INCERT to conduct enquiries on Great E Bank Robbery

As referred to in our earlier post on the $45 million Global Card fraud, IN CERT is reportedly conducting an enquiry on the security breach alleged to have occurred at the two card processing companies in India. .

In the meantime the Pune based Electra Card services has given out a statement stating that the data breach has occurred “Outside their environment”.

 

Naavi

Related Article in ET:

Another Article in ET

Related Article in TOI

Posted in Cyber Crime, ITA 2008 | Leave a comment

Attention now turns on India as an outsourcing destination

As could be expected, the Great E- Banking Robbery has now brought Indian Outsourcing industry to the center of controversy. The Reuter report

Already some security experts in US have started a campaign for shifting the card processing business to some large US companies. Probably in the short run some business will move out of India since “Security” is an issue on which no financial institution wants to compromise.

However, at this point of time it is not clear where the Indian companies failed. It would be necessary for INCERT to conduct its own  enquiry and undertake necessary steps to document what really caused the security breaches and what can e done in future to secure the BPO industry’s interests.

Naavi

Posted in Cyber Crime, RBI | 1 Comment

TN Police throw up their hands in Phishing Case

Tamil Nadu police had the distinction of achieving the first ever conviction under ITA 2000 way back in 2004. It has also had the distinction of solving several Credit card frauds some of whom had international footprint.

However these appear to be past glories as the current administration under the AIADMK Government appear to show no inclination to investigate Cyber Crimes. In one of the complaints filed by a Phishing Victim, Police have recently sent a letter stating that they are unable to trace the accused and hence would like to close the case.

Unfortunately it appears that the Police have not made an honest attempt to investigate since they donot appear to have made any attempt to investigate the bank officials wtihout whose assistance the fraud could not have been successfully completed. There were more than 15 branches of Punjab National Bank involved in the fraud and the Police donot seem to have visited any of these branches and interrogated any of the officials.

This gross inefficiency is in stark contrast with the successful investigation of the New york police in the $45 million bank fraud reported recently in which 8 persons were arrested and charge sheet filed within 5 months.

Normally Ms  J.Jayalalitha is considered to be a better administrator than Mr Karunanidhi. But under her leadership the Cyber Crime police in TN seem to have lost the direction.

Coupled with this after Ms Jayalalitha took over as CM, the Adjudication system in Tamil Nadu has also been in active. It appears that age has caught up with Ms J Jayalalitha and rendered her weak in administration of law enforcement in Tamil Nadu.

Probably victims of Cyber Crimes in Tamil Nadu may have to invoke the assistance of the Human Rights Commission to make Police act.

Naavi

Posted in Cyber Law | Leave a comment

The Kingpin of the Great E Banking Robbery shot dead by his partners

The spectacular US$ 45 million global bank heist has already claimed the life of the suspected kingpin.

Alberto Yusi Lajud-Peña, one of a number of suspected ringleaders behind a coordinated and sophisticated global bank heist operation that netted the thieves $45 million in stolen funds, was mowed down inside his Dominican Republic home last month while playing dominoes, robbing authorities of the chance to bring him to justice with his alleged co-conspirators. It is suspected that the killing is related to disputes in sharing of the fraud proceeds.

The total number of transactions booked in the December 21, 2012 operation was around 4000, all in about 750 ATMs in Manhattan within about 2.5 hours. On February 19 there were 46000 transactions involving 36000 ATMs and 12 different card accounts across 24 different countries all within 10 hours. The precision with which this massive fraud has been committed simply is astounding.

(See related article) 

Naavi

 

 

Posted in Bank, Cyber Crime | Leave a comment

Modus Operandi of the Great E-Bank Robbery

The recent Banking Fraud where US $45 million (Rs 250 crores) were withdrawn in cash across 27 countries was a sensational international cyber crime that warrants a serious analysis by all Cyber Crime and Cyber Security experts. What is intriguing was that only 12 card accounts were used to conduct 36000 transactions withing 2 and half hours to withdraw the amount from different ATMs.

This fraud highlights how Cyber Crime can create chaos in the Physical financial world and raises questions about how we secure our financial systems in future against the breaches created by the rapid progress of “Technology”.

The dangers of “Technology Ahead of Security” on the part of the bankers and “Convenience Ahead of Security” on the part of the Customers have rendered E Banking vulnerable to the point where it can destroy the global economy.

The sophistication with which the crime was executed clearly reminds one of the various Hollywood movies such as  or Ocean Eleven series where bags of hard cash is taken away by successful operators. While in the film, clever robbers rob from other persons who have amassed money by cheating the public and therefore evoke silent admiration of their success, the current Great E Bank Robbery has hurt the common man on the street and his hard-earned savings. It is therefore a serious matter to be guarded against so that there is no “Sequels of Great E Banking Robberies” to contend with.

