Hackers Net Almost $1m In Russian Bank Raid
A notorious hacking gang has struck again, stealing almost £700,000 ($910,000) from a Russian bank, reports a cyber-security company.
Group-IB was called in to help Russia’s PIR Bank after it noticed the theft, said the firm.
The raid is believed to have been carried out by the MoneyTaker gang which has hit other financial firms.
In 2017 it was suspected of stealing nearly £7.5m ($10m) from Russian, British and American companies.
Wide warning
In its report, Group-IB said the cash was taken in a series of transfers on 3 July via a computer at the bank to which the gang had obtained access.
Staff at PIR were able to stop some of the transfers, said Group-IB, but the gang’s swift action to “cash out” using paid helpers or “mules” at ATMs stopped the bank recovering much of it.
Group-IB said the tools and techniques used by the gang to penetrate the bank and lurk on its internal systems were known to have been used by MoneyTaker in other robberies.
The attack began in late May, said Group-IB, and initially concentrated on a piece of networking hardware known as a router, which the gang was able to compromise.
By taking over this router, the gang gained access to the bank’s internal network.
Once on the network, the gang took time to find a specific computer used to authorise transfers of cash. It then used its knowledge of this system, known as the Automated Work Station Client of the Russian Central Bank (AWS-CBR), to set up the bogus transfers.
“Attacks on AWS-CBR are difficult to implement and are not conducted very often, because many hackers just cannot work on computers with AWS-CBR successfully,” said Valeriy Baulin, head of Group-IB’s digital forensics lab.
“A 2016 incident, when МoneyTaker hackers withdrew about $2m using their own self-titled program, remains one of the largest attacks of this kind,” he added.
Information about MoneyTaker’s attack techniques has now been circulated to other Russian banks to help them spot intrusions by the gang, said Grooup-IB.
READ MORE HERE