SlideShare a Scribd company logo
Bangladesh Bank
Heist
Mohammed Jaseem
Agenda
1. Abstract
2. Introduction
3. Case Presentation
4. Discussion
5. References
10-03-2021 CPT Case Study 2
Abstract
The Bangladeshian bank heist was a series of unauthorized
transactions made on an official computer of the central bank of
Bangladesh. The transactions were made using SWIFT system
to deliver the money in different accounts in Sri Lanka and
Philippines. The amount of money under the theft was nearly
$1 Billion, but most of the payment orders were blocked and
there have been some successful attempts to recover some
assets. Currently the origin of the attack has been connected to
the hacker group Lazarus and North Korea.
3
Introduction
As cyberspace has become an embedded element of contemporary
society, also banks have become vulnerable against cyber attacks.
Financial transactions all over the world are conducted digitally via
computer networks and banks are struggling with security issues in the
never-ending race against malicious hacker groups. Banks have
traditionally been perceived as trustworthy actors when it comes to
cyber security, but history knows multiple cases of successful cyber
attacks against banks. These successful and devastating attacks have
also lead to growing fear of cyber attacks amongst banks (Schuetze,
2016; Kuepper, 2017).
4
11-03-2020 CPT Case Study
Case Presentation Timeline of the
attack
Timeline of the attack
• The first initiatives for the Bangladeshian bank attack were made
in May 2015
• when four bank accounts were opened in Philippine bank for being
ready to future transactions. All of the accounts were not used until
the day of attack and were clearly established for attack only.
• The first problem in the audit process was made as none of these
accounts or their owners was authenticated in the process to
either check the validity of their owners or transactions.
11-03-2020
CPT Case Study 6
Timeline of the attack
• During the opening of a bank account this kind of procedure is not
unusual, but the bursts occurred in February 2016, should have
triggered actions in safe audit procedures.
• The breach to the Bangladesh Bank was made in January, 2016
• The access to bank’s servers made possible the breach to SWIFT
network and inject malware to it as it was not separated from other
parts.
11-03-2020
CPT Case Study 7
Timeline of the attack
• It is very likely that the attackers also installed a keylogger to get
the passwords for authorizing the transactions
• The target of the attack was the SWIFT Alliance Access software,
which is used widely in the banks around the world
• The attack itself was started in February, 4 in 2016 by making 35
payment instructions worth of $951M to Federal Reserve Bank
11-03-2020
CPT Case Study 8
Timeline of the attack
• The first five of the transactions were completed, but the
remaining were successfully blocked partly because of the
failures made by the attackers.
• The targets of the payments were in the Philippines and Sri
Lanka worth of about $100M.
• The unauthorized messages were notified in the Bangladesh
bank during the February 8
11-03-2020
CPT Case Study 9
Case Presentation Detection
Detection
• Guardian (2016b) reported that a bank heist worth almost 1
billion US dollars had been averted
• thanks to a spelling mistake in the payment transaction,
which prevented the automatic system from completing the
transaction
• As a result, Deutsche Bank had flagged the transaction as
suspect
11-03-2020 CPT Case Study 11
Detection
• Nevertheless, as the transaction had been approved by the
Fed, it was forwarded to Sri Lanka. There, the transaction
was caught by a banking official in the receiving bank as the
transfer was unusually large for Sri Lanka
• Before clearing the transfer, the Sri Lankan official had
contacted Deutsche Bank, which responded that the transfer
is indeed suspect.
11-03-2020 CPT Case Study 12
Detection
• As the recipient turned out to be a fake entity, the bank was able to
freeze the funds and ultimately return them to the originating bank
• Out of the reported total sum $870m of all transactions, the attackers
managed to transfer only $81m
• Fed alerted the central bank of Bangladesh after detecting that the
number of transfers to non-banking entities had surged. Without the
spelling mistake and the diligent work of banking officials, the attackers
could have got away with a way more substantial sum of money after
