How Hackers Executed One of the Biggest Bank Heists in History
A criminal complaint filed by the Department of Justice shed light on how North Korean hackers stole $81 million from a Bangladesh bank—and how enterprises can protect themselves from a similar fate.
September 11, 2018 at 10:00 AM
6 minute read
(Photo: Shutterstock)
North Korean cybercriminals were behind one of the biggest bank heists in modern history. Only they didn't use firearms or force to steal bank funds. They used emails.
A criminal complaint filed by the U.S. Department of Justice in June 2018 and made public in September 2018 charged North Korean national Park Jin Hyok, who was part of the North Korea-sponsored hacking team called the “Lazarus Group,” in connection with the 2014 cyberattack on Sony and the 2017 WannaCry ransomware. It also tied Park and his team to the unprecedented 2016 theft of $81 million from a Bangladesh bank.
In meticulous technical detail, the complaint described how the cybercriminals were able to successfully steal tens of millions of dollars from the bank without being detected. Such an inside view of the cyber heist also provided unparalleled insight into how enterprises become compromised and how they can protect themselves from such threats in the future.
According to the complaint, the theft of $81 million was surreptitiously routed to bank accounts in the Philippines before being laundered through additional worldwide accounts. The theft occurred in February 2016, but the actual heist had begun much earlier, in October 2014, when cybercriminals tied to North Korea started sending out phishing emails to various banks in Bangladesh.
The emails sent from multiple email addresses were nearly identical. All purported to come from a man named “Rasel Ahlam,” a supposed job applicant who was hoping for an opportunity for a personal interview.
Attached to all emails was a link to a .zip file pretending to contain a résumé. In reality, it contained a link to malware that would automatically download to the recipient's computer and, subsequently, to their bank's computer network.
According to the complaint, which cites FBI forensic analysis, in early 2015 the cyberattackers “were successful in causing recipients” at the one Bangladesh bank to “download the payload from their spear-phishing emails.” While the complaint does not state what the payload was, it does note the hackers were able to install a backdoor—a malware that allows ongoing access to a compromised network—on the bank's IT systems.
Once inside, the hackers impersonated bank employees to access an internal application connected to the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network, which supports financial transactions between worldwide financial institutions.
The hackers then sent messages through SWIFT to the Federal Reserve Bank of New York, directing them to transfer funds from the Bangladesh bank's account to bank accounts in the Philippines. Afterward, the cybercriminals carefully covered their tracks, using another malware tool to prevent the generation of automatic SWIFT-related confirmations at the Bangladesh bank that would have alerted the staff to the fraudulent transfers.
While hijacking the SWIFT network took some expertise, getting into the bank's systems in the first place was a straightforward affair.
Indeed, while a simple and conventional hacking tool used to gain access to secure networks, phishing emails can be devastatingly effective. “Phishing is a horrendous problem, and it is a worldwide problem,” said Adam Levin, chairman and founder of identity and data protection company CyberScout.
Oftentimes, protecting against phishing emails is the first and best chance organizations has at ensuring their networks are safe. “Obviously it would be best if you could stop them at the perimeter—it's like if the moat worked for the castle,” Levin said.
But in order for a moat to work, organizations must approach cybersecurity in a holistic fashion. “It's one thing to throw money at technology; it's another thing to dedicate time and resources to employee training and to shifting the culture of the organization, not only in terms of people being aware of the threats but being aware of the kinds of phishing attacks” occurring today, Levin explained.
Still, investing in cybersecurity technology is important also for preventing the type of cyberattack that plagued the Bangladesh bank. Levin noted that protecting sensitive systems with proactive actions like two-factor authentication can limit the damage cyberattackers can do inside one's network.
“It's about layering your security … and having guards at the ready in the form of technology at different points of vulnerability,” he said.
To be sure, the North Korean cyberattackers targeted other financial institutions in addition to the Bangladesh bank. According to the complaint, the FBI was able to corroborate findings from the Russian cybersecurity company Group-IB, which linked North Korean cybercriminals to an early 2017 cyberattack on multiple banks in Poland.
In that situation, cybercriminals were able to infiltrate banks by using a “watering hole attack” by infecting the website of the Polish Financial Supervision Authority with malware, which then in turn infected any visitors to the site.
The complaint noted that additional watering hole attacks were executed against a bank in Mexico and one in South America and that both attacks had technical similarities to the ones in Poland.
While menacing, such attacks are a less common threat to today's enterprises. Migo Kedem, director of product management at cybersecurity company SentinelOne, noted that “watering hole attacks are more rare than spearphishing attacks, simply because they require exploits which are much more difficult to use.”
What's more, today's cybersecurity solutions will likely be able to detect malware on a website and prevent the user from accessing the site, he added.
Should companies get infected by malware in watering hole attacks, however, Levin said that layering one's security and limiting how much access each computer or mobile phone has to a network could prevent the malware from spreading. But he added that, when cyberattackers move to target various interconnected parts of the financial industry, what is also needed is industrywide cybersecurity cooperation.
“This is why there must be greater sharing of treat risk assessment,” he said. “It's an ecosystem, and everybody is part of that ecosystem.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1Eliminating Judicial Exceptions: The Promise of the Patent Eligibility Restoration Act
- 2AI in Legal: Disruptive Potential and Practical Realities
- 3One Court’s Opinion on Successfully Bankruptcy Proofing a Borrower
- 4Making the Case for Workflow Automation
- 5Copyright Infringement by Generative AI Tools Under US and UK Law: Common Threads and Contrasting Approaches
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250