Police breaks up cybergang that stole over $15 million from banks

Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards

Romanian authorities have detained 25 people who are suspected of being members of an international gang of cyberthieves who hacked into banks, cloned payment cards and used them to steal over US$15 million.

The group is believed to have over 52 members of Romanian and other nationalities, and broke into computer systems belonging to banks from Puerto Rico, a U.S. territory, and Muscat, Oman, according to the Romanian Directorate for Investigating Organized Crime and Terrorism (DIICOT).

The hackers used the unauthorized access to steal payment card data associated with the accounts of large corporations and then used the data to create fraudulent copies of those cards. The cloned cards were distributed to members of the group who used them to withdraw money from ATMs in different countries, DIICOT said Sunday.

The withdrawals were performed in batches over very short periods of time and typically on non-business days according to Romanian prosecutors. On Feb. 20, 2013, for example, members of the gang withdrew $9 million from ATMs in Japan. On Dec. 2 that same year, the gang made around 4,200 withdrawals from ATMs across 15 Romanian cities, totalling $5 million.

Fraudulent withdrawals were also made in the U.S., Belgium, Canada, Colombia, the Dominican Republic, Egypt, Estonia, Germany, Indonesia, Italy, Latvia, Malaysia, Mexico, Pakistan, Russia, Spain, Sri Lanka, Thailand, Ukraine, the United Arab Emirates and the U.K, DIICOT said.

Romanian authorities executed 42 house search warrants in six cities on Sunday, seizing laptops and mobile phones believed to have been used by the gang's members. They also seized €150,000 ($163,000) in cash, gold bars weighing 2 kilograms and paintings.

The group's leaders invested some of the stolen money in real estate and movable goods that will now be placed under restrictions pending the investigation, DIICOT said.

This is not the first cyberheist that involved hacking into financial institutions, cloning cards and performing carefully timed, large-scale ATM withdrawals around the world. In fact, the case might be linked to a larger $45 million cybercrime campaign reported by U.S. authorities in 2013.

In May 2013, the U.S. Attorney's Office for the Eastern District of New York announced the indictment of eight suspected members of an international cybercrime organization that hacked into the systems of global financial institutions, stole prepaid card data and eliminated withdrawal limits.

U.S. prosecutors described two cyberheists attributed to the gang at the time, one involving cards issued by the National Bank of Ras Al-Khaimah PSC (RAKBANK) in the United Arab Emirates and the other involving cards issued by the Bank of Muscat in Oman. According to the prosecutors, the fraudulent withdrawals were performed in 26 countries, which by and large match the countries listed now by DIICOT.

Security researchers are reporting a trend for cybercriminals to go directly after financial institutions instead of their customers. In February, researchers from Kaspersky Lab reported that a gang called Carbanak stole up to $1 billion from banks and other financial institutions in 25 countries after infecting their systems with malware and carefully learning their internal procedures. The primary attack vector used was spear phishing, targeted emails containing malicious attachments.

Join the CSO newsletter!

Error: Please check your email address.

Tags Romanian Directorate for Investigating Organized Crime and Terrorismsecuritydata breachlegalU.S. Attorney's Office for the Eastern District of New Yorkcybercrimekaspersky labfraud

More about Kaspersky

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts