Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security The Internet The Almighty Buck

Largest Ever Online Robbery Hits Swedish Bank 218

ukhackster writes "A Swedish bank has fallen victim to what experts believe is the biggest online robbery ever. A Russian gang apparently used keylogging software to steal around one million dollars. It appears that most of the victims weren't running security protection. The bank is refunding everyone who lost money (even if they hadn't taken precautions) — good news for the victims, but not really an incentive to take more care in future. From the article: 'Nordea believes that 250 customers have been affected by the fraud, after falling victim to phishing emails containing the Trojan. According to McAfee, Swedish police believe Russian organised criminals are behind the attacks. Currently, 121 people are suspected of being involved. The attack started by a tailormade Trojan sent in the name of the bank to some of its clients, according to McAfee. The sender encouraged clients to download a "spam fighting" application.'"
This discussion has been archived. No new comments can be posted.

Largest Ever Online Robbery Hits Swedish Bank

Comments Filter:
  • Options (Score:2, Insightful)

    by MrNaz ( 730548 ) on Friday January 19, 2007 @03:12PM (#17684910) Homepage
    Slashdot Option 1: Encourage stupid people by paying out when they do stupid things like believe email that reads "Dwonlaod tihs spam fihgting tool". Slashdot Option 2: Encourage banks to absorb financial responsibility of eCommerce mishaps and take the lead in system security. Can't... make... decision... brain... splitting... in... half...
  • by Corporate Troll ( 537873 ) on Friday January 19, 2007 @03:15PM (#17684958) Homepage Journal

    Those who are not into technology have no idea.... Look at my latest journal [slashdot.org]. You can have a PhD and fall for the simplest scam there is. Computers do seem to have this effect on people: their common sense fails because computers are somehow "Magic".

    It's tragic if you ask me.

  • Crime Doesn't Pay (Score:3, Insightful)

    by Zzesers92 ( 819281 ) on Friday January 19, 2007 @03:19PM (#17685028)
    $1,000,000 divided by 121 people = 8264.46 per person. I'm convinced taking people's money through legitimate avenues is easier than through crime. Zzesers
  • by PadRacerExtreme ( 1006033 ) on Friday January 19, 2007 @03:22PM (#17685096)
    So a PhD in medieval literature makes you an expert in computers and email? I am not saying that she shouldn't have known better (the SPAM indicator), but the PhD alone doesn't really matter. Besides some people are always looking for a get rich quick scheme.
  • Victims (Score:5, Insightful)

    by Sloppy ( 14984 ) on Friday January 19, 2007 @03:23PM (#17685122) Homepage Journal
    The bank is refunding everyone who lost money (even if they hadn't taken precautions) - good news for the victims

    No, that merely changes who the victims are. There is no such thing as "good news for the victims" unless the stolen money is recovered.

  • Re:Options (Score:2, Insightful)

    by P3NIS_CLEAVER ( 860022 ) on Friday January 19, 2007 @03:26PM (#17685196) Journal
    My bank now demands additional secrets if I try to log in from an IP that is different than the usual one. A little inconvenient but i am sure it helps.
  • by logicnazi ( 169418 ) <gerdesNO@SPAMinvariant.org> on Friday January 19, 2007 @03:29PM (#17685262) Homepage
    Having had to deal with a bank to get credit card charges reversed I can safely say it isn't a pleasant experience. It involves lots of forms and remembering to do things at the right time and spending time on telephone lines. In short it is a pretty good incentive not to be careless with your banking security.

    All that not refunding the customer's money would accomplish is hurt a lot of people and discourage people from using online banking or encourage them to change banks. People are never going to become security gurus just so they can bank online and if you make banking online too risky or hard they will just give it up.

    By making sure it is the bank who has to pay for security losses while still making sure people have some incentive (annoyance, possibility they might pay next time or lossing $50) to be safe you end up with the best results. The bank is the entity that can roll out new security solutions and most easily improve security practices so giving them incentives to improve security is the best move.
  • by arevos ( 659374 ) on Friday January 19, 2007 @03:47PM (#17685634) Homepage

    $1,000,000 divided by 121 people = 8264.46 per person. I'm convinced taking people's money through legitimate avenues is easier than through crime.

    Whilst this may be true in a country like the USA, it's worth noting that the difference between average incomes between western Europe and Russia make it more profitable than it might seem at first glance. The average yearly salary in Russia is around $4800, whilst the average salary in countries like the US and Sweden is about 8 times that.

    Multiplying by 8 gives $66,116, and whilst I suspect such a figure would still not be worth the risk of being caught (and with 121 people involved, there's got to be an increased chance of someone slipping up), it's probably a lot more attractive than the figure of $8264.46 would suggest.

