How hackers exposed banks from the top 100

The unique group that worked in all areas of crime in the banking sector has been beheaded by the operatives of the "K" Department of the Interior Ministry.
12.02.2016
Fontanka
Origin source
The operation, which is due to the large number of participants was carried out in three stages, prevented the collapse of the bank in Russia. Details found out "Fontanka".
The fact that the police arrested a group of hackers, who were going to paralyze the Russian banking system, the head of the specialized department for combating crime in the sphere c Ministry of Internal Affairs of Russia Alexey Moshkov computer security said a few months after the operation - to Infoforum 2016. Attack on Russian banks would be just the beginning, the police pointed out: the organization was aimed at financial institutions not only in Russia, but the United States, the countries of the European and Asian regions.
Only now, police are ready to tell the details. Detention of members of the group, as reported by "Fontanka" the head of the press-service Alexander Vurasko, carried out in several stages, with the final in November 2015. The impossibility of simultaneous strike was associated with sprutoobraznoy structure of the organization.
It is worth noting that the device kibergruppnot much different from the classical gang 90s. At the head of the hackers was 30-year-old resident of Moscow. His operatives called talented person, with signs of genius. He not only amassed a company, but also the only one of its leaders engaged in technical support work. For example, it has developed a near-perfect program for remote ATM management, and was the ideologist of creating a legal payment system, through which part of the revenue group moved across continents between performers. Personally acquainted with him were only four employees, oversee a dozen groups in different directions. And these four, also born in the 80s, had no technical education, but proved to be talented managers.
As noted in the management of the "K", unique in its omnivorous group: the participants were engaged in all kinds of crimes in the banking sector. In addition to the main work on targeted attacks on the banking infrastructure, they were engaged in manufacturing and installing skimmingovyh devices on ATMs, the creation of software-uparatnyh complexes, allowing to take control of the bank terminals, development and distribution of malicious programs targeting e-banking system, such as Telebank, online banking, as well as systems that are within the organizations themselves and allow the computer to the accountant to move money to accounts located at the bank.
Moreover, four improvised leader geographically located in Samara, Tomsk, Sverdlovsk and Chelyabinsk regions. A group, which they obeyed, working, for example, the Ukraine and Asia.
On the creation and debugging of the leader of the system it took about two years. However, since the beginning of 2015, this work takes place under the control of the security forces and employees of bank security and payment systems.
For group several offices was filmed in Moscow, as well as a country house in the suburbs, where the training camp was organized for the skimmers. The building has installed ATMs, which perfected the skills to install and remove the device from the machine. In the yard of this house, right nthe playground, in the sandbox, and many later detained.
The participants worked as an information bank cards purchased database from abroad, cashing them in Russia, as well as buying arrays obtained skimming. Not afraid they withdraw money and cards that have been compromised in Russia.
Money (9 February has counted a consequence of the damage caused by the work group on the half-billion) invested in the development of criminal business, as its activity is extremely costly. Thus, the attack on the bank or processing center - a month of work and significant investment in both hardware and software, as well as in the work of artists. Group Management does not show off apartments - in the sleeping areas of the machine - the middle class.
The most titanic began work on the study of how the international banking system messages. Hackers are analyzed and found the vulnerability, developed a tool with which they can be used. And at a time when they were all set to steal the money from all banks in the first hundred of the Russian Rivereytinga began detention.
Currently under arrest is the entire top of the group. Even the order of 5 - 6 people - on house arrest, depending on the degree of participation. This is not the latest arrests in the case, say the police.
The investigation gathered for a group of a whole bunch of articles: 158 (theft), 159 (cheating), 272 (illegal access to computer information) and 273 (creation, use and distribution of malicious computer programs). Crowning this meeting is believed to the Interior Ministry in the near future will be Article 210 (organization of a criminal community). To do this, the police conducted an unprecedented operation: collected documents that confirm the involvement of the detainees to commit numerous crimes and revealing their plans to prepare for a global "hacker" attack aimed at stealing money banks. In addition, they were seized thousands of bank cards and SIM cards of mobile operators, hundreds of mobile phones, as well as dozens of computers containing correspondence between members of a criminal syndicate.
"And it was not a final, but onlyThe first step is a big game, "- said the police.
In 2015, only officially damage from Russian cybercrime was estimated at $ 1 billion. In the US, where the hackers get the terms commensurate with the killers, at the same time decided to send criminals knowledge on computer security. At the end of 2015 directly in a US prison has earned the firm, consisting of cyber-Russians. It is said that local companies had stopped their work in testing security systems. Perhaps talent caught the group can come in handy at home.
