The Mercury News

Hackers linked to Russians target banks

MoneyTaker group broke into 20 systems stealing $10 million

- By Jake Rudnitsky

A previously unknown ring of Russian-speaking hackers has stolen as much as $10 million from U.S. and Russian banks in the last 18 months, according to a Moscow-based cyber-security firm that runs the largest computer forensics laboratory in eastern Europe.

The MoneyTaker group broke into 20 systems, which includes 15 U.S. lenders, targeting ATMs with “mules” and Russia’s interbank money-transfer system, Group-IB said in a report provided to Bloomberg.

The hackers, who also breached a U.K. software and service provider, are now probing institutio­ns in Latin America and may be trying to compromise the Swift internatio­nal bank messaging service, according to the privately held security firm, whose

clients range from Russia’s biggest lender Sberbank to Raiffeisen Bank Internatio­nal. Group-IB last month signed an agreement with Interpol to share data on threat intelligen­ce and the latest cyber-criminal activities.

“Criminals have changed tactics and are now focusing on banks rather than their clients, as was standard operating procedure in the past,” Dmitry Volkov, the head of Group-IB’s cyber intelligen­ce department, said by phone.

Russia increasing­ly finds itself a victim of cybercrime. It was initially blamed for the Badrabbit ransomware virus that spread to more than 200 targets globally, even though some of the biggest disruption­s affected Russian businesses.

Since its first successful breach in May 2016, MoneyTaker has stolen from banks in New York, California, Utah and Moscow, primarily targeting smaller institutio­ns with limited cyber defenses, Group-IB found. The average haul from U.S. banks was about $500,000, and it stole over $3 million from three Russian lenders.

The cell remained undetected by using so-called fileless malware that only exists on a computer’s temporary memory and destroys itself when the system reboots, meaning it’s not permanentl­y stored and therefore can more easily evade anti-virus programs, according to Group-IB. At one bank, the hackers gained access to the network via the home computer of the lender’s system administra­tor.

The attackers further covered their tracks with encryption certificat­es generated using brand names such as Bank of America, Microsoft and the Federal Reserve, according to Group-IB, which previously uncovered Russianspe­aking hacker cells behind the Corkow Trojan and Buhtrap.

Microsoft and the Fed couldn’t be reached for comment outside of working hours. Swift and Bank of America didn’t immediatel­y respond to requests from Bloomberg.

While hackers are transnatio­nal, many new types of attacks are discovered in Russia because it’s at the forefront of cybersecur­ity, a deputy head of the Russian central bank’s informatio­n security and protection department, Artem Sychev, said in an interview.

Group-IB said the U.S. banks were targeted by gaining access to their card-processing system and then opening accounts at the compromise­d institutio­ns. The attackers removed limits on the legitimate bank cards and used mules to withdraw cash from ATMs. The virus was so stealthy that, in at least one instance, a bank was successful­ly robbed twice.

While Group-IB didn’t uncover evidence of a successful attack on Swift by MoneyTaker, it found that the hackers were searching for documents related to the messaging system, which could indicate pending attacks. Last year, in one of the biggest heists in cybercrime history, hackers used Swift to steal $81 million from Bangladesh.

“The more we dig, the more we’ll find,” Group-IB’s Volkov said. “This report doesn’t represent the full picture, and I can say with 100 percent certainty that there are more victims that haven’t been identified yet.”

Newspapers in English

Newspapers from United States