Skip to main content

RBS ATMs been robbed! Massively...

http://www.dailyrecord.co.uk/news/business-news/2010/03/14/royal-bank-of-scotland-raiders-huge-6m-haul-in-12-hours-86908-22110087/

Royal Bank of Scotland raiders' huge £6m haul in just 12 hours

Mar 14 2010 Exclusive by Russell Findlay, Sunday Mail

COMPUTER hackers linked to the Russian mafia robbed Royal Bank of Scotland customers of £6million in 12 hours.

The crooks pulled off the massive sting by dispatching an army of thieves using cloned debit cards to blitz more than 2000 cash machines in 280 cities worldwide.

Stunned bosses at the Edinburgh bank were helpless to stop £6million of cash being plundered from the ATMs in Scotland's biggest bank heist.

But, we can reveal gang leader Viktor Pleshchuk, 28, has been snared in the Russian city of St Petersburg following a massive FBI investigation.

Acting US Attorney Sally Quillian Yates described the heist as "perhaps the most sophisticated and organised computer fraud attack ever conducted".

The plot was hatched by Oleg Covelin, 28, in Moldova, who discovered a flaw in the bank's computer system.

He contacted Sergei Tsurikov, 25, in Tallin, Estonia, who joined forces with Pleshchuk to orchestrate the electronic heist.

The gang hacked into the bank's system to clone 44 debit cards and discover their PIN numbers.

They electronically hiked the available balances and deleted withdrawal limits on each card before distributing them to a network of foot soldiers, known as "cashers".

At the stroke of midnight US time, the cashers drained ATMs using the cloned cards.

They struck at machines in Britain, the US, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan and Canada.

During the 12-hour robbery, Pleshchuk and Tsurikov hacked back into the bank's system to see the transactions taking place on their computer screens.

They obtained just under $9.5million - around £6.3million - between midnight and noon.

FBI Agent Ross Rice said: "We've seen similar attempts to defraud a bank through ATM machines but not anywhere near the scale we have here."

The hackers then deactivated the cards and attempted to destroy electronic records of their crime within the bank's system.

The cashers were allowed to keep 30 to 50 per cent of the cash with the rest being sent electronically back to the hackers.

The three suspects have all been extradited to the US where they are to stand trial accused of the attack on the RBS WorldPay division in Atlanta.

Former hacker Kevin Mitnick, who now works as a computer security consultant, said: "It was so well co-ordinated. These guys hacked into RBS WorldPay, they took control of their servers and reverse engineered the encryption so they could get the debit card PINs.

"They then distributed the account numbers and PINs to a network of cashers - criminals who will withdraw funds from ATMs.

"They co-ordinated this attack so the cashers would cash out in a 12-hour period and stole $9.5million. That's an incredibly sophisticated attack."

The gang targeted the bank at the height of the global financial crisis in November 2008, striking just three weeks after shamed RBS chief Sir Fred Goodwin was forced to quit.

At that time, the bank was only saved from collapse by an emergency £20billion injection of public cash and is now 84 per cent owned by British taxpayers.

Angry US customers whose cards were cloned by the gang are suing RBS in a $5million class action lawsuit.

The action by Keith Irwin, of Pennsylvania, accuses the bank of negligence and breach of contract.

Michael McCoy, of the Identity Theft Institute, received a warning letter from RBS telling him that his personal details may have been stolen by the gang.

But he hit out as the bank only offered a 12-month free credit rating - while warning customers to be vigilant for 24 months.

He said: "It's an insult to me and any other consumer.

"Come on, a one-year subscription, what's that going to do?

"Any intelligent thief understands these letters are going out so why won't they use it in the 13th month?

"On the back of this letter they encourage you to remain vigilant for 12 to 24 months but they're only going to offer me a product for 12 months. It boggles my mind."

Customers are also angry at the fact the bank "identified the breach" on November 10, 2008, but kept it secret for 43 days.

They eventually issued a press release in the US about the fraud two days before Christmas in what furious victims claim was a deliberate ruse to avoid publicity.

The press release said fraud had only been committed on 100 cards - giving no hint of the financial scale of the attack.

A fourth unnamed hacker is also facing criminal charges. He is believed to have fully co-operated with the FBI.

In the dock with the four hackers are four other Estonians. Tsurikov is accused of distributing cards and PINs to Igor Grudjev in Estonia.

Grudjev then distributed them to Ronald Tsoi, Evelin Tsoi and Mihhail Jegenvov, who withdrew £191,000 from ATMs in Tallin during the 12-hour period.

The cloned cards belonged to US workers whose wages are paid directly into their bank accounts.

The RBS WorldPay website states: "From face-to-face transactions to online and phone transactions, we provide an effective, secure service."

At the time, Ben Barone, president and CEO of RBS WorldPay, said: "We have taken important, immediate steps to mitigate risk and none of the affected cardholders will be responsible for unauthorised activity on their account resulting from this situation."

RBS declined to comment because of the ongoing legal proceedings.

