SlideShare a Scribd company logo
1 of 5
http://www.therecord.com/news/business/article/932780--law-enforcement-
agencies-grappling-with-spike-in-multi-million-dollar-cyber-scams
LONDON — International law enforcement agencies say the recent $45-million dollar ATM
heist is just one of many scams they’re fighting in an unprecedented wave of
sophisticated cyberattacks. Old-school robberies by masked criminals are being eclipsed
by stealth multimillion dollar cybercrime operations which are catching companies and
investigators by surprise.
“We are seeing an unprecedented number of cyberscams that include phishing for
financial data, viruses, credit card fraud and others,” Marcin Skowronek, an investigator
at Europol’s European Cybercrime Center in The Hague said on Saturday. “In Europe, we
are generally quite well protected against some types of fraud because of the chip and pin
technology we use, but there are still shops and machines around the world who still take
cards without chips. And the most popular destinations for this type of fraud are the
United States and the Dominican Republic.”
U.S. Investigators said Thursday a gang hit cash machines in 27 countries in two attacks —
the first netting $5 million in December and then $40 million in February in a 10-hour
spree that involved about 36,000 transactions. Hackers got into bank databases,
eliminated withdrawal limits on prepaid debit cards and created access codes. Others
loaded that data onto any plastic card — even a hotel keycard — with a magnetic stripe
A similar scam yielded some 50 arrests this year in Europe during a joint police operation
between Romanian police and Europol, Skowronek said.
The operation took more than a year, involved some 400 police officers across Europe
and required work comparing bank losses to illegal transactions and then cross-
referencing suspects, said Skowronek, who said many national police forces were
beefing up their undercover work in the cyberworld to catch criminals.
Investigators found illegal workshops for producing devices and software to manipulate
point-of-sale terminals. Illegal electronic equipment, financial data, cloned cards and
cash were seized in raids in Britain and Romania. The group stole credit and debit card
numbers and PIN codes by implanting card reading devices and malicious software on
point-of-sale terminals. The criminals then used counterfeit payment cards with stolen
data for further illegal transactions in countries that included Argentina, Colombia, the
Dominican Republic, Japan, Mexico, South Korea, Sri Lanka, Thailand and the United
States. Some 36,000 debit card and credit card holders in some 16 countries were
affected, Skowronek said. The amount stolen was unclear.
Bank fraud, ATM scams and phishing are common in Romania, one of the most corrupt
countries in the European Union, according to Transparency International which
monitors and measures graft. Under the late communist dictator Nicolae Ceausescu,
who was ousted and executed in 1989, Romanians specialized in mathematics and
computer coding and criminal gangs have tapped into those skills. The tradition has
continued and Romanian school students are more advanced in mathematics than
many of their European counterparts.
Nadine Spanu, a spokesperson for Romania’s anti-crime prosecutors, said Saturday she
had no statement to offer on the $45-million heist or a possible Romania connection.
Skimming works when criminals place devices on ATMs that copy consumers’ card
details and leave them vulnerable to fraud. There have been similar cases in the United
States and Britain. The EU is the world’s largest market for payment card transactions
and it is estimated that organized crime groups derive more than 1.5 billion euros ($1.9
billion) a year from payment card fraud in the EU.
Mike Urban, director of financial crime solutions at Fiserv, a Brookfield-Wisconsin-
based company that provides financial technology to banks, credit unions and
corporations across the world, says banks have not caught up with the threat of
electronic crime.
“Compare this to a physical bank security. If someone walks in today, they’re probably
not going to get very much money, the dye pack is going to explode, they will be caught
on video, they’re probably not going to get away with it, and they’re probably going to
spend a long time in jail,” said Urban. “Online, in the cyberworld, we’re not there yet.”
One security loophole thieves have learned to exploit is the lack of real-time
transactions in ATM-speak. Known as the “Gone in 60 Seconds” scam, thieves deposit
money and then make co-ordinated cash-advance withdrawals in various places — but
all in less than 60 seconds so the machines essentially regard all of the withdrawals as
one transaction. In October, some 14 people were charged following an FBI-led
investigation into the theft of more than $1 million from Citibank using the 60-second
scam. The simultaneous transactions at casinos in California and Nevada tricked the
system into thinking that they were one transaction.
Even on some joint accounts where both partners have cards for the same account,
users can often bypass withdrawal limits if the transactions are done at the same time.
“This type of attack might be preventable if ATM networks were able to monitor
transactions in real time for unusually large numbers of transactions involving
individual cards or cards from the same issuing institution. Unfortunately, that type of
infrastructure doesn’t exist today, but perhaps it’s time to consider creating and
implementing it now, especially after this latest attack,” said Tom Cross, director of
security research at the Lancope, a company specializing in flow analysis for security
and network performance based in Alpharetta, Georgia.
Police Maj. Gen. Pisit Paoin, chief of Thailand’s Technology Crime Suppression Division,
said in a telephone interview Saturday that Thai police have arrested more than 20
suspects involved in the $45 million cyber heist including those from Bulgaria,
Bangladesh and eastern Europe.
He said that in the latest arrest in early April, a group of Bangladeshi and Malaysian
suspects were using about 50 cards to withdraw cash from machines in Bangkok for a
month and took out about 10 million baht ($336,000).