  • by planetmn ( 724378 ) on Friday January 19, 2007 @03:47PM (#17685636)
    Having had to deal with a bank to get credit card charges reversed I can safely say it isn't a pleasant experience.

    What bank issued your credit card? I've had to reverse charges multiple times for different reasons. I've been billed twice for the same item, I've been billed incorrect amounts, I even reversed a Paypal charge because the seller never sent the item.

    In all cases it was simple (I have Citibank cards). Call up and tell them what charge you are disputing. Immediately you get a conditional credit for that charge. They send you a single page form. Fill out a couple of lines, and send it back with any receipts (if you have them). In every single case I have received my money back, and the most time consuming part was dialing the phone (ok, not really, but just about. In total each dispute took less than 10 minutes of my time).

    Remember, you are the customer. If the bank is treating you like crap, go elsewhere.

    -dave
  • Re:Options (Score:2, Insightful)

    by Poruchik ( 1004331 ) on Friday January 19, 2007 @03:57PM (#17685860) Homepage
    And how does this help if your regular computer has a trojan?
  • Re:the hard part (Score:3, Insightful)

    by dgatwood ( 11270 ) on Friday January 19, 2007 @04:21PM (#17686306) Homepage Journal

    Or possibly not a DNS lookup. Possibly just delaying ACKs and stuff on the outbound TCP connection to make the connection open more slowly and delay any useful receipt of data... or inserting bogus NAKs or... could be anything. The point is that an attacker would do something to delay the connection.

    These sorts of flaws have been talked about for a while now. Man-in-the-middle attacks are hard to protect against, and impossible if one endpoint is the untrusted man in the middle. In this way, it is basically the same fundamentally unsolvable problem as digital rights management, and for precisely the same reason: with a potentially untrusted device as a communication endpoint, you cannot guarantee that you can protect data sent or received by that endpoint from compromise.

  • Re:Options (Score:2, Insightful)

    by P3NIS_CLEAVER ( 860022 ) on Friday January 19, 2007 @04:22PM (#17686318) Journal
    Note that I said "helps". There is no one method to secure a computer or transaction, only improvements.
  • by ratboy666 ( 104074 ) <fred_weigel@[ ]mail.com ['hot' in gap]> on Friday January 19, 2007 @04:49PM (#17686880) Journal
    No it doesn't.

    If your computer has been rooted, it really IS ball game over. Just sitting here thinking how I would exploit a rooted system that someone uses for banking...

    1 - establish account offshore that offers SWIFT transfer (or other convenient inter-bank wire), and can deal with bank that requires no ID.
    2 - Monitor victims on-line banking activity for a couple of months.
    3 - Intercept after online session has next been established.
    4a - Inject low level "noise" transfer, if victims balance is medium level
    4b - Take it all, if victim balance is at high level.
    5 - Complete transfer from SWIFT bank next day, to "no ID" bank.
    6 - transfer from "no ID" to Bahamanian account (Swiss account, you pick). Cash out.

    Ob.Holywood: Add sound effects, and visual effects as appropriate: "I'm in!" and up/down counters with ticking.

    Of course this doesn't work if you DON'T do on-line banking; this is a good thing(tm) because on-line activity would otherwise be exceptional.

    Bear in mind that this is the first solution I came up with. And I suspect it would be very workable. Especially, if that "Digipass" gave you a sense of security.

    Thing thing you "Trust": the thing that you have faith in because you have no other choice. And that which you must trust, you must be able to verify. With Internet Banking, you do not trust the network (thus, we use cyrptographically sound protocols). You trust your password, and are forced to trust your computer. (And, you trust your bank). So, secure that computer, and don't give out your password. I wouldn't trust a digikey, simply because I have no way of verifying (I can restrict access to my computer, and my password is under my control).

    The digikey in no way mitigates responsibility for keeping your computer secure.

  • by judd ( 3212 ) on Friday January 19, 2007 @05:35PM (#17687752) Homepage
    "good news for the victims, but not really an incentive to take more care in future"

    Consumers are told by people who market computers that they are easy and safe to use. Consumers are told by internet service providers that online services are easy and safe to use. Consumers are told by banks that online banking is secure and convenient.

    Aside from the criminals, who appear to have escaped without any consequences to them, the burden is falling where it should be, namely on agents who allow marketing over reality. While the /. crowd may know better, the average punter does not, and shouldn't have to.
  • by AxelBoldt ( 1490 ) on Friday January 19, 2007 @05:51PM (#17688026) Homepage
    The bank is refunding everyone who lost money
    That's crap. The customers didn't lose anything. The bank lost money; it was tricked into paying out funds without having been authorized to do so by the funds' owners. The bank neglected the first rule of the banking business: "Know your customer". It did not properly check the identity of the people it was interacting with, and therefore has to eat the full loss.
  • by Jugalator ( 259273 ) on Friday January 19, 2007 @06:10PM (#17688328) Journal
    It appears that most of the victims weren't running security protection.

