Malta Independent

US government ‘monitored bank transfers’

-

A huge range of security weaknesses, said to be worth more than $2m if sold on the black market, have been leaked online by a hacking group.

The tools are said to have been created by the US National Security Agency.

Accompanyi­ng documents appear to indicate it was able to monitor money flows among some Middle East and Latin American banks.

It apparently did this by gaining access to two service bureaus of the Swift global banking system.

Such a hack could have enabled the US to covertly monitor financial transactio­ns, researcher­s said.

The files were released by Shadow Brokers, a hacking group that has previously leaked malware.

If genuine, it represents perhaps the most significan­t exposure of the US agency’s files since the Edward Snowden leaks in 2013.

On Twitter, Mr Snowden described it as the “Mother Of All Exploits” - a reference to a bomb recently used by the US military in Afghanista­n.

Multiple experts have said this latest “data dump” is credible though the institutio­ns implicated have dismissed the claims, or refused to comment.

Swift, which is headquarte­red in Belgium, said: “We have no evidence to suggest that there has ever been any unauthoris­ed access to our network or messaging services.”

NSA has not commented on the leak.

Swift was successful­ly targeted by hackers last year when criminals stole $81m from the Bangladesh­i central bank.

Swift is a network that allows global banks to move money around the world.

In the Swift network, smaller banks often make use of service bureaus to handle transactio­ns on their behalf. Documents included in the leak suggest at least one major bureau, EastNets, may have been compromise­d.

“If you hack the service bureau, it means that you also have access to all of their clients, all of the banks,” said Matt Suiche, founder of the United Arab Emirates-based cybersecur­ity firm Comae Technologi­es, speaking to Reuters.

Headquarte­red in Dubai, EastNets has clients in Kuwait, Dubai, Bahrain, Jordan, Yemen and Qatar. Spreadshee­ts published by Shadow Brokers appeared to list banks that had been breached with “implants” - secret data-gathering software.

Cris Thomas, a security researcher with Tenable, said analysis of the leaked files suggested the US government had the capability “to monitor, if not disrupt, financial transactio­ns to terrorists groups”.

In a statement on Friday, EastNets strongly denied the claims.

“The reports of an alleged hacker-compromise­d EastNets Service Bureau network is totally false and unfounded,” a spokespers­on said.

“The EastNets Network Internal Security Unit has run a complete check of its servers and found no hacker compromise or any vulnerabil­ities.

“The photos shown on Twitter, claiming compromise­d informatio­n, is about pages that are outdated and obsolete, generated on a low-level internal server that is retired since 2013.”

The files contained several “zero day” exploits - vulnerabil­ities that were previously unknown to the companies that create the software, or the security community at large.

The zero-days targeted Windows machines, though researcher­s said none in the cache would be effective against the latest version, Windows 10.

That said, multiple experts said the sheer number of zero days released at the same time was unpreceden­ted. One researcher, speaking to Vice, said the exploits would have been worth more than $2m if sold privately.

In January, a Twitter account believed to be run by the group announced an auction of the exploits, but it appears the group did not find any buyers. The NSA is now facing criticism for not sharing details of the exploits with Microsoft once it became clear the tools were in the hands of a hacking group.

Microsoft said in a statement that it was “reviewing the report and will take the necessary actions to protect our customers”.

Newspapers in English

Newspapers from Malta