More Related Content

What's hot

Cybercrime in hk
Cybercrime in hkCybercrime in hk
Cybercrime in hkCharles Mok
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom fieldMichalis Mavis, MSc, MSc
 
2015 Internet Crime Report
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report Rob Wilson
 
How To Catch A Fraudster Live Webinar
How To Catch A Fraudster Live WebinarHow To Catch A Fraudster Live Webinar
How To Catch A Fraudster Live WebinarKount
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...
HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...
HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...Steven Rhyner
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the CaribbeanGiovanni James
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attackijtsrd
 
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...Hafizah Jupri
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Case IQ
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 

What's hot (20)

cyber crime
 cyber crime  cyber crime
cyber crime
 
Jon handout 3
Jon handout 3Jon handout 3
Jon handout 3
 
Jon handout 2
Jon handout 2Jon handout 2
Jon handout 2
 
Cybercrime in hk
Cybercrime in hkCybercrime in hk
Cybercrime in hk
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field
 
Terrorist Use of Cryptocurrencies
Terrorist Use of CryptocurrenciesTerrorist Use of Cryptocurrencies
Terrorist Use of Cryptocurrencies
 
2015 Internet Crime Report
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report
 
How To Catch A Fraudster Live Webinar
How To Catch A Fraudster Live WebinarHow To Catch A Fraudster Live Webinar
How To Catch A Fraudster Live Webinar
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Phishing in China
Phishing in ChinaPhishing in China
Phishing in China
 
HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...
HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...
HOMELAND SECURITY BITCOIN TASK FORCE REVEALED BY DEPARTMENT OF JUSTICE INDICT...
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the Caribbean
 
Sim swapping
Sim swappingSim swapping
Sim swapping
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attack
 
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
Issues and ethics in finance (fin 657) - How hackers steal $81 million in Ban...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 

Viewers also liked

Thi thi khin (1st august 2006)
Thi thi khin (1st august 2006)Thi thi khin (1st august 2006)
Thi thi khin (1st august 2006)Thi Thi Khin
 
Ramos heredia carlos la seguridad ciudadana y los fiscales (2)
Ramos heredia carlos  la seguridad ciudadana y los fiscales (2)Ramos heredia carlos  la seguridad ciudadana y los fiscales (2)
Ramos heredia carlos la seguridad ciudadana y los fiscales (2)Carlos Americo Ramos Heredia
 
Treffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkes
Treffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkesTreffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkes
Treffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkesBigger Price
 
Taller scratch movimiento con teclado
Taller scratch movimiento con tecladoTaller scratch movimiento con teclado
Taller scratch movimiento con tecladodarwlu
 
Taller scratch movimiento con teclado
Taller scratch movimiento con tecladoTaller scratch movimiento con teclado
Taller scratch movimiento con tecladodarwlu
 
Comic master
Comic masterComic master
Comic masterdarwlu
 
Кто такая лошадь
Кто такая лошадьКто такая лошадь
Кто такая лошадьOlga Bazhenova
 
Lindenwood Housing
Lindenwood HousingLindenwood Housing
Lindenwood HousingChris Smith
 
Taller scratch movimiento con teclado
Taller scratch movimiento con tecladoTaller scratch movimiento con teclado
Taller scratch movimiento con tecladodarwlu
 
الحماية الشخصية للطالبات
الحماية الشخصية للطالباتالحماية الشخصية للطالبات
الحماية الشخصية للطالبات419000
 
Technology hass and associates reviews
Technology hass and associates reviewsTechnology hass and associates reviews
Technology hass and associates reviewsBigger Price
 
Competencias Informacionales: Seminario 2
Competencias Informacionales: Seminario 2Competencias Informacionales: Seminario 2
Competencias Informacionales: Seminario 2Yumarasuarez
 
"Créer une campagne Google Adwords étape par étape" par Christophe Bouchat
"Créer une campagne Google Adwords étape par étape" par Christophe Bouchat"Créer une campagne Google Adwords étape par étape" par Christophe Bouchat
"Créer une campagne Google Adwords étape par étape" par Christophe BouchatJ'ai besoin de com
 