The operation, which is due to the large number of participants was carried out in three stages, prevented the collapse of the bank in Russia. Details found out "Fontanka".
The fact that the police arrested a group of hackers, who were going to paralyze the Russian banking system, the head of the specialized department for combating crime in the sphere c Ministry of Internal Affairs of Russia Alexey Moshkov computer security said a few months after the operation - to Infoforum 2016. The attack on the Russian bankand would be only the beginning, the police pointed out: the organization was aimed at financial institutions not only in Russia, but the United States, the countries of the European and Asian regions.
Only now, police are ready to tell the details. Detention of members of the group, as reported by "Fontanka" the head of the press-service Alexander Vurasko, carried out in several stages, with the final in November 2015. The impossibility of simultaneous strike was associated with sprutoobraznoy structure of the organization.
It is worth noting that kibergruppy device is not much different from the classical gang 90s. At the head of the hackers was 30-year-old resident of Moscow. His operatives called talented person, with signs of genius. He not only amassed a company, but also the only one of its leaders engaged in technical support work. For example, it has developed a near-perfect program for remote ATM management, and was the ideologist of creating a legal payment system, through which part of the proceeds for the group moved tontinentam between performers. Personally acquainted with him were only four employees, oversee a dozen groups in different directions. And these four, also born in the 80s, had no technical education, but proved to be talented managers.
As noted in the management of the "K", unique in its omnivorous group: the participants were engaged in all kinds of crimes in the banking sector. In addition to the main work on targeted attacks on the banking infrastructure, they were engaged in manufacturing and installing skimmingovyh devices on ATMs, the creation of software and hardware systems that allow to obtain control of the bank terminals, development and distribution of malicious programs targeting e-banking system, such as Telebank online -banking, as well as systems that are within the organizations themselves and allow the computer to the accountant to move money in accounts held at the bank.
Moreover, four improvised leader geographically located in Samara, Tomsk, Sverdlovsk and Chelyabinsk regions.A group, which they obeyed, working, for example, the Ukraine and Asia.
On the creation and debugging of the leader of the system it took about two years. However, since the beginning of 2015, this work takes place under the control of the security forces and employees of bank security and payment systems.
For group several offices was filmed in Moscow, as well as a country house in the suburbs, where the training camp was organized for the skimmers. The building has installed ATMs, which perfected the skills to install and remove the device from the machine. In the yard of the house, directly on the playground, in the sandbox, and many later detained.
The participants worked as an information bank cards purchased database from abroad, cashing them in Russia, as well as buying arrays obtained skimming. Not afraid they withdraw money and cards that have been compromised in Russia.
Money (9 February has counted a consequence of the damage caused by the work group on the half-billion) invested in the development of criminal business, as its activities are extremelyatratna. Thus, the attack on the bank or processing center - a month of work and significant investment in both hardware and software, as well as in the work of artists. Group Management does not show off apartments - in the sleeping areas of the machine - the middle class.
The most titanic began work on the study of how the international banking system messages. Hackers are analyzed and found the vulnerability, developed a tool with which they can be used. And at a time when they were all set to steal the money from all banks in the first hundred of the Russian rankings, began detention.
Currently under arrest is the entire top of the group. Even the order of 5 - 6 people - on house arrest, depending on the degree of participation. This is not the latest arrests in the case, say the police.
The investigation gathered for a group of a whole bunch of articles: 158 (theft), 159 (cheating), 272 (illegal access to computer information) and 273 (creation, use and distribution of malicious computer programs). Crowning this meeting as I believein the Interior Ministry in the near future will be Article 210 (organization of a criminal community). To do this, the police conducted an unprecedented operation: collected documents that confirm the involvement of the detainees to commit numerous crimes and revealing their plans to prepare for a global "hacker" attack aimed at stealing money banks. In addition, they were seized thousands of bank cards and SIM cards of mobile operators, hundreds of mobile phones, as well as dozens of computers containing correspondence between members of a criminal syndicate.
"And it was not a final, but only the first step of a big game," - said the police.
In 2015, only officially damage from Russian cybercrime was estimated at $ 1 billion. In the US, where the hackers get the terms commensurate with the killers, at the same time decided to send criminals knowledge on computer security. At the end of 2015 directly in a US prison has earned the firm, consisting of cyber-Russians. It is said that local companies had stopped their work in testing security systems. ThePossible talents caught the group can come in handy at home.