Kommentare zu folgendem Beitrag: Cybercrime: Hacker stehlen $ 13,5 Millionen von Cosmos Bank
Kommentar von exploit:
Bitte ein anderes Wort, als eingehackt!
Kommentar von NotBad:
Starke Nummer
Kommentar von P E N N Y W I S E:
Zitat:
Die National Payments Corporation of India (NPCI) bekunden, dass ihre Systeme „vollkommen sicher“ seien und der Cyber-Betrug durch einen Angriff auf das IT-System der Cosmos Bank durch Malware verursacht worden sei. ENDE
Das „vollkommen sicher“ bitte gegen folgende „Wortphrasen“
austauschen „vollkommen sicher bis vor- vorgestern“, nun
akut würde man wohl sagen „Wir haben ein Datenleck im System“, und nichts ist mehr wie vor- vorgestern".
Die Maleware muss allerdings sehr intelligent programmiert sein, da soviele Transaktionen stattfanden, wobei ja auch wohl Kennwörter „erraten“, „entfernt“, oder „geknackt“ oder
irgendwie generiert wurden.
Für eine Bank dürften 13 Millionen Euro kein Genickbruch
sein, aber ärgerlich ist es natürlich schon, so lange mann
nicht weiß nach welchem Fehler man sucht, und vor allem
ob er sich in Kürze nochmals wiederholt.
Das sieht für mich ja ganz nach einer „organisierten“
Aktion aus, wenn ICH das anmerken darf.
Da werden jetzt wohl einige IT-Trekkies Überstunden schieben müssen, um den Fehler zu lokalisieren. Stimmung ist wahrscheinlich auf dem Siedepunkt?
PS. Die Bank heisst „Cosmos“, steht also für das „Weltall“.
Weltall, das steht für mich für „Mars, Erde, Enterprise“
Hey „Scotty“ beam mal 4 Mille für nen tollen Malle Urlaub
rüber. DANKEschön
Kommentar von OlloBollo:
Ein Meisterlicher Coup. Wahnsinn.
Kommentar von :
Das schlimme ist ja, die Kunden verlieren schnell ihr
Vertrauen in eine solche Bank, die quasi „geplündert“
wird… !!!
Dann springt Kunde um Kunde ab, ein s.g. Domino-Effekt!
Sind es zuviele Kunden, dann gabs sie Bank die längste
Zeit. Ihr vesteht… ?
Kommentar von NewFarmer:
Hat gestern nicht erst das FBI vor so einem Hack gewarnt?
Kommentar von FlashCash:
Genau genommen schon vor vier Tagen ;))
-Zitat-
12. Aug. 2018
FBI Warns of ‘Unlimited’ ATM Cashout Blitz
The Federal Bureau of Investigation (FBI) is warning banks that cybercriminals are preparing to carry out a highly choreographed, global fraud scheme known as an “ATM cash-out,” in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just a few hours.
“The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation’,” reads a confidential alert the FBI shared with banks privately on Friday.
The FBI said unlimited operations compromise a financial institution or payment card processor with malware to access bank customer card information and exploit network access, enabling large scale theft of funds from ATMs.
“Historic compromises have included small-to-medium size financial institutions, likely due to less robust implementation of cyber security controls, budgets, or third-party vendor vulnerabilities,” the alert continues. “The FBI expects the ubiquity of this activity to continue or possibly increase in the near future.”
Organized cybercrime gangs that coordinate unlimited attacks typically do so by hacking or phishing their way into a bank or payment card processor. Just prior to executing on ATM cashouts, the intruders will remove many fraud controls at the financial institution, such as maximum ATM withdrawal amounts and any limits on the number of customer ATM transactions daily.
The perpetrators also alter account balances and security measures to make an unlimited amount of money available at the time of the transactions, allowing for large amounts of cash to be quickly removed from the ATM.
“The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores,” the FBI warned. “At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.”Virtually all ATM cashout operations are launched on weekends, often just after financial institutions begin closing for business on Saturday. Last month, KrebsOnSecurity broke a story about an apparent unlimited operation used to extract a total of $2.4 million from accounts at the National Bank of Blacksburg in two separate ATM cashouts between May 2016 and January 2017.In both cases, the attackers managed to phish someone working at the Blacksburg, Virginia-based small bank. From there, the intruders compromised systems the bank used to manage credits and debits to customer accounts.The 2016 unlimited operation against National Bank began Saturday, May 28, 2016 and continued through the following Monday. That particular Monday was Memorial Day, a federal holiday in the United States, meaning bank branches were closed for more than two days after the heist began. All told, the attackers managed to siphon almost $570,000 in the 2016 attack.The Blacksburg bank hackers struck again on Saturday, January 7, and by Monday Jan 9 had succeeded in withdrawing almost $2 million in another unlimited ATM cashout operation.The FBI is urging banks to review how they’re handling security, such as implementing strong password requirements and two-factor authentication using a physical or digital token when possible for local administrators and business critical roles.
Other tips in the FBI advisory suggested that banks:
-Implement separation of duties or dual authentication procedures for account balance or withdrawal increases above a specified threshold.
-Implement application whitelisting to block the execution of malware.
-Monitor, audit and limit administrator and business critical accounts with the authority to modify the account attributes mentioned above.
-Monitor for the presence of remote network protocols and administrative tools used to pivot back into the network and conduct post-exploitation of a network, such as Powershell, cobalt strike and TeamViewer.
-Monitor for encrypted traffic (SSL or TLS) traveling over non-standard ports.-Monitor for network traffic to regions wherein you would not expect to see outbound connections from the financial institution.
Update, Aug. 15, 11:11 a.m. ET: Several sources now confirm that the FBI alert was related to a breach of the Cosmos cooperative bank in India. According to multiple news sources, thieves using cloned cards executed some 12,000 transactions and stole roughly $13.5 million from Cosmos accounts via 25 ATMs located in Canada, Hong Kong and India.
-Zitat Ende-
Quelle: B. Krebs -> krebsonsecurity.com
Kommentar von uguranocool:
sehr heftig so viele Summen, das sind also Profi hackers
Kommentar von exploit:
Eher Black Hat Hackers würde ich sagen, denn Profi Hackers können auch White Hat sein!
Kommentar von Unter dem Radar: Der satirische Monatsrückblick (August/2018):
[…] zeitloser als Poolnudeln und Slushies. Zudem ist die Gewinnspanne im Idealfall ganz erheblich. Kürzlich etwa erbeuteten IT-Kriminelle umgerechnet gute elf Millionen Euro von der Cosmos Bank. Von solchen Einnahmen konnten selbst die besten Eisdielen auf der Höhe der Hitzewelle nur […]