Social Loves Mobile
Social Loves MobileSocial Loves Mobile
Social Loves MobileNexize
 
La sémantique html5 et Wordpress
La sémantique html5 et WordpressLa sémantique html5 et Wordpress
La sémantique html5 et WordpressVectorskin
 

Viewers also liked (20)

Thi thi khin (1st august 2006)
Thi thi khin (1st august 2006)Thi thi khin (1st august 2006)
Thi thi khin (1st august 2006)
 
Ramos heredia carlos la seguridad ciudadana y los fiscales (2)
Ramos heredia carlos  la seguridad ciudadana y los fiscales (2)Ramos heredia carlos  la seguridad ciudadana y los fiscales (2)
Ramos heredia carlos la seguridad ciudadana y los fiscales (2)
 
Treffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkes
Treffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkesTreffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkes
Treffer tilbake på hackere: Hvorfor "Strikeback" er dømt til å mislykkes
 
Taller scratch movimiento con teclado
Taller scratch movimiento con tecladoTaller scratch movimiento con teclado
Taller scratch movimiento con teclado
 
Taller scratch movimiento con teclado
Taller scratch movimiento con tecladoTaller scratch movimiento con teclado
Taller scratch movimiento con teclado
 
Резюме 2.0
Резюме 2.0Резюме 2.0
Резюме 2.0
 
El interrogatorio y el rol del fiscal
El interrogatorio y el rol del fiscalEl interrogatorio y el rol del fiscal
El interrogatorio y el rol del fiscal
 
Comic master
Comic masterComic master
Comic master
 
Кто такая лошадь
Кто такая лошадьКто такая лошадь
Кто такая лошадь
 
Scrivere un racconto
Scrivere un raccontoScrivere un racconto
Scrivere un racconto
 
El Contradictorio un Principio o un Método
El Contradictorio un Principio o un MétodoEl Contradictorio un Principio o un Método
El Contradictorio un Principio o un Método
 
Lindenwood Housing
Lindenwood HousingLindenwood Housing
Lindenwood Housing
 
Taller scratch movimiento con teclado
Taller scratch movimiento con tecladoTaller scratch movimiento con teclado
Taller scratch movimiento con teclado
 
الحماية الشخصية للطالبات
الحماية الشخصية للطالباتالحماية الشخصية للطالبات
الحماية الشخصية للطالبات
 
Technology hass and associates reviews
Technology hass and associates reviewsTechnology hass and associates reviews
Technology hass and associates reviews
 
Competencias Informacionales: Seminario 2
Competencias Informacionales: Seminario 2Competencias Informacionales: Seminario 2
Competencias Informacionales: Seminario 2
 
CBNews SNPTV
CBNews SNPTV CBNews SNPTV
CBNews SNPTV
 
"Créer une campagne Google Adwords étape par étape" par Christophe Bouchat
"Créer une campagne Google Adwords étape par étape" par Christophe Bouchat"Créer une campagne Google Adwords étape par étape" par Christophe Bouchat
"Créer une campagne Google Adwords étape par étape" par Christophe Bouchat
 
Social Loves Mobile
Social Loves MobileSocial Loves Mobile
Social Loves Mobile
 
La sémantique html5 et Wordpress
La sémantique html5 et WordpressLa sémantique html5 et Wordpress
La sémantique html5 et Wordpress
 

Similar to Law enforcement agencies grappling with spike in multi-million-dollar cyber scams

2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docxWhy Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docxalanfhall8953
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxerlindaw
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTesth9gfhypx97
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYTERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYSteven Rhyner
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
Catch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st CenturyCatch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st CenturyAudrius Sapola
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud managementrkappear
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 

Similar to Law enforcement agencies grappling with spike in multi-million-dollar cyber scams (20)

2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Why Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docxWhy Cryptosystems Fail ryptography is used by governments,.docx
Why Cryptosystems Fail ryptography is used by governments,.docx
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYTERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Catch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st CenturyCatch Me If You Can: Fighting Fraud in the 21st Century
Catch Me If You Can: Fighting Fraud in the 21st Century
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Atm theft
Atm theftAtm theft
Atm theft
 
L Scope
L ScopeL Scope
L Scope
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
comm16en01_dafc4
comm16en01_dafc4comm16en01_dafc4
comm16en01_dafc4
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Law enforcement agencies grappling with spike in multi-million-dollar cyber scams

