Billion Dollar Heist (2023)

Bank robberies, Heists & Crime Movie Collection.

Moderator: Maskath3

Watch on Amazon   Heist Merch   Collectables

Bank robberies, Heists & Crime Movie Collection.
Post Reply

Billion Dollar Heist (2023)

Post by bunniefuu »

It's Friday,

and it is, of course,

the Muslim prayer day.

Everyone's off,

except for the skeleton staff

at the Bangladeshi Bank,

including Zubair Bin Huda,

who is the duty manager.

He's part of

the elite team of employees

who run

the SWIFT banking system,

which is a highly secure

banking system

that sends money

around the world.

Now, Bin Huda goes,

as he does every day,

to the SWIFT printer

to check up on the transactions

from the day before.

There are usually printouts

of transactions

that came in overnight.

The SWIFT software would print

out a ledger every single day,

an audit trace of every single

transaction that occurred

on paper.

But when they came in

on February 5th morning,

as they usually do,

they found there were

no SWIFT messages at all.

In fact, the printer's

shut down. It won't work.

They try and turn it on.

Nothing will kick it

back into life.

He assumes it was simply

a technical error,

shrugs, goes home for the night,

comes back in

on Saturday morning

to check the system again.

The next day,

they somehow manually

get the printer to work.

This deputy head manager

walks in the room,

the printer starts working, and

these weird messages come out.

The printer

starts spewing out

all of these transactions,

including individual requests

to the Fed in New York

for $1 billion.

At that moment,

it's panic stations.

When I was growing up,

the biggest crime in Britain

ever recorded

was the Great Train Robbery.

It was an extraordinary thing.

They stole about 2.5 million.

That's about $4 million.

And that story

ran literally for 30 years.

Four million dollars.

What you're about to hear

is the story of an attempt

to steal...

a billion dollars

It's told by world-leading

cybersecurity and legal experts

and journalists:

the very people

who uncovered the facts

and threaded them together

to reveal how dangerous the

world of cybercrime is today.

So, there are four big threats

to the world

and to the human race.

One of them

we've just experienced,

that's the pandemic.

Then you've got weapons

of mass destruction.

You've got climate change.

But barrelling down towards us

before those is cyber.

This is the possibility

of our overdependency

on network technologies

being undermined, either by

malfunctioning of the system...

New problems are emerging

the day after an Amazon

web service outage.

Massive and mysterious,

a global outage...

...or by a targeted att*ck.

More than a thousand companies

have been crippled

by this att*ck so far.

Sounds like we're looking

at a 2022 with more hacks,

more lost money.

So, when I started hunting

hackers in the early 1990s...

our enemy was really simple.

All the malware,

all the viruses,

all the att*cks were

done by teenage boys.

What will your parents think?

I've been doing this job

for two decades now.

When we first started,

the people writing viruses

and malware

were doing it for fun,

to get their name in lights,

to say, "Look what I can do."

No flash, please.

When I started analysing

viruses, they looked like this.

Malware was still spread

on floppy disks.

They were spreading at the speed

of people travelling the world

and carrying the viruses

with them.

Michelangelo has

proven less harmful than feared.

All the stuff you've got

in there you may really want,

it's just gone?

Then the internet came around,

and suddenly,

malware outbreaks could

go around the world in seconds.

For the last 36 hours,

the ILOVEYOU virus has been

creating havoc around the world.

Experts have reason to worry.

The first att*ck, July 19th,

infected about 300,000

systems in nine hours.

First of all, the guys who

make a living doing security

and are trying to protect themselves

are scared shitless of you,

because you can just ruin 'em.

After the period of time

where hackers

were just doing things for fun,

some of them realised that they

could use it to make money.

Prior to, like, the 2000s...

cyber was primarily around

a disruption of websites...

defacement of a webpage.

Just as we got around 2000,

the dot-com boom, the expl*si*n,

we started into

what would become

financially motivated hackers.

This really flourished,

especially in Eastern European,

Russia, CIS bloc countries.

This was the time

of gangster capitalism,

when everyone's world in Eastern

Europe was falling apart,

where organised crime and...

former members of

the intelligence services

were taking hold

of the economy.

So you had a lot of young people

in the 1990s

who were very good

mathematicians, physicists,

computer scientists,

who simply took

the logic and the morality

of gangster capitalism online.

Virus writers

were writing viruses

to infect Windows computers,

and those computers were then

sold to email spammers,

who were using those machines

to send Viagra spam

or what have you,

basically making money.

And that changed everything.

People at that time

began to use online banking,

and they began to steal people's

online banking credentials,

from there, also get

credit card numbers,

and use that

to basically transfer funds.

Just in hundreds of dollars at

a time from these individuals.

They eventually realised

that going after individuals

was much more difficult

than just going after

the banks themselves.

Get into databases,

those databases held

credit card numbers.

Take those numbers and then

sell them on the black market.

Originally, the internet

was set up at the Pentagon...

just to be able to share

resources between computers.

And it was really never

designed to have

banking attached to it,

critical infrastructure

attached to it.

It was really designed

for availability.

It was never designed

for security.

Whereas in the early 1990s

when there was only 30,000

people connected to it

and several hundred systems,

we've moved to a system

which essentially is the

backbone of global finance.

The fact that

it's able to do that...

the fact that it's able

to sustain currently between

15 and 20 percent

of GDP globally

tells us something about

just how important

this infrastructure is.

Why did people move

into the internet

to seek economic opportunity?

Because that's where the

economic opportunity was,

untethered by norms,

untethered

by national boundaries,

and essentially limited

only by the creativity

that these individuals had.

The user nagged

the Federal Reserve Bank

with 35 payment instructions

worth $951 million.

We'd just never heard

of such a thing before.

We'd been investigating cybercrime

for a couple of decades

at that point.

You see cyber criminals go in,

and they try to transfer a few

hundred thousands of dollars,

maybe a million,

a couple of million.

But conducting a cyber-att*ck

to try to steal one billion?

That was an order of magnitude

that we had never seen before.

It was clear from early on

that it was one of the biggest

cyber heists in the world.

When we first started

hearing rumours

about something affecting

SWIFT network,

I didn't understand

how big it was.

