Sunday Times (Sri Lanka)

When hackers tried to steal nearly $1 billion from Bangladesh’s central bank, the Federal Reserve Bank of New York failed to spot warning signs and nearly let all the money go. Here’s the inside story of what happened.

- By Krishna N. Das and Jonathan Spicer

DHAKA/NEW YORK (Reuter) – Jupiter. That single word, by a stroke of luck, helped stop the Federal Reserve Bank of New York from paying nearly $1 billion to the cyber-criminals behind a notorious bank heist earlier this year, according to sources familiar with the incident.

When hackers broke into the computers of Bangladesh’s central bank in February and sent fake payment orders, the Fed was tricked into paying out $101 million. But the losses could have been much higher had the name Jupiter not formed part of the address of a Philippine­s bank where the hackers sought to send hundreds of millions of dollars more. By chance, Jupiter was also the name of an oil tanker and a shipping company under United States’ sanctions against Iran. That sanctions listing triggered concerns at the New York Fed and spurred it to scrutinise the fake payment orders more closely, a Reuters examinatio­n of the incident has found.

It was a “total fluke” that the New York Fed did not pay out the $951 million requested by the hackers, said a person familiar with the Fed’s handling of the matter. There is no suggestion the oil tanker or shipping company was involved in the heist.

The Reuters examinatio­n has also found that the payment orders sent by the hackers were exceptiona­l in several ways. They were incorrectl­y formatted at first; they were mainly to individual­s; and they were very different from the usual run of payment requests from Bangladesh Bank. Yet it was the word Jupiter that set the loudest alarm bells ringing at the New York Fed. Even then it appeared to react slowly.

By the time the fraud was discovered, the New York branch of the U.S. central bank had approved five of the payments. It took $101 million from Bangladesh Bank and paid it to accounts in Sri Lanka and the Philippine­s – including $81 million to four accounts in the names of individual­s. Most of that $81 million remains lost.

It was among the most audacious cyber-heists ever to emerge – shining a light on worrying weaknesses in the global financial system and into a little-known corner of the U.S. Federal Reserve: its Central Bank and Internatio­nal Account Services unit (CBIAS), which one former employee described as a “bank within a bank.”

Interviews with investigat­ors, lawyers and current and former central bank officials in several countries, as well as a Reuters review of payment messages, emails and other documents, show disarray and bungling at all the financial institutio­ns involved. But the most striking is the inertia and clumsiness at the New York Fed, the most powerful of the U.S. central bank’s 12 regional units and a mainstay of global finance.

The heist revealed that the New York Fed lacked a system for spotting potential fraud in real time – even though such systems are used elsewhere – instead relying at times on checking payments after they were made, usually for problems such as violat- ing U.S. sanctions.

Months of bitter finger-pointing over who is to blame for the fiasco have damaged the sensitive diplomacy of correspond­ent banking, where big Western institutio­ns are entrusted with safeguardi­ng the treasures of smaller economies. Bangladesh Bank is now preparing a legal case to seek compensati­on for what it says were failures by the Fed, according to a source close to the Asian bank. It also claims that errors by SWIFT, a messaging system used to make internatio­nal bank transfers, made the bank vulnerable to hackers.

Bangladesh Bank spokesman Subhankar Saha said the institutio­ns were working together to try to recover the missing money. He declined to comment further.

The New York Fed has denied making missteps and repeatedly said its systems were not compromise­d. In response to a series of questions from Reuters about its actions during the heist and in the days that followed, it declined to comment, citing a criminal investigat­ion by the U.S. Department of Justice and the Federal Bureau of Investigat­ion.

SWIFT - the Society for Worldwide Interbank Financial Telecommun­ication, a cooperativ­e used by over 11,000 financial institutio­ns around the world - has denied responsibi­lity for any weaknesses in the way Bank Bangladesh operated and installed the SWIFT system. A spokesman said: “We continue to support the bank and cooperate with the investigat­ions. We look forward to receiving a full account of the security incident.”

Officials are still investigat­ing the heist. But the Reuters examinatio­n has uncovered new details about how the New York Fed was slow to react to warning signs and how communicat­ions broke down between it and Bangladesh Bank. The Fed relied almost entirely on the SWIFT messaging system with, in this case, little backup for emergencie­s. Miscommuni­cations and clunky payment processes meant that most of the stolen money disappeare­d without trace before it could be recovered.

“I couldn’t believe that that much money could be lost in the SWIFT system, and in the whole federal system for central banks,” Carolyn Maloney, a Democratic congresswo­man from New York, told Reuters. Maloney, who was the first U.S. lawmaker to publicly raise questions about the incident, added: “It’s a wake-up call and it has to be corrected. To me, I see it as a threat to the confidence people could have in the central banking system.”

Last month, the New York Fed said it took steps to “help strengthen the safety of global payments in light of the potential vulnerabil­ities.” It did not give specifics. But the source familiar with the Fed’s handling of the Bangladesh affair told Reuters that the Fed has now set up a 24-hour hotline for emergency calls from some 250 account holders, mostly central banks, around the world.

THE HACK

Unlike the Fed, the world’s most influentia­l central bank whose New York headquarte­rs sits atop 508,000 gold bars stored below street level, Bangladesh Bank is not a large and powerful operation with a global footprint.

It had not protected its computer system with a firewall, and it had used second-hand $10 electronic switches to network computers linked to the SWIFT global payment system, according to Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police’s criminal investigat­ion department. Hackers may have exploited such weaknesses after Bangladesh Bank connected a new electronic payment system, known as real time gross settlement (RTGS), in November last year. However, it remains unknown exactly who broke into its systems or how they did it.

Newspapers in English

Newspapers from Sri Lanka