  • 2. LONDON — International law enforcement agencies say the recent $45-million dollar ATM heist is just one of many scams they’re fighting in an unprecedented wave of sophisticated cyberattacks. Old-school robberies by masked criminals are being eclipsed by stealth multimillion dollar cybercrime operations which are catching companies and investigators by surprise. “We are seeing an unprecedented number of cyberscams that include phishing for financial data, viruses, credit card fraud and others,” Marcin Skowronek, an investigator at Europol’s European Cybercrime Center in The Hague said on Saturday. “In Europe, we are generally quite well protected against some types of fraud because of the chip and pin technology we use, but there are still shops and machines around the world who still take cards without chips. And the most popular destinations for this type of fraud are the United States and the Dominican Republic.” U.S. Investigators said Thursday a gang hit cash machines in 27 countries in two attacks — the first netting $5 million in December and then $40 million in February in a 10-hour spree that involved about 36,000 transactions. Hackers got into bank databases, eliminated withdrawal limits on prepaid debit cards and created access codes. Others loaded that data onto any plastic card — even a hotel keycard — with a magnetic stripe A similar scam yielded some 50 arrests this year in Europe during a joint police operation between Romanian police and Europol, Skowronek said.
  • 3. The operation took more than a year, involved some 400 police officers across Europe and required work comparing bank losses to illegal transactions and then cross- referencing suspects, said Skowronek, who said many national police forces were beefing up their undercover work in the cyberworld to catch criminals. Investigators found illegal workshops for producing devices and software to manipulate point-of-sale terminals. Illegal electronic equipment, financial data, cloned cards and cash were seized in raids in Britain and Romania. The group stole credit and debit card numbers and PIN codes by implanting card reading devices and malicious software on point-of-sale terminals. The criminals then used counterfeit payment cards with stolen data for further illegal transactions in countries that included Argentina, Colombia, the Dominican Republic, Japan, Mexico, South Korea, Sri Lanka, Thailand and the United States. Some 36,000 debit card and credit card holders in some 16 countries were affected, Skowronek said. The amount stolen was unclear. Bank fraud, ATM scams and phishing are common in Romania, one of the most corrupt countries in the European Union, according to Transparency International which monitors and measures graft. Under the late communist dictator Nicolae Ceausescu, who was ousted and executed in 1989, Romanians specialized in mathematics and computer coding and criminal gangs have tapped into those skills. The tradition has continued and Romanian school students are more advanced in mathematics than many of their European counterparts.
  • 4. Nadine Spanu, a spokesperson for Romania’s anti-crime prosecutors, said Saturday she had no statement to offer on the $45-million heist or a possible Romania connection. Skimming works when criminals place devices on ATMs that copy consumers’ card details and leave them vulnerable to fraud. There have been similar cases in the United States and Britain. The EU is the world’s largest market for payment card transactions and it is estimated that organized crime groups derive more than 1.5 billion euros ($1.9 billion) a year from payment card fraud in the EU. Mike Urban, director of financial crime solutions at Fiserv, a Brookfield-Wisconsin- based company that provides financial technology to banks, credit unions and corporations across the world, says banks have not caught up with the threat of electronic crime. “Compare this to a physical bank security. If someone walks in today, they’re probably not going to get very much money, the dye pack is going to explode, they will be caught on video, they’re probably not going to get away with it, and they’re probably going to spend a long time in jail,” said Urban. “Online, in the cyberworld, we’re not there yet.” One security loophole thieves have learned to exploit is the lack of real-time transactions in ATM-speak. Known as the “Gone in 60 Seconds” scam, thieves deposit money and then make co-ordinated cash-advance withdrawals in various places — but all in less than 60 seconds so the machines essentially regard all of the withdrawals as one transaction. In October, some 14 people were charged following an FBI-led investigation into the theft of more than $1 million from Citibank using the 60-second scam. The simultaneous transactions at casinos in California and Nevada tricked the system into thinking that they were one transaction.
  • 5. Even on some joint accounts where both partners have cards for the same account, users can often bypass withdrawal limits if the transactions are done at the same time. “This type of attack might be preventable if ATM networks were able to monitor transactions in real time for unusually large numbers of transactions involving individual cards or cards from the same issuing institution. Unfortunately, that type of infrastructure doesn’t exist today, but perhaps it’s time to consider creating and implementing it now, especially after this latest attack,” said Tom Cross, director of security research at the Lancope, a company specializing in flow analysis for security and network performance based in Alpharetta, Georgia. Police Maj. Gen. Pisit Paoin, chief of Thailand’s Technology Crime Suppression Division, said in a telephone interview Saturday that Thai police have arrested more than 20 suspects involved in the $45 million cyber heist including those from Bulgaria, Bangladesh and eastern Europe. He said that in the latest arrest in early April, a group of Bangladeshi and Malaysian suspects were using about 50 cards to withdraw cash from machines in Bangkok for a month and took out about 10 million baht ($336,000).