But when we started realising

this is at a completely

different scale,

it just blew my mind.

Once they realised

that the money actually

was really gone,

then the panic began to set in.

They lost $81 million instantly

to a bank in the Philippines.

They see the $81 million

has already gone

and that nearly $900 million

extra has been requested.

They basically try to figure out

what to do next.

They have no idea what to do.

They hunted for ways to contact

the New York Fed.

Desperate calls are made

by them.

And it goes

to an answering machine.

You've reached

the Federal Reserve Bank...

Because it's Saturday

in New York,

and nobody's picking

up the phone.

- Please call back...

- It's a complete shitshow.

Total disorganisation,

at both ends, I would stress.

The New York Times Magazine

was planning a true-crime issue,

and my editor came to me

and asked I was interested

in doing it.

I looked into it a bit.

There definitely were

some intriguing elements,

and made me pay attention.

The Federal Reserve

has pretty much

depended on the SWIFbanking system,

and since there has rarely

been a hack, if ever,

of the SWIFT banking system...

the Federal Reserve

has never instituted

any sort of 24-7 hotline.

Eventually, they get

hold of somebody at SWIFT,

and SWIFT says,

"Just shut the whole lot down

until we know

what's going on here."

Badrul Khan decides before he

can actually make that decision,

he has to talk to the deputy

governor of the bank,

which he does.

Deputy governor doesn't want to

take the decision upon himself,

so he talks to the governor.

And guess what.

The governor says,

"It's probably a mistake.

We won't shut it down."

Work week begins

at the Bangladesh Bank

on Sunday morning,

and it's then that the general

manager of the bank

comes in and begins to take

stock of what had happened.

They're running out of options.

They're not sure what to do.

Fed is still closed in New York.

They go through

all the SWIFT material,

discover that most of

the money has gone

to the bank in Manila.

And these desperate

messages are sent out:

"Stop the transactions.

Hold that money. Do not

allow it to be withdrawn.

It's our money.

It's been stolen."

But there's a problem.

Five, four,

three, two, one!

Happy New Year!

It's Chinese New Year,

and the Rizal Commercial Bank

is closed.

The thieves chose

a sequence of days...

from Friday, Saturday,

Sunday and Monday,

when one or another

of the three countries

that would be communicating

with one another

was shut down for a holiday.

You've got to hand it

to these guys.

They knew it.

They knew that if they did it

over that weekend,

with the Friday,

the Muslim holiday,

the Sunday and the Saturday,

everything closed in New York,

and the Monday,

Chinese New Year.

They've got four days

to get the heist done.

This is really classy planning.

In that respect,

it was really an ingenious plan.

It's kind of like a great film

director in a malevolent way,

planning out, you know,

a very complex film.

The country of Bangladesh

is the 170th poorest country

in the world.

One billion dollars

is huge to them.

When we talk

about cyber-att*cks,

they're not just zeros and ones.

We're not just talking

about people

moving around zeros and ones,

deleting zeros and ones.

One billion dollars

to Bangladesh

potentially means that people

starve in the country.

These things have potential

serious repercussions.

The Bangladesh Bank

heist was significant

because it showed how fragile

global banking was as a whole.

Banks don't just operate

as single isolated entities.

They're part of a system.

And that system is vulnerable.

The US Federal Reserve holds

trillions of dollars in accounts

kept by central banks

all around the world.

Its computer security systems

are state of the art, making it

one of the most difficult

financial institutions to hack.

The criminals realise

that it can't get into

the network system of the Fed,

but the Fed has to talk

to other central banks

around the world,

and this is

where they find a flaw.

The criminals turn

their attention

to the banks'

communication systems.

Every day, the Fed places

thousands of transactions

on behalf of the central banks

that hold US dollar reserves

at the Fed.

The Federal Reserve

has pretty much depended

on the SWIFT banking system

to get its instructions

about transfers.

SWIFT sends money

around the world

to thousands of member banks.

It's the main way that banks

dispatch money to one another.

SWIFT allows you

to transfer money

from one bank to another,

no matter where you are

in the world.

Make international

wire transfers.

The whole banking system

is integrated,

and they depend

above all else on SWIFT,

the international transaction

mechanisms, to work.

What it means is,

all it takes

is a single weak link

to bring down the whole network.

So although the target

is the Fed,

they are looking for a bank

with which the Fed communicates,

which holds a lot

of its reserves in New York.

But it's a long way away,

in a distant time zone

from the Fed,

and it's likely to have

patchy security systems in place

in its computer network.

My colleagues in Dhaka,

they were chasing it

for a long time.

It was a robbery of a scale

that we hadn't heard of.

The first thought

that came to my mind was,

because it was the

Bangladeshi Central Bank,

I thought the hackers found it

somehow easier to target it.

Because it was Bangladesh,

I suspected they would

be more vulnerable

to cyber-att*cks as such.

"Hmm. A Bangladeshi bank.

Probably doesn't have

the same level of security

and if they do,

it's probably one or two people,

not a team of 6,000

working on it.

Let's go for it."

These attackers

weren't just skilled

in breaching networks,

figuring out how

to get into an organisation.

They had to study that

SWIFT software deeply.

This att*ck happened

well before that February 5th,

when the bank employee walked in

and saw that printer hadn't

printed out the audit jobs

and couldn't figure out

what was going on.

This att*ck started more

than a year prior to that.

These attackers had been

working for months

in the build-up until that day.

It is a mistake

for people to think

that this was something

that happened overnight.

It is a mistake

for people to think

that this happened in a month,

or two months or three months.

It is a slow,

methodical approach,

because it's a business,

all right? You build it.

Bank robberies used to be

something that happened

in the real world.

Now they only happen

in the online world.

If you would try to steal

$100 million in banknotes,

that would be, like,

ten trucks full of notes.

If you drive ten trucks

full of notes out of the bank,

someone would notice.

But when you do the same thing

online, no one notices anything.

Every movie you've ever seen

of them breaking into a bank

is them doing it

over a bank holiday

or something of that nature.

Same concept here.

This isn't Matthew Broderick

sitting in front of a computer,

like w*r Games

back in the 1980s,

some kid in their basement.

These are

criminal organisations.

Each person has a skill set.

It's kind of like that

Ocean's Eleven-type thing.

