How Hackers Executed One of the Biggest Bank Heists in History
A criminal complaint filed by the Department of Justice shed light on how North Korean hackers stole $81 million from a Bangladesh bank—and how enterprises can protect themselves from a similar fate.
September 11, 2018 at 10:00 AM
6 minute read
North Korean cybercriminals were behind one of the biggest bank heists in modern history. Only they didn't use firearms or force to steal bank funds. They used emails.
A criminal complaint filed by the U.S. Department of Justice in June 2018 and made public in September 2018 charged North Korean national Park Jin Hyok, who was part of the North Korea-sponsored hacking team called the “Lazarus Group,” in connection with the 2014 cyberattack on Sony and the 2017 WannaCry ransomware. It also tied Park and his team to the unprecedented 2016 theft of $81 million from a Bangladesh bank.
In meticulous technical detail, the complaint described how the cybercriminals were able to successfully steal tens of millions of dollars from the bank without being detected. Such an inside view of the cyber heist also provided unparalleled insight into how enterprises become compromised and how they can protect themselves from such threats in the future.
According to the complaint, the theft of $81 million was surreptitiously routed to bank accounts in the Philippines before being laundered through additional worldwide accounts. The theft occurred in February 2016, but the actual heist had begun much earlier, in October 2014, when cybercriminals tied to North Korea started sending out phishing emails to various banks in Bangladesh.
The emails sent from multiple email addresses were nearly identical. All purported to come from a man named “Rasel Ahlam,” a supposed job applicant who was hoping for an opportunity for a personal interview.
Attached to all emails was a link to a .zip file pretending to contain a résumé. In reality, it contained a link to malware that would automatically download to the recipient's computer and, subsequently, to their bank's computer network.
According to the complaint, which cites FBI forensic analysis, in early 2015 the cyberattackers “were successful in causing recipients” at the one Bangladesh bank to “download the payload from their spear-phishing emails.” While the complaint does not state what the payload was, it does note the hackers were able to install a backdoor—a malware that allows ongoing access to a compromised network—on the bank's IT systems.
Once inside, the hackers impersonated bank employees to access an internal application connected to the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network, which supports financial transactions between worldwide financial institutions.
The hackers then sent messages through SWIFT to the Federal Reserve Bank of New York, directing them to transfer funds from the Bangladesh bank's account to bank accounts in the Philippines. Afterward, the cybercriminals carefully covered their tracks, using another malware tool to prevent the generation of automatic SWIFT-related confirmations at the Bangladesh bank that would have alerted the staff to the fraudulent transfers.
While hijacking the SWIFT network took some expertise, getting into the bank's systems in the first place was a straightforward affair.
Indeed, while a simple and conventional hacking tool used to gain access to secure networks, phishing emails can be devastatingly effective. “Phishing is a horrendous problem, and it is a worldwide problem,” said Adam Levin, chairman and founder of identity and data protection company CyberScout.
Oftentimes, protecting against phishing emails is the first and best chance organizations has at ensuring their networks are safe. “Obviously it would be best if you could stop them at the perimeter—it's like if the moat worked for the castle,” Levin said.
But in order for a moat to work, organizations must approach cybersecurity in a holistic fashion. “It's one thing to throw money at technology; it's another thing to dedicate time and resources to employee training and to shifting the culture of the organization, not only in terms of people being aware of the threats but being aware of the kinds of phishing attacks” occurring today, Levin explained.
Still, investing in cybersecurity technology is important also for preventing the type of cyberattack that plagued the Bangladesh bank. Levin noted that protecting sensitive systems with proactive actions like two-factor authentication can limit the damage cyberattackers can do inside one's network.
“It's about layering your security … and having guards at the ready in the form of technology at different points of vulnerability,” he said.
To be sure, the North Korean cyberattackers targeted other financial institutions in addition to the Bangladesh bank. According to the complaint, the FBI was able to corroborate findings from the Russian cybersecurity company Group-IB, which linked North Korean cybercriminals to an early 2017 cyberattack on multiple banks in Poland.
In that situation, cybercriminals were able to infiltrate banks by using a “watering hole attack” by infecting the website of the Polish Financial Supervision Authority with malware, which then in turn infected any visitors to the site.
The complaint noted that additional watering hole attacks were executed against a bank in Mexico and one in South America and that both attacks had technical similarities to the ones in Poland.
While menacing, such attacks are a less common threat to today's enterprises. Migo Kedem, director of product management at cybersecurity company SentinelOne, noted that “watering hole attacks are more rare than spearphishing attacks, simply because they require exploits which are much more difficult to use.”
What's more, today's cybersecurity solutions will likely be able to detect malware on a website and prevent the user from accessing the site, he added.
Should companies get infected by malware in watering hole attacks, however, Levin said that layering one's security and limiting how much access each computer or mobile phone has to a network could prevent the malware from spreading. But he added that, when cyberattackers move to target various interconnected parts of the financial industry, what is also needed is industrywide cybersecurity cooperation.
“This is why there must be greater sharing of treat risk assessment,” he said. “It's an ecosystem, and everybody is part of that ecosystem.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1The Importance of Plaintiffs Not Letting Defendants Dictate Settlement Tax Strategies
- 2A New State Law Is a Positive Step Forward for Judicial Security in Pennsylvania—But More Action Is Needed
- 3Does the FAAAA Preempt State Negligence Claims Against Freight Brokers?
- 4People in the News—Nov. 14, 2024—Cummins, McNees
- 5County Reps: Appeal Likely Following State Court's Sales Tax Ruling for Retail Marijuana
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250