SlideShare a Scribd company logo
1 of 4
Download to read offline
T Share > Author alerts = Print / Clip 6 Gift Article  Comments
Last updated: May 13, 2016 6:01 pm
Martin Arnold in London
Experts said on Friday that a Vietnamese bank was recently robbed by cyber criminals, using similar
methods to this year s record digital theft at the Bangladesh central bank and a 2014 data breach at
Sony.
A spokesperson for Swift, the main group providing interbank transfer messages, said hackers
bypassed risk controls at the unnamed bank to transfer undisclosed sums of money illegally.
The location of the bank in Vietnam was revealed by a researcher at the cyber security unit of BAE
Systems, the UK-based defence contractor, writing in a blog published on Friday.
Click here to try our new website you can come back at any time
Vietnamese bank hit by cyber heist
©Reuters
1
The researcher said the hacker s techniques mirrored those used to steal vast amounts of client data
from Sony, the Japanese entertainment group, an attack initially blamed on North Korea.
Swift said in a statement to clients seen by the FT that the attackers clearly exhibit a deep and
sophisticated knowledge of specific operational controls within the targeted banks knowledge that
may have been gained from malicious insiders or cyber attacks, or a combination of both .
The Brussels-based company warned of a wider and highly adaptive campaign targeting banks .
The Vietnamese bank whose nationality was not disclosed by Swift
was attacked before the Bangladesh central bank and only told the payments group in recent
weeks.
Swift urged clients to urgently review controls in their payments environments, to all their
messaging, payments and e-banking channels .
It added: The security and integrity of our messaging services are not in question as a result of the
incidents.
Adrian Nish, head of BAE s cyber threat intelligence team, told the FT: We found malware code on
an online analysis site that is very similar to the one used in the Bangladesh attack. The malware was
submitted from Vietnam and has details of a Vietnamese commercial bank.
BAE cited strong links for the same coder being behind the recent bank heist cases and a wider
known campaign stretching back almost a decade .
After Sony Pictures Entertainment s network was virtually shut down by malware, the Federal
Bureau of Investigation said it had found evidence linking the North Koreans to the attack. Some
security experts later cast doubt on the FBI s claim that North Korea was to blame, suggesting the
attack may have been an inside job.
Richard Turner, head of Europe at FireEye, the cyber security consultants carrying out an audit of
the Bangladesh attack, said: What would North Korea want with the money? Nation states in our
experience tend not to steal money directly. This looks like financial crime.
Swift, which has about 11,000 banks as customers, is a global messaging network used by banks and
other financial institutions to send payment instructions and has become a vital part of the global
payments architecture. The company, which processes 25m messages a day for billions of dollars
worth of transfers, has faced doubts about its vulnerability after the raid on the Bangladesh central
bank in February.
In an audacious weekend raid that sent tremors through the world s financial and commercial
banks, hackers sent 35 fake orders from Bangladesh Bank via Swift to the central bank s account at
the Federal Reserve in New York.
Cyber Security
T Share > Author alerts = Print / Clip 6 Gift Article  Comments
Pop and propaganda in
Pyongyang
FirstFT - Brazil anti-corruption
pledge, Trump and Ryan get
closer
Brexit breakdown: Cameron
ups fear factor
VIDEOS
The transfers totalled $951m but the thieves made off with only $81m making it one of the world s
top 10 bank thefts. The money was sent in four batches to accounts in the Philippines.
Mr Nish at BAE said: This attacker is very adaptive, they will fit their code to adapt to the individual
circumstances of each case.
He urged banks to follow the lead of military and state organisations that have tightened security on
confidential IT networks by isolating them from high-risk networks more freely connected to the
wider internet.
Harry Newman, head of European market initiatives at Swift, said: We can create a network control
ability but it is up to the banks to create the network control strategy.
rinted ro http://www.ft.com/cms/s/0/bb358318-188c-11e6-b197-a4af20d5575e.html
Print a single copy of this article for personal use. Contact us if you wish to print more to distribute to others.
© THE FINANCIAL TIMES LTD 2016 FT and Financial Times are trademarks of The Financial Times Ltd.

More Related Content

What's hot

What's hot (20)

Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
 
Jon handout 3
Jon handout 3Jon handout 3
Jon handout 3
 
Jon handout 2
Jon handout 2Jon handout 2
Jon handout 2
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Insecure mag-33
Insecure mag-33Insecure mag-33
Insecure mag-33
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
My presentation
My presentationMy presentation
My presentation
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDA LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Risk analytics to fight fraud - cio applications europe
Risk analytics to fight fraud  - cio applications europeRisk analytics to fight fraud  - cio applications europe
Risk analytics to fight fraud - cio applications europe
 

Similar to Viet bankhacked ft

TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
erlindaw
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
Beza Belayneh
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
smile790243
 

Similar to Viet bankhacked ft (20)

TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogThe financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlog
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Top 5 cyber crimes of 2014
Top 5 cyber crimes of 2014Top 5 cyber crimes of 2014
Top 5 cyber crimes of 2014
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech TalentRansomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Threatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdfThreatsploit-Adversary-Report-August-2022.pdf
Threatsploit-Adversary-Report-August-2022.pdf
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 