You know,

"This guy could cr*ck the bank,

this guy could do

the surveillance cameras,

this is the getaway,

this is the conman."

You all have a role to play,

and you need everybody

to execute their role

to the best of their abilities

for you to be

successful and get it out.

So how do you pull off

a heist of this magnitude?

It takes the right crew of

highly skilled specialists.

And it all starts not with ones

and zeros, but with people.

Cybercrime is about

gaining credentials

to gain access,

stealing the keys.

The social engineer

is critical to a hack.

It's how you get in,

and you get in

not through digital means,

you get in through human means.

It's to do with psychology.

The criminals have to ensnare

one of the employees

of the Bangladeshi Bank,

beginning by going through

their social media profiles

and looking

for suitable targets.

Our relationship

with the computer

is one of perceived intimacy;

that when we're using

a computer,

no one else can see

what we're doing, we believe,

and it's just us and the screen.

And if we were to read

an email from a friend,

we tend to believe it

at face value.

They found

close to three dozen employees.

And they constructed

a simple spear-phish email:

an email message that pretended

to be from a guy

named Rasal Alam.

And Rasal Alam said,

"Hey, I just wanna

work at your company.

Here's a rsum attached.

Have a look."

And it turned out

that they mailed that

to about 36 different employees,

and three of them

opened that attachment

connected to that email.

It was a zip file,

and the zip file contained

just a document inside.

They opened up the document

and it was his rsum.

It was a rsum for Rasel Ahlam,

who wanted to work at the bank,

but unbeknownst

to those individuals,

also contained

malicious code inside.

We can look at any data breach,

and the root cause

has either been

a technical problem

or a people problem.

And the technical problems

can be really hard

and really expensive

and really slow to fix,

but at least we can fix them.

But in the end, we have

no patch for human brains.

There's no way to fix the people

who do stupid mistakes.

When attackers try to send

these spear-phishing emails,

they try to do two things.

They try to look very normal.

It was just a rsum.

They try to fly under the radar,

to look as legitimate

as possible.

And the second is they often

try to use enticing techniques.

New dangers tonight from

the Love Bug computer virus,

this time disguised

as a friendlier email.

The first internet virus

that went around the world

in less than 48 hours was

called the ILOVEYOU virus.

And already,

business interruption costs

are estimated at more than

a billion dollars.

You would be sitting

there working away,

and then suddenly,

in your inbox,

you get an email which says,

"I love you."

And it could well be

that this is a person

who you've always

held a torch for.

And so, of course,

you're very excited,

and you press on the link,

and then you're doomed.

What happens is,

the virus infects your machine

and proceeds to email everyone

you've ever emailed.

The end result of that

is the mail servers

get bogged down,

and the only way

to solve the problem

is to shut the servers down,

hence the interruption.

The ILOVEYOU virus

was one of the first viruses

that had really

worldwide impact.

It was still a virus

written by a guy

that just wanted to get

his name in lights.

He wanted to see his virus

travel around the world

a little bit

and maybe get

in the news somewhere,

and then him be able to say,

"Oh, I wrote that."

Mr de Guzman hardly

seemed to comprehend the chaos

inflicted on

the world's computers.

But what happened was, it

spread so quickly and so fast,

it brought down email

all over the world,

and having email go down

was monumental.

Experts say that the ILOVEYOU

virus could end up costing

the world economy $10 billion

in lost work time.

It became the first sign to show

that we relied on the internet.

The internet was the basis for

our financial transactions,

for the way we do business.

I would talk to people

and remind them

and educate them and say,

"Look, you can't just click

on any attachment

that comes to you in an email."

I remember talking to a guy

about the Anna Kournikova virus

that purported to be nude

pictures of Anna Kournikova.

And he told me, he said,

"Yeah, I knew it was a virus.

I thought it was probably

a virus. But what if it wasn't?

What if it really was

nude pictures?

So I double-clicked on it."

People just don't realise

what clicking on that

attachment means.

Cyber criminals and hackers

realised a long time ago

that your username and password,

particularly to

your email account,

could get them into your

stock brokerage account,

to your online

banking account,

to send phishing emails

to other contacts.

If you protect

yourself properly,

the chances are

you won't be a victim

of what one would call

"drive-by hacking".

If, however, you're being

specifically targeted

by a hacking group,

they will follow that trace.

And they will get you.

Now, we know that at least three

members of the Bangladeshi Bank

were targeted by this after

the social engineer

had scanned

all of their social media,

and at least three of them

opened the letter

and took the bait.

Once that code

began executing

on those bank employees'

computers,

it would reach out back

to the attackers

and tell them that

these machines are now infected

and give them full control,

as if they were sitting

in front of the keyboard,

just like those employees.

There was malware

in the system

that was actually

copying screenshots,

copying keystrokes of employees,

and no one knew.

They've got

their foot in the door.

This is the essential

first step.

The first layer of security

has been breached.

And the digger, the person who

is getting deeper and deeper

into the computer network,

has to be a very

advanced hacker.

This is when you need

a real professional.

They're like ghosts.

Nobody can see them,

but they're mapping every

single bit of that network.

In the Bank of Bangladesh,

you had computers that are all

interconnected to each other,

and they're connected

using what's called a switch.

In your average bank, that has

a good security program,

those switches are

what's called segmented.

So each of those switches

only allow

a certain number of computers

to talk to each other

rather than every computer

to talk to each other.

But in the case of

the Bank of Bangladesh,

in the back-office network, they

were using these very cheap,

literally $10 switches

that didn't do any segmentation.

Every computer was potentially

connected to each other.

Basically,

it's a cost-cutting exercise.

But that cost-cutting exercise

was what the digger needed.

Those attackers

began to do

what we call a lateral traverse

across the network,

search for other computers

to infect,

look for credentials.

Whenever you log

into a computer,

your credentials are cached.

They're put into the memory

of the computer.

Attackers are able

to filter through that memory

and find used usernames

and passwords.

They don't always know

what they're for,

so they try to collect as many

credentials as they can

and see, "What computers can

I see from this computer?",

and just begin to use them

over and over again

and just try them.

Eventually, they hop on

and are able to connect

to another computer.

They get onto that one.

