at how this heist was stopped in its tracks.

Cybercrime

How They Did It

Since 2011, a group of financial hackers were allegedly stealing from bank accounts using a trojan called Lurk. Lurk operates via a form of steganography; whereas, a file is hidden away on a computer as something completely different. For example, a Lurk could pose as a video, audio or image file stored on a computer. In the bank heist, one of the victims found the Lurk in a pizza order.

The cybercrime gang utilized Lurk and created a botnet of infected computers so they could launch attacks against media companies, businesses and Russian banks. They attacked large Russian organizations, such as Regnum, Metropol, Russian International Bank and Metallinvestbank. In Metallinvestbanks case, the hackers gained remote access to their systems and transferred funds to accounts under their control. In total, the hackers seized $10.2 million from Metallinvestbank.

How They Got Caught

Sberbank (another one of the victimized banks) worked with the Federal Security Service and the Russian Interior Ministry on a mission to catch the hackers. This resulted in the Russian police getting involved to stop more fake money transactions that were running up to an estimated $30 million, which led to 50 people being detained in what was regarded as the countrys biggest bust of financial hackers.

It was discovered that simply visiting a hackers rigged/copied site was all that was necessary for the cybercrime gangs Lurk to infect the system. From there, the Lurk downloaded additional modules to steal passwords and login names for bank accounts.

Therefore, its very important to stay one step ahead of hackers by implementing top-tier security. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • A teacher exercises and shares the benefits of AWS cloud computing for primary and secondary schools." alt="">
    AWS Cloud Computing for Primary and Secondary Schools

    Managing the flow and effectiveness of primary and secondary education systems can be relatively complex. Above all, it’s vital that they’re serving their intended purpose and helping students...

    Learn More
  • The image is a black chalkboard with a yellow target and arrow at the center over the top of intersecting lines indicating computer system complexity." alt="">
    AWS Cloud Computing for University Systems

    AWS cloud computing for universities & colleges At the beginning of the COVID pandemic, many colleges and universities discovered the advantages of accessibility, flexibility, and organizational...

    Learn More
  • A customer service agent utilizes four benefits of Amazon Connect customer profiles to provide a better experience to each customer." alt="">
    4 Big Benefits of Amazon Connect Customer Profiles

    Having access to the correct data when providing customer service is crucial. Without the help of the right technology, this wouldn’t be possible. It’s also inherently necessary due to the volume...

    Learn More