successfully inserting the forged transactions to the SWIFT network.
11-03-2020 CPT Case Study 13
Case Presentation Identity of the
attacker
Identity of the attacker
• the attacker did try to remove any evidence from the bank’s
systems, Kaspersky (2017a) managed to access some of the
data through backups of the systems
• The recovered files indicate, that the techniques and tools
used in the attack can be linked to a group known as
Lazarus.
11-03-2020
CPT Case Study 15
Identity of the attacker
• Kaspersky summarizes the activities of the Lazarus group as
follows:
“It’s malware has been found in many serious cyberattacks, such as the
massive data leak and file wiper attack on Sony Pictures Entertainment in 2014;
the cyberespionage campaign in South Korea, dubbed Operation Troy, in 2013;
and Operation DarkSeoul, which attacked South Korean media and financial
companies in 2013.”
11-03-2020
CPT Case Study 16
Identity of the attacker
• malware is identical to the malware used in the some of the
incidents mentioned above.
• Even though parts of the code have been modified, probably
in order change the signature of the malware and avoid
detection by automated traffic analyzing tools, the malware
samples from different incidents share some obscure
techniques
11-03-2020 CPT Case Study 17
Identity of the attacker
• which suggests that payload used in both attacks could come
from the same author or group.
• One of the obscure techniques found by Kaspersky (2017a)
is the complete rewrite of file contents and renaming the file
before deletion. Rewriting the file content, possibly multiple
times, is commonly used to try to remove the data from the
physical device and hinder forensic data recovery attempts.
11-03-2020
CPT Case Study 18
Identity of the attacker
• However, when combing through logs of a more recent
incident linked to the Lazarus group, Kaspersky (2017b)
found a link to the North Korea
• While criminals usually mask their real location and IP
addresses by using VPN services and proxies, the server
logs of a seized Command & Control server indicated, that
the server had been accessed once from a North Korean IP
address.
11-03-2020 CPT Case Study 19
Identity of the attacker
• While IP address is not really a solid evidence for North
Korea’s involvement in the group’s activities, it is nevertheless
compelling to consider, that the connection could indeed
originate from the operator’s real IP address
• It is entirely possible, that either human error or
misconfiguration has lead some of the operator’s network
traffic to be routed directly to the host instead of being routed
through a network of proxies and VPNs.
11-03-2020 CPT Case Study 20
Discussion conclusion
Conclusion
• In addition to the monetary loss of $81m, the incident severely harmed
the trust in the IT systems of the global banking sector
• The SWIFT’s model seems to have failed to provide a layered security
approach, which allowed the attackers to exploit the system without
compromising the core servers of the SWIFT network
• SWIFT has taken action and warned the member banks about the
growing threat against the financial network, but the potential scale of
damage presented in the Bangladesh Central Bank case calls for more
concrete measures of system-level revision of the financial network
11-03-2020 CPT Case Study 22
Conclusion
• The weekend protocols also should be considered as a
vulnerability in banking sector
• The success of the heist was mostly relying on timing during
weekend: the lack of sufficient monitoring and means of
communication during weekend made it possible that the
unauthorized transactions were noticed not until four days
after the attack
11-03-2020 CPT Case Study 23
Conclusion
• Kaspersky however as a Russian company has also pointed
North Korea’s possible involvement in the bank heists
conducted by Lazarus. Whoever or whatever organization
was eventually behind the bank heist, the most important
thing is to focus on revisioning and enhancing the
cybersecurity of financial messaging networks and the
cybersecurity strategies of individual banks.
11-03-2020 CPT Case Study 24
“Unless and until our society recognizes
cyber bullying for what it is, the suffering
of thousands of silent victims will
continue”
Anna Maria Chavez
11-03-2020 CPT Case Study 25
Thank you
Mohammed Jaseem
Jaseem@relicstudio.dev
www.jaseem.tech
11-03-2020 CPT Case Study 26