It's still not what

they're interested in,

but they're able to find more

usernames and passwords

and try those

on all the other computers

they can see

from that advantage point.

That's how they move across

the network over and over again.

They would delete

all traces of themselves

as they moved

across the network,

ultimately jumping from

computer to computer

until they found

the SWIFT terminal,

their ultimate goal in order

to make wire transfers

out of the Bank of Bangladesh.

It takes a long time.

They're there for months.

This is an ongoing process.

If at any moment they're

discovered to be in there,

then the whole

operation is finished.

With the Bangladeshi Bank heist,

you basically have two

operations running in parallel.

You have an offline operation

going on,

which is to do with

the money laundering.

It's the fence's responsibility

to set up

the recipient accounts.

They're gonna end up

with cold, hard cash,

and they need individuals

on the ground

to pick up that cash

and move it.

And so, in May of 2015,

before they'd even got

into the SWIFT terminal,

they were able to recruit

a Chinese individual

to go to the Philippines and

open up four bank accounts there

at a bank called RCBC.

You have to make sure

those people inside the bank

in the Philippines

have been properly corrupted

and properly instructed

as to what their role is.

The fence opens up

these accounts,

puts $500 in each of them,

and then they just go to sleep

for nine months.

These attackers were

inside the Bank of Bangladesh

for a full year,

which is incredible.

They actually got

onto that SWIFT terminal

exactly one year later...

on January 29th, 2016.

In any bank,

you have different employees.

You have back-office employees,

administrative employees,

but you also have computers

that are connected

directly to

financial transactions.

And only users who have specific

access to those machines

are allowed to use them.

When we talk about the case of

the Bank of Bangladesh,

there was a single computer

that had credentials

from a shared employee.

You had an employee that

would use that SWIFT terminal,

but also had their own computer

in the normal back-office area.

Once they got onto

that employee's computer,

they were able to jump across.

They waited. They basically

did a recon on the system.

They crawled around.

They looked and tried to fully

understand how this worked,

how SWIFT worked, how each bank

employee would make a request

into the SWIFT system,

where it would go,

how to direct that to branches

where they had set up

these accounts.

And in this case, it was just

very simple and very clever.

The thief is

not so much someone

who is physically

taking out the money

and stuffing it into a bag.

They're making sure

that every bit on the system

is coordinated.

There are all sorts of things

to get right

before that fatal moment

when the request is made.

Everything has to be

really, really

precisely coordinated

to get all the timing right.

You've got four days.

You can't afford a slip-up.

When the attackers

got into the SWIFT terminal

on January 29th of 2016,

they paused for about five days

to get their malicious

software ready

that allowed them

to cover their tracks

when they were on

that SWIFT terminal.

They decided to wait

until February 4th.

And this is no accident.

They have chosen

a long weekend

due to holidays in different

parts of the world.

That means,

instead of the usual two days

they have to get away with it

before alarms

start going off everywhere,

they've got four days.

It's brilliant.

February 4th, 2016,

was a Thursday.

That's the last day of

the working week in Bangladesh.

In Bangladesh, they work

from Sunday to Thursday.

So, at some point late

in the afternoon,

the SWIFT transaction operator

in the Bangladeshi Bank

logs off his terminal.

But three hours later,

the thief logs into

that terminal

and starts to impersonate him.

They logged into that SWIFterminal at 8:36 p.m.,

after they believed,

or really knew,

that all the bank employees

had gone home for the weekend.

And they put forward

35 different wire transactions

from that SWIFT terminal,

totalling $951 million,

almost $1 billion,

completely unheard of.

Ten hours

behind Bangladesh,

New York is waking up.

The first thing

that the Fed sees

is 35 requests

for almost the entire holdings

of the Bangladeshi Bank.

Usually, it's figures of sort

of $300,000, $500,000.

They want almost a billion!

The operator, perhaps

unsurprisingly, rejects it,

sends it back to Bangladesh.

But he rejects it not because

this is an absolutely crazy

amount of money,

but because the requests

are wrongly formatted.

As much research

that they had done,

they didn't really understand

how to fill out

those SWIFT transfers.

They were missing what's called

an intermediate bank.

New York Federal Reserve

replied to them,

via the SWIFT system,

back to their computer

that they were sitting

in front of, virtually,

saying, "Hey, these transactions

are missing information."

They think on their feet.

They reformat the requests,

send them back...

and hold their breath

to see what happens.

They ultimately corrected

34 of them.

They had forgotten one.

The one did have

the intermediate bank

went to Deutsche Bank.

That order was for $20 million

to a charity called the Shalika

Foundation in Sri Lanka.

But they had made

a typo as well,

and they had misspelled

"foundation" as "fandation".

And so Deutsche Bank

saw that typo

and questioned it and, again,

held that transaction

due to that typo.

We use that

as the poster child

for why you need

to learn how to spell.

Otherwise, you can lose

$20 million.

Ultimately, when

they return the other 34...

Bingo.

The operator approves them.

Four of them went through.

The green light is given.

The heist is on.

Those four went through

to those bank accounts

in the Philippines

that had been opened

more than six months earlier.

And they were able

to transfer out $81 million

to the bank in the Philippines.

Ultimately, they were about

to transfer $1 billion

from the Bank of Bangladesh,

but they didn't want

anyone to find out.

They began to cover

their tracks.

Normally, as a bank employee,

you'll load up

the SWIFT software,

you'll see on the screen

all the latest transactions,

you can make transactions.

And so the attackers deleted all

records of those transactions.

But it's not just digital.

In the world of finance,

everything must be a hard copy.

And the attackers

knew that as well.

Every SWIFT transaction

that takes place

is immediately printed out

locally in the Bangladeshi Bank.

So that printer cannot

be working

when the heist is going on.

The attackers h*jacked

all of those print jobs,

replaced all of those

print jobs with zeros

so that nothing would

come out of the printer.

Now, the other 30

wire transactions sat around.

And, ultimately,

the attackers waited,

and they waited...

And they logged out at

3:59 a.m. Bangladesh time.

Potentially, they thought

that in New York,

the business day ended

at five p.m.,

and they weren't gonna hear

any more.

The New York Fed

had actually stopped

the rest of the transactions,

because the address for

the bank in the Philippines

was on Jupiter Street.

