Go Symbol Lookup
Loading...

Global Network of Hackers Steal $45 Million From ATMs

 Text Size  
Published: Friday, 10 May 2013 | 7:23 AM ET
Thomas Samson | AFP | Getty Images

The sophistication of a global network of thieves who drained cash machines around the globe of an astonishing $45 million in mere hours sent ripples through the security world, not merely for the size of the operation and ease with which it was carried out, but also for the threat that more such thefts may be in store.

Seven people were arrested in the U.S., accused of operating the New York cell of what prosecutors said was a network that carried out thefts at ATMs in 27 countries from Canada to Russia. Law enforcement agencies from more than a dozen nations were involved in the investigation, U.S. prosecutors in New York said Thursday.

"Unfortunately these types of cybercrimes involving ATMs, where you've got a flash mob going out across the globe, are becoming more and more common," said Rose Romero, a former federal prosecutor and regional director for the U.S. Securities and Exchange Commission.

(Read More: US Charges Eight in $45 Million Cybercrime Scheme)

"I expect there will be many more" of these types of crimes, she said.

Brooklyn U.S. Attorney Loretta Lynch, who called the theft "a massive 21st-century bank heist," announced the case Thursday in New York.

New York Cybercrime Cell Busted
The U.S. attorney charges eight people in connection with financial cyberattacks, reports CNBC's Scott Cohn.

Here's how it worked:

Hackers got into bank databases, eliminated withdrawal limits on pre-paid debit cards and created access codes. Others loaded that data onto any plastic card with a magnetic stripe - an old hotel key card or an expired credit card worked fine as long as it carried the account data and correct access codes.

A network of operatives then fanned out to rapidly withdraw money in multiple cities, authorities said. The cells would take a cut of the money, then launder it through expensive purchases or ship it wholesale to the global ringleaders. Lynch didn't say where they were located.

It appears no individuals lost money. The thieves plundered funds held by the banks that back up prepaid credit cards, not individual or business accounts, Lynch said.

(Read More: Cyber Threats Escalate as Banks Go Paperless)

Ori Eisen, a cybercrime expert and founder of 41st Parameter, a fraud detection and prevention firm, said the $45 million heist was on the "high-end" of what can be done by cybercriminals who exploit banking systems connected to the Internet.

"Given the scale of the global credit card networks, it is almost impossible to detect every kind of attack," he said. "This attack is not the last one, and if the modus operandi proves to be successful crooks will exploit it time and again."

There were two separate attacks in this case, one in December that reaped $5 million worldwide and one in February that snared about $40 million in 10 hours with about 36,000 transactions. The scheme involved attacks on two banks, Rakbank in the United Arab Emirates and the Bank of Muscat in Oman, prosecutors said.

Such ATM fraud schemes are not uncommon, but the $45 million stolen in this one was at least double the amount involved in previously known cases, said Avivah Litan, an analyst who covers security issues for Gartner Inc.

Middle Eastern banks and payment processors are "a bit behind" on security and screening technologies that are supposed to prevent this kind of fraud, but it happens around the world, she said.

(Read More: Inside a Cyber WarRoom: The Fight Against Hacking)

"It's a really easy way to turn digits into cash," Litan said.

Some of the fault lies with the ubiquitous magnetic strips on the back of the cards. The rest of the world has largely abandoned cards with magnetic strips in favor of ones with built-in chips that are nearly impossible to copy. But because U.S. banks and merchants have stuck to cards with magnetic strips, they are still accepted around the world.

Lynch would not say who masterminded the attacks globally, who the hackers are or where they were located, citing an ongoing investigation.

The New York suspects were U.S. citizens originally from the Dominican Republic who lived in the New York City suburb of Yonkers. They were mostly in their 20s. Lynch said they all knew one another and were recruited together, as were cells in other countries. They were charged with conspiracy and money laundering. If convicted, they each face 10 years in prison.

The accused ringleader in the U.S. cell, Alberto Yusi Lajud-Pena, was reportedly killed in the Dominican Republic late last month, prosecutors said. More investigations continue and other arrests have been made in other countries, but prosecutors did not have details.

(Read More: Hacker Claims He Can Hijack a Plane With an App)

An indictment unsealed Thursday accused Lajud-Pena and the other seven New York suspects of withdrawing $2.8 million in cash from hacked accounts in less than a day.

Arrests began in March.

Lajud-Pena was found dead with a suitcase full of about $100,000 in cash, and the investigation into his death is continuing separately. Dominican officials said they arrested a man in the killing who said it was a botched robbery, and two other suspects were on the lam.

The first federal study of ATM fraud was 30 years ago, when the use of computers in the financial community was growing rapidly. At the time, the Bureau of Justice Statistics found nationwide ATM bank loss from fraud ranged from $70 and $100 million a year.

By 2008, that had risen to about $1 billion a year, said Ken Pickering, who works in security intelligence at CORE Security, a white-hat hacking firm that offers security to businesses.

He said he expects news of the latest ring to inspire other criminals.

"Once you see a large attack like this, that they made off with $45 million, that's going to wake up the cybercrime community," he said.

"Ripping off cash, you don't get that back," he said. "There are suitcases full of cash floating around now, and that's just gone."

 Print
The sophistication of a global network of thieves who drained cash machines around the globe of an astonishing $45 million in mere hours sent ripples through the security world, raising fears more such thefts may be in store.

   
Comments

 

More Comments

 
 

Add Comments

 

Your Comments (Up to 1100 characters):

Remaining characters

Your comments have not been posted yet.

Please review your submission to make sure you are comfortable with your entry.

Your Comments:


                
            
            
        

Featured

Contact Hacking America

  • Senior Correspondent and lead investigative reporter and also appears on "NBC Nightly News with Brian Williams" "Today," and MSNBC.

  • Co-anchor of CNBC's "Squawk on the Street," Faber is also a coproducer of CNBC's acclaimed original documentaries.

  • Javers ia a reporter based at CNBC's Washington, D.C. bureau appearing on business day programming and CNBC.com.

Investigations Inc.: Cyber Espionage

  • When a person enters information on a website, like an email or credit card, it gets stored in that company’s data base. Those web-based forms are a simple tool for users, but they are also another way hackers can exploit a company’s system. Instead of inputting a name into the website, cyber spies can put in a specially crafted text that may cause the database to execute the code instead of simply storing it, Alperovitch said. The result is a “malicious takeover of the system,” he said.

    By attacking business computer networks, hackers are accessing company secrets and confidential strategies and creating huge losses for the overall economy.

  • China is working feverishly to counteract its slowest GDP growth in recent years, and one of the ways it’s doing so, say U.S. officials, is through the theft of American corporate secrets.

  • US businesses are enduring an unprecedented onslaught of cyber invasions from foreign governments, organized crime syndicates, and hacker collectives, all seeking to steal information and disrupt services, cybersecurity experts say.

Technology

Technology Explained

  • Cloud computing means being able to access the Internet anywhere, anytime and being able to use any or all of the data and applications you want.

  • Hand using mouse with laptop

    It's hard to stay out of trouble on the Internet. Even if you avoid sites with questionable content, there are plenty of pitfalls and traps that subtly install programs which then wreak havoc on your computer.

  • The new Sprint HTC Evo 4G smartphone is displayed at the International CTIA Wireless 2010 convention at the Las Vegas Convention Center March 24, 2010 in Las Vegas, Nevada. CTIA is the international association for the wireless telecommunications industry.

    The transition to the next generation of wireless communications is already under way. The latest is called 4G — and all of the carriers are peppering their marketing with the phrase.