More Related Content

What's hot

Fintech
FintechFintech
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIsAPIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
Jeremy Brown
 
Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation
WSO2
 
Fighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial IntelligenceFighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial Intelligence
DataWorks Summit
 
Bitcoin
BitcoinBitcoin
Bitcoin
vishav preet
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Machine Learning in Banking Sector
Machine Learning in Banking SectorMachine Learning in Banking Sector
Machine Learning in Banking Sector
Knoldus Inc.
 
Artificial intelligence in financial sector
Artificial intelligence in financial sectorArtificial intelligence in financial sector
Artificial intelligence in financial sector
Jacobsons Direct Marketing Services LLC.
 
Blockchain in Finance
Blockchain in FinanceBlockchain in Finance
Blockchain in Finance
101 Blockchains
 
Banking as a Service - An Overview
Banking as a Service - An OverviewBanking as a Service - An Overview
Banking as a Service - An Overview
Srini Peyyalamitta
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
Sabrina Kirrane
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
Fintech Overview and Growth Drivers
Fintech Overview and Growth DriversFintech Overview and Growth Drivers
Fintech Overview and Growth Drivers
Ratnakar Pandey
 
Cryptocurrencies and AML
Cryptocurrencies and AMLCryptocurrencies and AML
Cryptocurrencies and AML
Minerva
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering Besart Qerimi
 
Banking as a Service (download)
Banking as a Service (download)Banking as a Service (download)
Banking as a Service (download)
Chris Skinner
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
Capgemini
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
John Owens
 
Overview of Digital Financial Services Landscape
Overview of Digital Financial Services LandscapeOverview of Digital Financial Services Landscape
Overview of Digital Financial Services Landscape
John Owens
 
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformable
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformableapidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformable
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformable
apidays
 

What's hot (20)

Fintech
FintechFintech
Fintech
 
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIsAPIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIs
 
Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation Open Banking - Opening the door to Digital Transformation
Open Banking - Opening the door to Digital Transformation
 
Fighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial IntelligenceFighting Financial Crime with Artificial Intelligence
Fighting Financial Crime with Artificial Intelligence
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Machine Learning in Banking Sector
Machine Learning in Banking SectorMachine Learning in Banking Sector
Machine Learning in Banking Sector
 
Artificial intelligence in financial sector
Artificial intelligence in financial sectorArtificial intelligence in financial sector
Artificial intelligence in financial sector
 
Blockchain in Finance
Blockchain in FinanceBlockchain in Finance
Blockchain in Finance
 
Banking as a Service - An Overview
Banking as a Service - An OverviewBanking as a Service - An Overview
Banking as a Service - An Overview
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
Fintech Overview and Growth Drivers
Fintech Overview and Growth DriversFintech Overview and Growth Drivers
Fintech Overview and Growth Drivers
 
Cryptocurrencies and AML
Cryptocurrencies and AMLCryptocurrencies and AML
Cryptocurrencies and AML
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering
 
Banking as a Service (download)
Banking as a Service (download)Banking as a Service (download)
Banking as a Service (download)
 
Retail Banking Trends book 2022
Retail Banking Trends book 2022Retail Banking Trends book 2022
Retail Banking Trends book 2022
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
 
Overview of Digital Financial Services Landscape
Overview of Digital Financial Services LandscapeOverview of Digital Financial Services Landscape
Overview of Digital Financial Services Landscape
 
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformable
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformableapidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformable
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformable
 

Similar to Bangladesh bank heist case study!

Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
AmineRached2
 
Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?
Easy Solutions Inc
 
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
Ajay Alex
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
Jay McLaughlin
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
Panda Security
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
TI Safe
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
Ulf Mattsson
 
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docx
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docxFrancophoned – A Sophisticated Social Engineering AttackBy Syma.docx
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docx
budbarber38650
 
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
Neo4j
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
gppcpa
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Dr. Amarjeet Singh
 
Blockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction MonitoringBlockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction Monitoring
Floyd DCosta
 
B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)
B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)
B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)
Kullarat Phongsathaporn
 

Similar to Bangladesh bank heist case study! (20)

Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
 
Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?
 