J-U-P-I-T-E-R.

Right, now this is when

the story gets really weird.

In a totally unrelated incident

two years earlier,

we have a Greek shipping

magnate, Dimitris Cambis,

and he is buying eight tankers.

What Dimitris knew,

but not many other people,

was that the money

for these eight oil tankers

came from Iran,

and Iran was under US sanctions.

Someone in the US

caught wind of the fact

that the Iranians were

financing Mr Cambis.

His company was put on

the sanctions watch list,

and his company

was called Jupiter Seaways.

It was just their bad luck

that they designated

the money transfers

to go to the Jupiter branch

of the Rizal Bank in Manila.

As the transfers were being sent

out from the New York Reserve

to the Philippines,

the Jupiter name was caught

by the computer system.

It halted these transactions.

The Fed had to take

a second look.

They stopped it

because they realised,

"Wait, we have somewhere

in the order 35 transactions

coming from

the Bank of Bangladesh,

adding up to $1 billion?

You know, this isn't usual."

So they held them

and sent a message back,

asking for confirmation.

Had the attackers waited

just one more hour,

they could have replied to them

via the SWIFT system,

saying these transactions

were not a mistake.

Ultimately,

the Bank of Bangladesh

might have lost

much, much more.

So far, they managed

to get $81 million.

But, boy, did they come close

to hitting the jackpot.

Just under $1 billion

was very, very nearly

stolen from this bank.

The next day,

the bank employees came in,

and the printer wasn't working,

because they installed

their malicious code

to prevent that from happening.

Ultimately,

those bank employees

didn't get it fixed

until February 6,

which would have been a Sunday.

When the printer started,

all these messages came out,

messages from the Fed asking,

"What are these 30 transactions?

Did you mean to make these?"

That triggered

the Bank of Bangladesh

to realise something

had gone wrong.

It was very clear

that they were in deep,

such that the bank manager...

This is the Bank of Bangladesh,

the federal bank, the national

bank of the country,

did not notify the leaders,

the government of Bangladesh.

He kept it under wraps.

He notified someone he knew

who knew about security.

"Get on a plane,

get to Bangladesh.

I need you to look at

these computer systems."

Initially, the governor

and his whole team

were quite perplexed.

They didn't quite know

what had happened.

So they thought that

some money had been routed

to a wrong account;

it would come back.

I get this strange phone call

from the governor's office

asking me if I would

drop everything

and come to Dhaka, Bangladesh.

So I assembled a team...

and we flew down.

When we arrived there, we met

with the Bangladesh Bank team.

And that's when I discovered

all the horrifying details

of what had actually happened.

They decide,

"Let's look at the CCTV.

What's that going to tell us?"

There were eight

hours' worth of tapes

that had to be gone through.

Your gut instinct is,

you have a malicious insider.

A physical person had to go in,

log into that machine

and try to make these transfers,

because this att*ck

hadn't happened before.

They had a SWIFT room,

which was locked.

And typically when

the SWIFT operators

needed to do something on SWIFT,

they had to go into the room,

sit in that chair and terminal,

and there was only

one shadow we could find.

We eventually decided

it was the person

sweeping the place after hours.

They were saying, "How could

somebody process the transaction

when there was nobody there?"

I mean, even after the payment

instructions had been sent,

they had no idea for a very long

time what was happening.

They didn't think it was a hack.

They had no traces of a hack.

But they watched eight hours of

that footage over that weekend

and realised there was

no one at that computer.

Nothing.

They had no idea that

the Bank of Bangladesh

had been breached by hackers.

Only after we see these things

happen over and over again,

we realise that cyber

has such capabilities.

Bangladesh was a bit of

a bombshell for all of us.

Hackers and most cybercrime,

it's like smash-and-grab crime.

Quickly grab something

and monetise it

as swiftly as you can.

You know, storm a bank

with shotguns, blow a safe,

fill some bags with cash.

Cybercrime...

It doesn't lend itself well

to long conspiracy

and lots of investigation

and investment

into understanding your target.

I mean, you couldn't

do Bangladesh

unless you really understood

the internal workings

of the central bank

and all the actors involved.

That's not something

that freelance hackers

really are good at.

That requires a level of

investment into resources

and frankly intelligence

that has to be sustained.

To organise something

of that complexity

and for it not to be noticed

by the intelligence agencies

of the state

where that is being planned

would be very,

very difficult indeed.

These hackers went in

and looked at the zeros and ones

in the software

and reverse engineered it,

turned it back into

understandable code.

That's not something

that happens overnight.

It was pretty clear

that this isn't just

normal criminals.

This has to be something bigger.

Once attackers have gained

access to their target network,

they want to stay undetected.

And we've seen many

interesting examples

of how exactly this is done.

What exactly happened

at the Natanz nuclear facility

last week?

It's a question people in Iran

around the world

have been asking

since a fire was reported

at Iran's main uranium

enrichment facility on Thursday.

We're used to Trojans

and viruses on the internet,

but this is the first worm

designed to damage

the physical world.

In 2010, attackers created

a piece of malicious software

that was designed to infiltrate

Iran's nuclear programme,

to get into their centrifuges,

in particular,

get onto computers

that controlled

their centrifuges.

Iran says it will

retaliate against any country

that conducts cyber-att*cks

on its nuclear sites.

The intention

was to spin the centrifuges

of Iran's nuclear capabilities

out of control,

make the centrifuges explode

and push them ten years back

in the uranium enrichment programme.

As a piece of malware,

it was 40 times larger

than any piece of malware

that had ever been

encountered before.

It would have taken

the most advanced,

brilliant computer engineers

years and years of human

working hours

to produce this.

Why was it so big?

Because it needed

to cover itself up.

The attackers

were actually recording

the network traffic,

the normal network traffic,

and then playing it back

to the sensors

when they started modifying the

operations of the centrifuges

they were trying to break.

This is the equivalent of,

in the real world,

recording the CCTV footage

from a security camera

and then playing it back

to the camera

when you're doing

something bad.

That's what Stuxnet was doing.

And in the Bangladesh heist,

they were doing

something similar.

Once they made

their transactions,

they wanted to make sure no one

realised they had happened.

