Shut Down: How Security Thwarted a 5-Year-Long $25 Million Heist

BY:

Jun 29, 2016

For a prime example of why companies need high-end security, take a look at how a bank thwarted a 5-year-long $25 million heist.

If your business happens to work with highly sensitive data, its incredibly important that you have the best security systems available on the market. An excellent example of the type of protection a security system can provide occurred when a gang tried to hack $25 million from a bank, and the bank solved the problem. Heres a look at how this heist was stopped in its tracks.

Cybercrime

How They Did It

Since 2011, a group of financial hackers were allegedly stealing from bank accounts using a trojan called Lurk. Lurk operates via a form of steganography; whereas, a file is hidden away on a computer as something completely different. For example, a Lurk could pose as a video, audio or image file stored on a computer. In the bank heist, one of the victims found the Lurk in a pizza order.

The cybercrime gang utilized Lurk and created a botnet of infected computers so they could launch attacks against media companies, businesses and Russian banks. They attacked large Russian organizations, such as Regnum, Metropol, Russian International Bank and Metallinvestbank. In Metallinvestbanks case, the hackers gained remote access to their systems and transferred funds to accounts under their control. In total, the hackers seized $10.2 million from Metallinvestbank.

How They Got Caught

Sberbank (another one of the victimized banks) worked with the Federal Security Service and the Russian Interior Ministry on a mission to catch the hackers. This resulted in the Russian police getting involved to stop more fake money transactions that were running up to an estimated $30 million, which led to 50 people being detained in what was regarded as the countrys biggest bust of financial hackers.

It was discovered that simply visiting a hackers rigged/copied site was all that was necessary for the cybercrime gangs Lurk to infect the system. From there, the Lurk downloaded additional modules to steal passwords and login names for bank accounts.

Therefore, its very important to stay one step ahead of hackers by implementing top-tier security. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • By connecting customer data across your organization, Wisdom allows agents to provide the best in customer service." alt="">
    An In-Depth Look at Amazon Connect Wisdom

    Amazon Connect Wisdom brings disparate data together to quickly provide the information your service agents need Key Takeaways: Consumers expect speedy and personalized customer service Wisdom uses...

    Learn More
  • Amazon Connect makes it simple to set up remote contact center agents." alt="">
    Set Up Remote Contact Center Agents Quickly with Amazon Connect

    Here’s how to set up a fully operational contact center that can be accessed from nearly anywhere. Key Takeaways: Amazon Connect lets your business set up a contact center that agents can...

    Learn More
  • When a specified alarm state is reached, the system automatically creates an OpsItem in OpsCenter." alt="">
    Create an Automatic OpsItem When CloudWatch Alarm Enters an Alarm State

    Auto-generated OpsItems give detailed information about the alarm for swift remediation. Key Takeaways: The auto-generated OpsItem offers aggregated information that makes alarm investigation easy...

    Learn More