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docx
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docxFrancophoned – A Sophisticated Social Engineering AttackBy Syma.docx
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docx
 
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
8. cyber51-case-studies
8. cyber51-case-studies8. cyber51-case-studies
8. cyber51-case-studies
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
Blockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction MonitoringBlockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction Monitoring
 
B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)
B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)
B20: AMLO | FinTecha and New Technologies: AML/CTF Perspectives (5 Jul 2017)
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Bangladesh bank heist case study!

  • 2. Agenda 1. Abstract 2. Introduction 3. Case Presentation 4. Discussion 5. References 10-03-2021 CPT Case Study 2
  • 3. Abstract The Bangladeshian bank heist was a series of unauthorized transactions made on an official computer of the central bank of Bangladesh. The transactions were made using SWIFT system to deliver the money in different accounts in Sri Lanka and Philippines. The amount of money under the theft was nearly $1 Billion, but most of the payment orders were blocked and there have been some successful attempts to recover some assets. Currently the origin of the attack has been connected to the hacker group Lazarus and North Korea. 3
  • 4. Introduction As cyberspace has become an embedded element of contemporary society, also banks have become vulnerable against cyber attacks. Financial transactions all over the world are conducted digitally via computer networks and banks are struggling with security issues in the never-ending race against malicious hacker groups. Banks have traditionally been perceived as trustworthy actors when it comes to cyber security, but history knows multiple cases of successful cyber attacks against banks. These successful and devastating attacks have also lead to growing fear of cyber attacks amongst banks (Schuetze, 2016; Kuepper, 2017). 4 11-03-2020 CPT Case Study
  • 6. Timeline of the attack • The first initiatives for the Bangladeshian bank attack were made in May 2015 • when four bank accounts were opened in Philippine bank for being ready to future transactions. All of the accounts were not used until the day of attack and were clearly established for attack only. • The first problem in the audit process was made as none of these accounts or their owners was authenticated in the process to either check the validity of their owners or transactions. 11-03-2020 CPT Case Study 6
  • 7. Timeline of the attack • During the opening of a bank account this kind of procedure is not unusual, but the bursts occurred in February 2016, should have triggered actions in safe audit procedures. • The breach to the Bangladesh Bank was made in January, 2016 • The access to bank’s servers made possible the breach to SWIFT network and inject malware to it as it was not separated from other parts. 11-03-2020 CPT Case Study 7
  • 8. Timeline of the attack • It is very likely that the attackers also installed a keylogger to get the passwords for authorizing the transactions • The target of the attack was the SWIFT Alliance Access software, which is used widely in the banks around the world • The attack itself was started in February, 4 in 2016 by making 35 payment instructions worth of $951M to Federal Reserve Bank 11-03-2020 CPT Case Study 8
  • 9. Timeline of the attack • The first five of the transactions were completed, but the remaining were successfully blocked partly because of the failures made by the attackers. • The targets of the payments were in the Philippines and Sri Lanka worth of about $100M. • The unauthorized messages were notified in the Bangladesh bank during the February 8 11-03-2020 CPT Case Study 9
  • 11. Detection • Guardian (2016b) reported that a bank heist worth almost 1 billion US dollars had been averted • thanks to a spelling mistake in the payment transaction, which prevented the automatic system from completing the transaction • As a result, Deutsche Bank had flagged the transaction as suspect 11-03-2020 CPT Case Study 11
  • 12. Detection • Nevertheless, as the transaction had been approved by the Fed, it was forwarded to Sri Lanka. There, the transaction was caught by a banking official in the receiving bank as the transfer was unusually large for Sri Lanka • Before clearing the transfer, the Sri Lankan official had contacted Deutsche Bank, which responded that the transfer is indeed suspect. 11-03-2020 CPT Case Study 12