Raid was planned like terror operation

Experts claim preparation for the worldwide bank scam was on a similar scale to an al-Qaeda terrorist operation.

Uri Rivner, of RSA Identity Protection & Verification, said: "The technical aspects in this case were not that impressive but the level of co-ordination was staggering.

"Managing time zone issues and co-ordinating cashers in nine nations - all required to hit as many ATMs as possible within 12 hours - makes me think of an al-Qaeda type of strategy of multiple attacks in a single day.

"A lot of planning and a very high degree of international co-operation went into this."

The four hackers in the dock are all in their 20s, from Russia and other former Soviet states. The FBI are in no doubt that they worked for the Russian mafia. Once they had identified a way into the RBS internal network, they spent months plotting on private internet forums.

They began looking for "jackpot servers" using free scanning software to locate valuable, protected data.

Experts reckon they stumbled on the details of the 44 cards before artificially hiking the balances and abolishing the daily withdrawal limits.

Popular posts from this blog

Contoh Checklist saat beli mobil bekas

Diambil dari Majalah AutoBild Edisi 54 100 Checklist Mobil Bekas Berkualitas Kriteria Penilaian : (A) Problem minor. Biasanya karena habis dipakai dan normal terjadi di mobil yang sudah berumur. Tapi hal ini bisa dijadikan bahan negosiasi harga. Dan jika mobilnya masih relatif baru, problem ini juga bisa berarti biaya mahal. (B) Cacat yang bisa menjadi serius, jika membutuhkan investigasi lebih lanjut. (C) Kemungkinan adalah problem serius yang mahal dan sulit diperbaiki hingga normal. (D) JANGAN beli mobil ini!!!!!!!!!! Kesan Pertama 1. Dimana anda mobil tersebut? Jika diperlukan, dapatkah Anda menemukan penjualnya kembali? (D) 2. Apakah alamat penjualnya jelas? (D) 3. Bicara langsung ke penjual; apakah pertanyaan Anda dijawab dengan sigap? (D) 4. Lihat dan perhatikan sisi kendaraan, apakah terlihat lurus dan simetris? (D) 5. Periksa setiap sisi untuk mengenali kerusakan berat. (C) 6. Periksa celah antar panel, seharusnya rata dan konsisten. Jika tidak, ada kemungkinan

Daftar Alamat Bank Jabar Banten (BJB) Jakarta

Alamat dan telpon Kantor Cabang , Kantor Cabang Pembantu, dan Kantor Kas Bank Jabar dan Banten yang berlokasi di Jakarta meliputi wilayah Jakarta Pusat, Jakarta Timur , Jakarta Barat, Jakarta Utara, Jakarta Selatan Kantor Cabang - Bank Jabar Banten - Jakarta Nama KC Alamat Telpon Fax JAKARTA Bank DEVISA Jl.Jend.Sudirman Kav.2 Gedung Arthaloka Lt.Dasar & Lt.4 Jakarta Pusat 021-2511448, 2511449 021-2511450, 2514415 HASYIM ASHARI Jl. KH. Hasyim Ashari No. 32-34, Jakarta Pusat 021-6330676 021-6324430 MANGGA DUA Gedung Masterina Jl. Mangga Dua Raya Blok F1 No. 1-3 Jakarta Pusat 021-62204094, 62204095, 62204096 021-62204093 KEBAYORAN BARU Graha Iskandarsyah Lt. 2 JL. Iskandarsyah Raya no. 66 C Kebayoran Baru 12160 - Jakarta Selatan 021-7229777, 7207334 021-7206990, 7209941 RAWAMANGUN Jl. Pemuda No. 97 Kec. Pulogadung - Jakarta Timur 021-47861771, 47868072, 47868073 021-47863209 Kantor Cabang Pembantu - Bank Jabar Banten - Jakarta NAMA KCP ALAMAT TELPON

Cara ganti baterai keyBCA

http://groups.yahoo.com/group/stmpnb/message/2271 Nasabah BCA yang terhormat, Terima kasih atas kepercayaan Anda menggunakan layanan KlikBCA Individu  untuk melakukan berbagai transaksi perbankan Anda. Berdasarkan data yang ada pada kami, saat ini Anda telah menggunakan  KeyBCA dengan tipe Activcard. Bila baterai KeyBCA sudah lemah akan muncul icon/tanda gambar yang  menunjukkan bahwa KeyBCA dalam kondisi "low battery", maka Anda harus segera  mengganti baterai utamanya dengan baterai baru segera setelah icon tersebut  muncul. (Pada waktu penggantian baterai, KeyBCA harus dalam kondisi tidak  aktif). Berikut ini langkah-langkah penggantian baterai :  1. Buka penutup baterai KeyBCA yang terletak di bagian belakang KeyBCA      sebelah kanan bawah.  2. Ganti baterai utama dengan baterai baru  (proses ini harus berlangsung        dengan cepat) .  3. Tutup kembali penutup baterai KeyBCA.  4. KeyBCA sudah bisa digunakan kembali.  Keterangan : tipe baterai CR2032/3V-22