They were actually falsifying

the information

about transactions.

The recording of the

transactions were being done

both in electronic format,

but also falsifying the data

being sent to the printers,

which actually looked like

everything was fine.

So you find out how

you're being tracked,

and then you try

to cover your tracks.

Stuxnet did that.

The Bangladeshi heist

did it as well.

Once that money

arrived in the Philippines,

they needed to change

that money into cold, hard cash.

Right now, it's still in

digital ones and zeros,

just a transaction that said

the money has moved

from the Bank of Bangladesh

to these accounts at RCBC.

Four accounts.

The thieves had to

get it out of the Philippines,

make it disappear.

So how were they going

to do that?

There is one industry

in the Philippines

where there is absolutely

no oversight,

where it's a cash-only business.

There are no records, no names.

That is the casino industry.

When we talk about

laundering funds,

we're talking about

taking dirty, illicit funds,

running them through

a legal business

so that if I came

to you and said,

"Hey, where'd you get

that $81 million?",

you could have a paper trail

to show that you won it back.

The hard part

is not stealing the money.

The hard part is moving the

money into a form you can use

without getting caught.

And one method we've seen

for quite a while is gambling.

It was very clear that,

if, at all, there was a place

for you to do that,

it would have been

the Philippines,

because the casinos

are not regulated at all.

It's like a lot of

high-flying gamblers

who'd kind of fly to Manila,

crowd these numerous casinos

in Manila,

lots of money coming in.

People don't question

that kind of money.

I mean, you know...

"Well, as long as

it's coming to us,

we don't bother too much

about where it is coming from."

The thieves knew

if they could get that money

into the casinos,

it would essentially be lost.

What happened was,

the manager from

the Philippines bank,

she was the one who'd opened

those four accounts

using fraudulent IDs.

She got the money withdrawn from

the bank in the Philippines.

From there, it started to go

through something

called Philrem.

It's a bit like a Western Union

in the Philippines,

transferred into pesos.

I don't know

if you've ever used

Philippine pesos before,

but that's one hell

of a lot of pesos, $22 million.

In fact,

it's over one million banknotes.

They actually had

to request that cash

to come from a sister

branch location,

that arrived in boxes.

The bank manager was seen by

one of the other bank employees

collecting those boxes

and literally going outside

and loading them up

into a Lexus.

And that money

was driven away.

So, we're talking stacks

of bills carried in vans

to the Solaire Casino

right by the airport.

It allows the Chinese gamblers

to come off the plane.

Five minutes, they're on

the floor playing baccarat.

The money goes to this place.

It's wheeled in wheelbarrows

across the casino floor

up to this guarded escalator.

There's so much

physical cash involved,

they've enlisted their

own crew of gamblers

to launder the stolen funds.

And they just played baccarat,

all day long.

They had individuals,

mostly appeared to be Chinese

nationals that they had,

I assume, hired to take

those funds and launder them.

You change that cash

into casino chips,

play a few games,

cash in the chips.

And when you get that cash back,

that is then laundered.

And this wouldn't

have been unusual.

This was the Chinese lunar week.

That would've been very common

for individuals,

high rollers, to come

into the Philippines

and play at the casinos

during that time.

Spending $22 million in

a casino over a weekend,

let's face it, could be fun.

Doing this story

and trying to figure out

where in history

to sort of place this thing.

Was this the biggest

heist of all time?

No, but it certainly looked

to be the biggest cyber heist

of a bank in history.

And over the next few days,

I just remember

calling up my sources

at Symantec

and a couple other

cybersecurity firms

and getting in touch with

a guy named Eric Chien.

We have all kinds of

sensors sitting on networks

and computers

all over the world.

Any time some sort of

cyber criminal, some attacker,

is trying to breach a computer,

they're leaving traces behind.

Every att*ck

has a signature.

If you look at it long enough,

if you study it,

if you work it long enough,

you can understand

the way they do things.

The way they state something,

the way they code

a particular way,

the methodology of the att*ck,

the step-by-step approaches.

It might be considered

like Sherlock Holmesian

to come up with this idea.

"Because he walks

with a gait this way,

and he does this..."

But it is true.

We see those signatures.

We see those patterns.

What we discovered was,

by looking at the artefacts

that these attackers had used,

the malicious binaries

they had used,

the code inside of it,

as well as the email accounts

that they used

to send the initial

spear-phishing messages,

we were able to map this back

to an attacker back in 2014.

Sony Pictures is mainly housed

in Culver City.

And in 2014,

Sony Pictures went down,

which was unheard of.

On that day in November,

people would have come in,

tried to swipe their badge

and not even be able

to get into the office.

They get

into the building finally

and then they discover that

nothing else is working either.

Printers aren't working,

computers aren't working.

People who had laptops

connected to the network

would have immediately seen

skulls and crossbones

show up on their screens,

scrolling with scary

Halloween-type music

playing in the background.

And it said,

"Hacked by the GOP."

Guardians of the Peace.

A mysterious crew of hackers,

also known as the Lazarus Group.

We'd call them

the Lazarus Group.

They've been responsible

for many, many att*cks

over the years.

You know, political statements

and bringing down some

websites in South Korea

and also the White House in the

United States and the Pentagon.

Now, at this point,

the penny has dropped.

Sony has been hacked.

The hack att*ck

has had a devastating effect

with an avalanche of leaks

revealing personal information

of employees

and salacious email exchanges

of A-list celebrities.

They ultimately compromised

Sony Pictures Network,

got inside

and wiped 10,000 computers.

On top of that,

they actually stole

all kinds of documents

and emails from Sony Pictures.

The hack

on Sony Pictures

is rocking Hollywood's

very foundation;

the industry,

warts and all, exposed.

Initially, we had no link

between the SWIFT att*ck

and the Sony Pictures att*ck.

But when we were looking

at the malware,

we found an interesting detail.

There was a component

called an indexing manager,

which was saving the logs

during the SWIFT att*ck

into an encrypted file.

The file was encrypted

with a really long key,

and when we just

googled for the key,

we found that the same key, exactly,

was used 18 months earlier

in the Sony Pictures att*ck.

This was

the moment we realised

the Bangladeshi SWIFT att*ck

was probably perpetrated

by the Lazarus Group.