This article in fox news tries to capture the modus operandi of this Great E Banking Robbery.  This crime was a mix of “Hacking”, “Data Theft”, “Data Manipulation” and  “Card Cloning” and executed across countries by a gang of coordinated criminals.

First two card processing IT Companies one in India and another in USA (also maintaining a data center in Bangalore) were hacked and some credit card data was accessed. Some insider involvement or past employee involvement can be speculated in this operation. After accessing the card data, it was  used for cloning the cards. However what made the operation ingenious was that the criminals were not simply satisfied with cloning active cards and removing money upto the available balance. They perhaps knew that this would limit their opportunities to the available balances and also the unauthorized withdrawals would get quickly discovered because active users would immediately notice the withdrawals and report it to the banks.

They therefore struck at cards which had lower probability of quick reaction from the customers. They chose “Prepaid Cards” where money was already loaded and hence the withdrawals were not subjected to the same rigour as other cards which would raise fresh “authentication requests” for each new withdrawal. Additionally they chose cards which were perhaps been sparingly used which represented some thing similar to “Dormant Accounts” in Banking terminology. To offset the probability that such cards may have smaller balances than the cards with a credit line, they used their hacking ability to modify the amounts available in the cards to higher levels. Again by using the charging of  prepaid cards instead of transferring of money to the mule accounts, criminals created an easy cash delivery mechanism through the ATMs without the need to create one more parking slot for the money.

In order to execute the cash withdrawals the criminals acted as a coordinated gang across 27 countries. The cloned cards were created out of transfer of Magnetic Strip data to the end point fraudsters or to their local manager who loaded the data on blank cards and delivered them to several chosen fraudsters who went to the ATMs and withdrew the money on receipt of the cue from the kingpin. Probably, some havala route was used to enable passing off of commission to the kingpin after the money was withdrawn. In New York city alone, $2.8 million was taken away from different ATMs without raising any alarm.

The heist was executed first in December when over 150 minutes, 4500 fraudulent transactions were conducted and US$5 million was withdrawn in cash. Then the fraudsters lied low until February and perhaps felt that their earlier fraud had gone unnoticed. They then struck again and over a period of 10 hours executed 36000 transactions taking away $40 million.

At the end of it, one must appreciate the efforts of the law enforcement to quickly bring the culprits to the Court within three months from the second heist at least in New York.

However the Banking industry has to now worry about how they secure E banking transactions in the future. Similarly the fraud insurance companies also need to worry about the implications of such losses. Probably this will increase the cost of E Banking in future and the advantage of “Economy” in using of technology in banking has gone for a six.

Today’s nature of Cyber Crimes are easily repeatable and hence we in India need to worry about how we address similar issues if they arise in India. The incident once again confirms that the customer is at the mercy of the system in the hands of the Bankers which may not be properly secured.

Banks should therefore stop blaming the customer in such cases.

Bankers who keep saying that “Our systems are secure and unless you share your password or PIN, there is no way such frauds can take place” should eat their words..

Adjudicators, Cyber appellate Tribunal and the Judges in different Courts in India need to take note of this modus operandi before taking decisions in Phishing and Card fraud cases. If an organization like Electra Card the Pune based specialized card processing company with PCI Compliance and other security measures could be hacked, then the systems of Banks which are not secured at similar levels are more prone to such risks.

I urge RBI to immediately constitute an expert committee to review the implementation of Information Security in Banks on which RBI had given guidance notes on April 29, 2011 and also February 28, 2013 and push Banks to tighten up the security levels without a day’s delay.

Naavi

Posted in Bank, Cyber Crime, ITA 2008, RBI | 1 Comment

Was Infosys sofware responsible for the losses of the UAE Bank?

Today’s Economic Times carried a story (See report) highlighting that the UAE Bank which was involved in the US $ 45 million global heist was using Finacle Software from Infosys.

The fraud was actually committed by the hacking of the system maintaining the credit card  customer data base where the upper limits associated with the card were jacked up significantly, clone cards created and used for withdrawal from ATMs.

It is not clear if Finacle software or any other software supplied by Infosys was at all involved in the issue. It is also not clear that the “unanamed Bangalore based credit card processor” indicated in the related New York Times article was in deed Infosys BPO itself or not. (See the earlier article for more details).

So far it is reported that Infosys has refused to comment.

Naavi

Posted in Cyber Law | 2 Comments