    Often these guys use directed fraud mails written in reasonably good Swedish, so I wouldn't really doubt they have custom made keyloggers too to attempt to escape antivirus tools.
    Sure, they could use detection by heuristics like some support, but then the accuracy falls rapidly, as well as the fact that not nearly all popular tools even supporting that.

    What's needed here is that users don't become so naive when they sit down in front of a computer. To many, it seems like they then enter a world of safety where they don't have to think much and just click through mails that "look right" even if they ask for logon details that the banks has earlier been very careful to inform they'll never request. (because they already have that info, or can reset it at their whim anyway, duh!) The problem is that on the Internet, the exact opposite mostly holds true.
  • Human factors (Score:3, Insightful)

    by Beryllium Sphere(tm) ( 193358 ) on Friday January 19, 2007 @06:40PM (#17688806) Journal
    >idiots

    We'll never get decent security as long as we set traps for users and call them idiots when they fall in.

    The email containing the Trojan came from the bank's domain, apparently. Is it the fault of the users that email isn't authenticated? Are they idiots for not knowing how SMTP sessions can be spoofed?

    How many places require software downloads to work? Include Flash and PDF readers in that list. Are people idiots for installing something that any non-expert would think came from their bank?

    Do we even know that they weren't running antivirus? Would there have been signatures for a Trojan that was only distributed to a few hundred or a few thousand people? Would behavior-based antivirus have caught it, given that the crooks had the chance to test it against every common antivirus program?

    Are the users idiots because the bank used a security protocol so unutterably lame that it was subject to undetectable replay attacks?

    Calling the users idiots is just an excuse for not fixing the real problems.
  • by Anonymous Coward on Friday January 19, 2007 @10:04PM (#17690698)
    I don't think the users should be blamed. At least not if this scam was well designed. There is no way the user can see the difference between the bank's own site and a phony one.

    I don't know how well-designed this scam was. But it is possible to make the real and the false pages look exactly the same, or so similar that only the most suspicious minds will discover the difference.

    At least with the IE 6 browser, you can design a popup with layout at the top pretending to be the Menu and Address bar, making the user believe he is at the bank's true address. And you might add the image of a lock giving the impression that he is on a SSL secured site. You don't need an infected computer to do this, you only have to make the user click a link. (It is hard to do this convincingly for every user, but doing it convincingly for 70% is obviously enough).

    And given a rootkit, the criminal could change the behaviour of the browser, change the dns-service, or whatever - resistance is futile. With malware running stealthily in the background, intercepting and changing some of the communication with the bank, there is not much point in high security authentication tools like digipass calculators or smartcards.

    In my view, the bank's loss is mainly due to the fact that today's common os-es and browsers are not safe. Period. The chief problem is that the industry is selling a product which is full of security loopholes. With today's popular OS-es, most home users are running with administrator rights (making the result of security breaches possibly very serious), and with common browsers and web standards, it is hard to see whom you are communicating with - especially when using popups and frames.

    The users might be a little to blame in this case, but the important thing is that one - for the time being - can not expect users to have the skills necessary to keep the computer safe and surf safely. With nerds and computer professionals, expectations can be higher.

    Users might be asked to keep their computers updated with anti-virus software. In my experience (with family and students), a lot of them are incapable of doing this by themselves. After some time, the computer is sluggish because of spyware or different programs and updates they have involuntarily accepted be installed. Keeping a computer safe and in working order is a profession.

    What banks must do to limit attacks? Make attacks expensive. And encourage the software developing community/industry to integrate security in the products.
    1) Make a policy to avoid simple attacks. Maybe should users be advised always to enter the bank's address in the address bar (if so, banks must never send links themselves :-)
    2) And make sure that the malware must be complex, i.e. make sure that the authentication data cannot be reused from another computer (static passwords are an obvious no-no), perhaps also prevent concurrent background transfers (deny dual sessions with the bank).
  • by Lord Flipper ( 627481 ) * on Friday January 19, 2007 @10:42PM (#17690986)
    Those who are not into technology have no idea.... Look at my latest journal [slashdot.org]. You can have a PhD and fall for the simplest scam there is. Computers do seem to have this effect on people: their common sense fails because computers are somehow "Magic".

    It's tragic if you ask me.

    You can say that again. My girlfriend is a physician (who has practiced psychiatry for 25+ years), and she is absolutely devoid of any understanding of the risks in those 'scratch and win', 'you may be a winner' type scams that proliferate online. It astonishes me, and it's tragic, like you said. I'll try to discuss it with her, and she'll come back with, "You're right, i probably wouldn't win anything, anyway." And there I am, speechless...

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...