So, who is Lazarus?

Well, from what we know,

they're a trans-global

criminal organisation

that's been trained

at a nation-state level.

The nation states really started

coming in on a criminal side...

when sanctions started.

When we start limiting

the capability of a nation

to get cash, and we up

the methodology

to monitor

the way they're getting cash,

they turn to different approaches.

So if you're a country

that's under sanction

and your ability to get funds

has been compromised,

you may be motivated to

go to the Lazarus Group

to fix your problem.

It's like a job for them.

It is a job for them.

They get recruited.

It's a nine-to-five job.

They come in, and each

of them has their specialties.

They have managers,

they have targets that

they're told to go after.

When you talk about

nation states,

obviously,

for your average nation state,

most cyber offensive campaigns

are under the m*llitary.

It's very similar to how

a m*llitary organisation

would be organised for their

cyber offensive campaigns.

There is a hotel,

for example, in China

where they've taken over

multiple floors

where they essentially

have dormitories.

They go to sleep in that hotel,

they eat in that hotel,

and they don't come

out of that hotel.

They just move from

one room to another,

hack all day and night.

And the Lazarus Group

is thought to be made up

of these state-trained hackers.

What's amazing about cyber,

when you talk about

nation states,

is the cost to entry

is extremely low.

We have nation states

who have been

trying to create

nuclear missiles,

tried to create

a nuclear programme.

Places like Iran, for example.

The dollars it costs to do so,

it's extraordinary.

But if you want to build

a cyber offensive campaign,

you get two, three,

four, five guys

and potentially thr*aten

to disable the power grid

in some country.

When you talk about

trying to rob a bank

or produce illicit dr*gs

and sell them,

the amount of people

required on the ground,

the amount of connections,

and for the dollars

that you would receive,

is nothing compared to,

"Let's get three guys,

break into a bank

and potentially

transfer $1 billion."

Back in the VIP room

of the Solaire Casino in Manila,

the money-laundering operation

is in full flight.

They just spend hours

upon hours gambling away,

collecting chips.

They transfer those chips

back into cold, hard currency.

You put a hundred

gamblers into the VIP lounge

playing cash, so maybe the house

has a one or two percent margin.

But all the rest is untraceable

money that they walk out with.

What's interesting

about these individuals,

they weren't interested

in winning.

They were just interested

in playing.

If you lose the money,

the money doesn't go

to the casino,

it goes to the other players.

So you can play the table

where the other players are,

your partners.

Then you can lose

the dirty money on purpose,

moving the money

to your partners.

Now it's cashed out.

Now it looks like it came from a

great win in a poker tournament

instead of being stolen

from somewhere.

So, casinos are a good way

of laundering money.

Real-world criminals have

done that for decades.

Online criminals

are doing it today.

They played for a whole week,

that whole lunar week,

every day, like workers,

nine to five, essentially,

in that casino.

Finally, the Chinese

New Year celebrations

have come to an end.

The staff at the RCBC bank

in Manila are back at work.

Now, the Bangladesh Bank

is still desperately trying

to put a stop

on any further withdrawals

from those accounts

in the Bank of the Philippines.

They've lost

$22 million already,

but there's still $59 million

left that they can save.

They're f*ring message

after message to Manila,

"Hold all transactions."

In the Philippines,

they got those messages.

They got those messages

as part of many other

transaction messages they got

that were sitting in

a printer queue

at the bottom of the stack,

and ultimately, they never

saw those messages.

At this point, the fence

gets in touch with the manager

of the bank in Jupiter Street.

"Can you please authorise

the transfer of $59 million?"

She authorises that $59 million.

It goes straight

to the Solaire Casino.

More money laundering.

Five hours later,

after increasingly urgent calls

from the Bangladesh Bank,

the manager finally puts a block

on all of the accounts.

But, really, it's too late.

The money's gone.

It's incredible when you think

what the Lazarus Group

was able to pull off with

just some ones and zeros.

They guide their bespoke malware

into the computer network

of a bank,

and then a year later,

they're literally washing

$100 million

through a casino

in the Philippines.

It's astonishing.

But what's really, really scary

is what happened

just a year later.

Now back to

the major cyber-att*ck,

the ransomware crippling 200,000

computers in 150 countries.

The thousands of targets all

received this ominous message

in English on their screens:

Everyone was basically locked up

with this malware

that we discovered had been

launched by the same attackers

as the Central Bank

of Bangladesh.

So they design this malware,

and then they lose

control of it entirely.

And that caused chaos.

Ambulances were

diverted to other hospitals.

Patients were turned away,

their operations cancelled.

You know,

the first sign that something

was seriously wrong was when

hospitals in the United Kingdom

started telling patients,

"Don't come."

That their systems had been

locked up with ransomware.

It's unclear if it was

accidentally released too early,

it appears so,

or if it was

designed not to work

and just begin wiping computers,

because it didn't matter.

Even if you paid them, you would

not get the decryption key.

They didn't have

the decryption key.

They couldn't decrypt your files anymore.

Japan, Turkey

and the Philippines

were also affected.

In the US, FedEx was hit.

That virulent virus

spiralled out of control.

In Germany, it att*cked the

network of the Deutsche Bahn,

German Railway.

In Spain,

WannaCry hit Telefonica,

the biggest telecommunications company.

It hit the banking systems,

and ATMs didn't work.

This thing was hitting companies

in something like 150 countries.

Other targets in the US

include Merck Pharmaceutical

in New Jersey.

Even the company that makes

Oreo cookies may have been hit.

So, you had the health

service, you had transport,

you had communications,

you had the finance system,

and you had governance

all with one tiny piece

of crappy malware, WannaCry.

In other att*cks,

they have to send you

a spear-phishing email,

trick you into double-clicking

on an attachment.

In this case, your computer

just had to be on,

connected to the internet,

and it would have got infected

by WannaCry.

It succeeded because

the crappy malware

was being infiltrated

into the systems

on the back

of a much more powerful tool

called EternalBlue,

which had been developed by

the National Security Agency

in the United States.

The thing the NSA

never wanted to talk about

was the fact that it was

travelling on a digital m*ssile

that had been built

at its own intelligence agency.

