Hackers stalked Bangladesh bank for two weeks before big heist
Hackers who stole $101 million from Bangladesh's central bank stalked its computer systems for almost two weeks beforehand, according to an interim investigation report.
Prepared for Bangladesh Bank by cyber security firms FireEye Inc. and World Informatix, the assessment offers a tantalizing glimpse into how cyber criminals can use banks' own systems against them. The cyber companies say the thieves deployed malware on servers housed at the central bank to make payments seem gen- uine. The report cast the unidentified hackers as a sophisticated group who sought to cover their tracks by deleting computer logs as they went. Before making transfers they sneaked through the network, inserting software that would allow re-entry.
It's the sort of thorough operation often mounted by nation-state hackers, according to the report, but FireEye's intelligence unit believes the group, which it has been tracking for some time, is criminal. "These threat actors appear to be financially motivated, and well organized," the report said.
Rahman speaks after resignation. Rahman speaks after resignation. Photographer: Anadolu Agency/Getty Images The heist, which saw payments processed through the bank's accounts at the U.S. Federal Reserve and money moved to the Philippines and Sri Lanka, was part of a bigger attempt to steal nearly $1 billion in total from the central bank. It exposed weaknesses in systems, sparked a dispute between Bangladesh's central bank and its finance ministry and cost the central bank governor, Atiur Rahman, his job less than five months before he planned to retire. The hackers sent $81 million from Bangladesh Bank's account in New York to the Philippines, and another $20 million to Sri Lanka. The Federal Reserve Bank of New York blocked transactions worth another $850 million. A bank in Sri Lanka stopped and returned the cash, while the money in the Philippines is still missing, leading to a Senate probe that is riveting the nation.
"Malware was specifically designed for a targeted attack on Bangladesh Bank to operate on SWIFT Alliance Access servers," the interim report said. Those servers are operated by the bank but run the SWIFT interface, and the report makes it clear the breach stretches into other parts of the bank's network as well. "The security breach of the SWIFT environment is part of a much larger breach that is currently under investigation."
SWIFT is a member-owned cooperative that provides international codes to facilitate payments between banks globally. It can't comment on the investigation, according to Charlie Booth from Brunswick Group, a corporate advisory firm that represents SWIFT. "We reiterate that the SWIFT network itself was not breached," Booth said in an e-mail. "There is a full investigation underway, on what appears to be a specific and targeted attack on the victim's local systems." SWIFT said last week its "core messaging services were not impacted by the issue and continued to work as normal." Dedicated servers running the SWIFT system are located in the back office of the Accounts and Budgeting Department of Bangladesh Bank. They are connected with three terminals for payment communications.
Patrick Neighorn, a spokesman for FireEye, declined to comment on the report or the investigation. An e-mail to Rakesh Asthana, managing director of World Informatix, wasn't immediately returned. A call to the company's office wasn't answered.