The Pak Banker

Hackers stalked Bangladesh bank for two weeks before big heist

-

Hackers who stole $101 million from Bangladesh's central bank stalked its computer systems for almost two weeks beforehand, according to an interim investigat­ion report.

Prepared for Bangladesh Bank by cyber security firms FireEye Inc. and World Informatix, the assessment offers a tantalizin­g glimpse into how cyber criminals can use banks' own systems against them. The cyber companies say the thieves deployed malware on servers housed at the central bank to make payments seem gen- uine. The report cast the unidentifi­ed hackers as a sophistica­ted group who sought to cover their tracks by deleting computer logs as they went. Before making transfers they sneaked through the network, inserting software that would allow re-entry.

It's the sort of thorough operation often mounted by nation-state hackers, according to the report, but FireEye's intelligen­ce unit believes the group, which it has been tracking for some time, is criminal. "These threat actors appear to be financiall­y motivated, and well organized," the report said.

Rahman speaks after resignatio­n. Rahman speaks after resignatio­n. Photograph­er: Anadolu Agency/Getty Images The heist, which saw payments processed through the bank's accounts at the U.S. Federal Reserve and money moved to the Philippine­s and Sri Lanka, was part of a bigger attempt to steal nearly $1 billion in total from the central bank. It exposed weaknesses in systems, sparked a dispute between Bangladesh's central bank and its finance ministry and cost the central bank governor, Atiur Rahman, his job less than five months before he planned to retire. The hackers sent $81 million from Bangladesh Bank's account in New York to the Philippine­s, and another $20 million to Sri Lanka. The Federal Reserve Bank of New York blocked transactio­ns worth another $850 million. A bank in Sri Lanka stopped and returned the cash, while the money in the Philippine­s is still missing, leading to a Senate probe that is riveting the nation.

"Malware was specifical­ly designed for a targeted attack on Bangladesh Bank to operate on SWIFT Alliance Access servers," the interim report said. Those servers are operated by the bank but run the SWIFT interface, and the report makes it clear the breach stretches into other parts of the bank's network as well. "The security breach of the SWIFT environmen­t is part of a much larger breach that is currently under investigat­ion."

SWIFT is a member-owned cooperativ­e that provides internatio­nal codes to facilitate payments between banks globally. It can't comment on the investigat­ion, according to Charlie Booth from Brunswick Group, a corporate advisory firm that represents SWIFT. "We reiterate that the SWIFT network itself was not breached," Booth said in an e-mail. "There is a full investigat­ion underway, on what appears to be a specific and targeted attack on the victim's local systems." SWIFT said last week its "core messaging services were not impacted by the issue and continued to work as normal." Dedicated servers running the SWIFT system are located in the back office of the Accounts and Budgeting Department of Bangladesh Bank. They are connected with three terminals for payment communicat­ions.

Patrick Neighorn, a spokesman for FireEye, declined to comment on the report or the investigat­ion. An e-mail to Rakesh Asthana, managing director of World Informatix, wasn't immediatel­y returned. A call to the company's office wasn't answered.

Newspapers in English

Newspapers from Pakistan