Recently uploaded

Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdfForbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
UK Journal
 

Recently uploaded (8)

Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Musina
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In MusinaTop^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Musina
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Musina
 
19052024_First India Newspaper Jaipur.pdf
19052024_First India Newspaper Jaipur.pdf19052024_First India Newspaper Jaipur.pdf
19052024_First India Newspaper Jaipur.pdf
 
Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdfForbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
 
Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdf
 
13052024_First India Newspaper Jaipur.pdf
13052024_First India Newspaper Jaipur.pdf13052024_First India Newspaper Jaipur.pdf
13052024_First India Newspaper Jaipur.pdf
 
Analyzing Nepal's Third Investment Summit.pdf
Analyzing Nepal's Third Investment Summit.pdfAnalyzing Nepal's Third Investment Summit.pdf
Analyzing Nepal's Third Investment Summit.pdf
 
Decentralisation and local government in India
Decentralisation and local government in IndiaDecentralisation and local government in India
Decentralisation and local government in India
 
Press-Information-Bureau-14-given-citizenship.pdf
Press-Information-Bureau-14-given-citizenship.pdfPress-Information-Bureau-14-given-citizenship.pdf
Press-Information-Bureau-14-given-citizenship.pdf
 

Viet bankhacked ft

  • 1. T Share > Author alerts = Print / Clip 6 Gift Article Comments Last updated: May 13, 2016 6:01 pm Martin Arnold in London Experts said on Friday that a Vietnamese bank was recently robbed by cyber criminals, using similar methods to this year s record digital theft at the Bangladesh central bank and a 2014 data breach at Sony. A spokesperson for Swift, the main group providing interbank transfer messages, said hackers bypassed risk controls at the unnamed bank to transfer undisclosed sums of money illegally. The location of the bank in Vietnam was revealed by a researcher at the cyber security unit of BAE Systems, the UK-based defence contractor, writing in a blog published on Friday. Click here to try our new website you can come back at any time Vietnamese bank hit by cyber heist ©Reuters 1
  • 2. The researcher said the hacker s techniques mirrored those used to steal vast amounts of client data from Sony, the Japanese entertainment group, an attack initially blamed on North Korea. Swift said in a statement to clients seen by the FT that the attackers clearly exhibit a deep and sophisticated knowledge of specific operational controls within the targeted banks knowledge that may have been gained from malicious insiders or cyber attacks, or a combination of both . The Brussels-based company warned of a wider and highly adaptive campaign targeting banks . The Vietnamese bank whose nationality was not disclosed by Swift was attacked before the Bangladesh central bank and only told the payments group in recent weeks. Swift urged clients to urgently review controls in their payments environments, to all their messaging, payments and e-banking channels . It added: The security and integrity of our messaging services are not in question as a result of the incidents. Adrian Nish, head of BAE s cyber threat intelligence team, told the FT: We found malware code on an online analysis site that is very similar to the one used in the Bangladesh attack. The malware was submitted from Vietnam and has details of a Vietnamese commercial bank. BAE cited strong links for the same coder being behind the recent bank heist cases and a wider known campaign stretching back almost a decade . After Sony Pictures Entertainment s network was virtually shut down by malware, the Federal Bureau of Investigation said it had found evidence linking the North Koreans to the attack. Some security experts later cast doubt on the FBI s claim that North Korea was to blame, suggesting the attack may have been an inside job. Richard Turner, head of Europe at FireEye, the cyber security consultants carrying out an audit of the Bangladesh attack, said: What would North Korea want with the money? Nation states in our experience tend not to steal money directly. This looks like financial crime. Swift, which has about 11,000 banks as customers, is a global messaging network used by banks and other financial institutions to send payment instructions and has become a vital part of the global payments architecture. The company, which processes 25m messages a day for billions of dollars worth of transfers, has faced doubts about its vulnerability after the raid on the Bangladesh central bank in February. In an audacious weekend raid that sent tremors through the world s financial and commercial banks, hackers sent 35 fake orders from Bangladesh Bank via Swift to the central bank s account at the Federal Reserve in New York.
  • 3. Cyber Security T Share > Author alerts = Print / Clip 6 Gift Article Comments Pop and propaganda in Pyongyang FirstFT - Brazil anti-corruption pledge, Trump and Ryan get closer Brexit breakdown: Cameron ups fear factor VIDEOS The transfers totalled $951m but the thieves made off with only $81m making it one of the world s top 10 bank thefts. The money was sent in four batches to accounts in the Philippines. Mr Nish at BAE said: This attacker is very adaptive, they will fit their code to adapt to the individual circumstances of each case. He urged banks to follow the lead of military and state organisations that have tightened security on confidential IT networks by isolating them from high-risk networks more freely connected to the wider internet. Harry Newman, head of European market initiatives at Swift, said: We can create a network control ability but it is up to the banks to create the network control strategy.
  • 4. rinted ro http://www.ft.com/cms/s/0/bb358318-188c-11e6-b197-a4af20d5575e.html Print a single copy of this article for personal use. Contact us if you wish to print more to distribute to others. © THE FINANCIAL TIMES LTD 2016 FT and Financial Times are trademarks of The Financial Times Ltd.