  • 13. Detection • As the recipient turned out to be a fake entity, the bank was able to freeze the funds and ultimately return them to the originating bank • Out of the reported total sum $870m of all transactions, the attackers managed to transfer only $81m • Fed alerted the central bank of Bangladesh after detecting that the number of transfers to non-banking entities had surged. Without the spelling mistake and the diligent work of banking officials, the attackers could have got away with a way more substantial sum of money after successfully inserting the forged transactions to the SWIFT network. 11-03-2020 CPT Case Study 13
  • 14. Case Presentation Identity of the attacker
  • 15. Identity of the attacker • the attacker did try to remove any evidence from the bank’s systems, Kaspersky (2017a) managed to access some of the data through backups of the systems • The recovered files indicate, that the techniques and tools used in the attack can be linked to a group known as Lazarus. 11-03-2020 CPT Case Study 15
  • 16. Identity of the attacker • Kaspersky summarizes the activities of the Lazarus group as follows: “It’s malware has been found in many serious cyberattacks, such as the massive data leak and file wiper attack on Sony Pictures Entertainment in 2014; the cyberespionage campaign in South Korea, dubbed Operation Troy, in 2013; and Operation DarkSeoul, which attacked South Korean media and financial companies in 2013.” 11-03-2020 CPT Case Study 16
  • 17. Identity of the attacker • malware is identical to the malware used in the some of the incidents mentioned above. • Even though parts of the code have been modified, probably in order change the signature of the malware and avoid detection by automated traffic analyzing tools, the malware samples from different incidents share some obscure techniques 11-03-2020 CPT Case Study 17
  • 18. Identity of the attacker • which suggests that payload used in both attacks could come from the same author or group. • One of the obscure techniques found by Kaspersky (2017a) is the complete rewrite of file contents and renaming the file before deletion. Rewriting the file content, possibly multiple times, is commonly used to try to remove the data from the physical device and hinder forensic data recovery attempts. 11-03-2020 CPT Case Study 18
  • 19. Identity of the attacker • However, when combing through logs of a more recent incident linked to the Lazarus group, Kaspersky (2017b) found a link to the North Korea • While criminals usually mask their real location and IP addresses by using VPN services and proxies, the server logs of a seized Command & Control server indicated, that the server had been accessed once from a North Korean IP address. 11-03-2020 CPT Case Study 19
  • 20. Identity of the attacker • While IP address is not really a solid evidence for North Korea’s involvement in the group’s activities, it is nevertheless compelling to consider, that the connection could indeed originate from the operator’s real IP address • It is entirely possible, that either human error or misconfiguration has lead some of the operator’s network traffic to be routed directly to the host instead of being routed through a network of proxies and VPNs. 11-03-2020 CPT Case Study 20
  • 22. Conclusion • In addition to the monetary loss of $81m, the incident severely harmed the trust in the IT systems of the global banking sector • The SWIFT’s model seems to have failed to provide a layered security approach, which allowed the attackers to exploit the system without compromising the core servers of the SWIFT network • SWIFT has taken action and warned the member banks about the growing threat against the financial network, but the potential scale of damage presented in the Bangladesh Central Bank case calls for more concrete measures of system-level revision of the financial network 11-03-2020 CPT Case Study 22
  • 23. Conclusion • The weekend protocols also should be considered as a vulnerability in banking sector • The success of the heist was mostly relying on timing during weekend: the lack of sufficient monitoring and means of communication during weekend made it possible that the unauthorized transactions were noticed not until four days after the attack 11-03-2020 CPT Case Study 23
  • 24. Conclusion • Kaspersky however as a Russian company has also pointed North Korea’s possible involvement in the bank heists conducted by Lazarus. Whoever or whatever organization was eventually behind the bank heist, the most important thing is to focus on revisioning and enhancing the cybersecurity of financial messaging networks and the cybersecurity strategies of individual banks. 11-03-2020 CPT Case Study 24
  • 25. “Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue” Anna Maria Chavez 11-03-2020 CPT Case Study 25

Editor's Notes

  1. ID=d924773e-9a16-4d6d-9803-8cb819e99682 Recipe=text_billboard Type=TextOnly Variant=0 FamilyID=AccentBoxWalbaum_Zero