Shut Down: How Security Thwarted a 5-Year-Long $25 Million Heist

BY:

Jun 29, 2016

For a prime example of why companies need high-end security, take a look at how a bank thwarted a 5-year-long $25 million heist.

If your business happens to work with highly sensitive data, its incredibly important that you have the best security systems available on the market. An excellent example of the type of protection a security system can provide occurred when a gang tried to hack $25 million from a bank, and the bank solved the problem. Heres a look at how this heist was stopped in its tracks.

Cybercrime

How They Did It

Since 2011, a group of financial hackers were allegedly stealing from bank accounts using a trojan called Lurk. Lurk operates via a form of steganography; whereas, a file is hidden away on a computer as something completely different. For example, a Lurk could pose as a video, audio or image file stored on a computer. In the bank heist, one of the victims found the Lurk in a pizza order.

The cybercrime gang utilized Lurk and created a botnet of infected computers so they could launch attacks against media companies, businesses and Russian banks. They attacked large Russian organizations, such as Regnum, Metropol, Russian International Bank and Metallinvestbank. In Metallinvestbanks case, the hackers gained remote access to their systems and transferred funds to accounts under their control. In total, the hackers seized $10.2 million from Metallinvestbank.

How They Got Caught

Sberbank (another one of the victimized banks) worked with the Federal Security Service and the Russian Interior Ministry on a mission to catch the hackers. This resulted in the Russian police getting involved to stop more fake money transactions that were running up to an estimated $30 million, which led to 50 people being detained in what was regarded as the countrys biggest bust of financial hackers.

It was discovered that simply visiting a hackers rigged/copied site was all that was necessary for the cybercrime gangs Lurk to infect the system. From there, the Lurk downloaded additional modules to steal passwords and login names for bank accounts.

Therefore, its very important to stay one step ahead of hackers by implementing top-tier security. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • amazon connect salesforce CTI integration" alt="">
    4 Ways Sales Teams Benefit From Amazon Connect and Salesforce CTI Integration

    One of the best ways to unlock more sales and revenue is to connect the systems your sales teams rely on the most While customer relationship management (CRM) platforms have been around for decades,...

    Learn More
  • Cold Transfers with Amazon Connect" alt="">
    Managing Cold Transfers with Amazon Connect

    There’s a right way and a wrong way to set up call transfers in Amazon Connect, and it could make all the difference between a customer’s experience with your contact center. One of the most...

    Learn More
  • Amazon Connect’s integration with Service Cloud" alt="">
    Amazon Connect, Service Cloud Voice and Salesforce CTI Enable Total Customer-Facing Integration

    Why Amazon Connect’s integration with Salesforce Service Cloud Voice dramatically improves customer service and communication Customers are the root of your business. Being able to connect with...

    Learn More