They repurposed something

created by the US government,

leaked

by the Russian government,

put it into their ransomware

that allowed it to spread

all over the world,

any computer on at that time.

So one crappy piece

of malware

can hit every single aspect

of the critical national infrastructure

within the space

of about ten days

in different countries.

Eventually, there's a court case

after about a month.

There's a court case in Manila.

Ultimately, the bank manager

didn't want anyone to find out.

But when he finally got in touch

with the Bank

of the Philippines, they said,

"If you need this money returned,

you need to get a court order."

So he files a court order,

but court orders are public

in the Philippines,

like in many other countries.

A reporter spots it and realised

that this has happened,

publishes it in a newspaper,

and it all comes out.

The $81 million

money-laundering scandal

is now considered one of

the biggest bank heists in Asia.

But how exactly

did thieves steal

such a huge amount of money?

Not just known

in the Philippines

and the Bank of Bangladesh,

when the Bangladesh

government finds out

the bank manager has been

doing this behind the scenes,

but the whole world finds out.

And ultimately,

the Bangladesh Bank

needs to get assistance

from the FBI.

The New York Fed is involved.

The United States is involved.

This becomes

a whole worldwide issue

and begins to ripple across

the financial industry

that this was even possible.

Experts believe that hackers

were able to break into the

New York Federal Reserve's

special account for Bangladesh,

getting away with $81 million.

Now, Bangladesh's Central Bank

governor, Atiur Rahman,

has resigned after hackers stole

tens of millions of dollars

from the nation's

foreign reserves.

The bank was criticised for

its handling of the breach...

The governor was

an excellent central banker.

I have a lot of respect for him.

He was deemed one of the top

bankers by the Asia MoneyWeek.

And poor fellow, that time,

he was faced with

this sort of scenario

which he honestly

didn't understand.

He had really pushed

the financial system

in Bangladesh into

the 21st century.

He had to essentially fall

on his sword and resign

in disgrace,

and his career was ruined.

Many others at the bank

had to resign as well.

An emotional Maia Deguito,

the manager of the RCBC branch

in Jupiter Street in Makati,

insists she is innocent

in the face of accusations

she is involved in the

money-laundering scheme.

So far, only the branch manager

has been charged by the

Anti-Money Laundering Council.

One of the great

injustices of this whole scandal

is that the only person who

got convicted of anything

was Maia Deguito,

and she was just the mid-level

branch manager of the RCBC,

the bank in the Philippines

that received the actual funds.

Typical, isn't it?

A crime that was conceived

and carried out

by a whole bunch of men,

and the only person who

gets done for it is a woman

who probably wasn't that

guilty in the first place.

But she received a sentence

of 56 years in jail

and a fine of $109 million,

which is significantly more

than the thieves actually stole.

To my mind,

there's no question

that she was a scapegoat.

I mean, the currency traders

who turned that $81 million

into pesos got off scot-free.

There are a couple of

Chinese operators

who brought these gamblers

in from China.

We know that they received tens

of millions of dollars in cash.

They vanished back to Macau.

No trace of them was ever found.

We can't say for sure,

but certainly it looks like

people at the Rizal Bank headquarters

buried these requests

to stop these transactions.

But nobody else at the Rizal

Bank was ever accused.

Oddly enough, in this giant

scheme that involved

a half a dozen countries,

nearly $1 billion,

only one bank employee

in a small branch in Manila

was ever convicted of

doing anything wrong.

It's incredible. Total impunity.

I think the most

important lesson

of the Bangladesh Bank

is a lesson of scale.

The internet is

a fantastic thing.

It's made our world

much, much smaller.

You can do all sorts of things.

It's fantastic.

But that interconnectivity,

where everything

is linked to everything else,

means that if you get bad actors

in that system,

then the damage

is infinitely more immense

than it was before.

When I started this job

two decades ago,

you had to explain to people,

what is a virus?

What is a cyber-att*ck?

Today, we don't talk about

making sure this file doesn't

get deleted any more.

We literally talk about making

sure the supply chain is up,

food can reach people's tables.

Our job is not just to protect

people's computers.

Our job is to ensure

society is up and running.

Everything

that we use now,

water, electricity,

the financial system,

the comms system,

depends on the integrity

of unbelievably complex

networked computer systems.

And our dependence

is becoming such

that, should anything go wrong,

be it a technical hitch

or be it a hack,

it can actually lead

to our lives grinding to a halt

in a very short space of time.

We're sort of in a state

where we're increasing

our vulnerability

and our att*ck surface

every single day.

And instead of pausing

and thinking about

how to lock up our power grid,

really, where our energy has

been focused is on escalation.

Countries like the United

States, China and Russia

have already arrogated

the right to themselves

to att*ck with full force,

whether cyber

or conventional weapons,

against anyone who brings down

a serious piece of critical

national infrastructure.

We've had Stuxnet blowing

up the Natanz centrifuge plant.

We've had ransomware att*cks,

which hit the Eastern Seaboard.

There was no gas

to the Eastern Seaboard

for a whole week

in the United States.

We had Russia

against the Ukraine,

shutting out the power

in the middle of winter.

We're talking about

people losing their lives.

We've also had cyber-att*cks

that potentially affected

US elections.

We had the healthcare in the UK

brought down,

dialysis machines

no longer working.

This is an extremely

fragile situation,

much more fragile

than the period of dtente,

because so many more

countries have these weapons.

Malware is much more difficult

to control than nuclear weapons.

People always warn me

of the cyber Pearl Harbor

or the cyber 9/11,

but it's almost worse than that.

Every day, there are thousands

of cyber-att*cks,

and we're just getting more and

more and more inured to them.

It's like a plague.

I think we'll see much

more hostile cyber activity,

much more cyber bank robberies,

much more cyber espionage.

We'll see much more cyber w*r.

In many ways,

I think we've seen nothing yet.

As att*cks increase

in their sophistication

and their range,

then the impact

can be ever greater.

There is a cyber-att*ck on

critical national infrastructure

coming to a place near you

within the next

five to ten years.

If it's done well,

and if it's really malicious,

that could be catastrophic.

What's amazing about the

Bank of Bangladesh heist is...

they almost walked away

with $1 billion.

The mistakes that they made

that led to them only walking

with $81 million

were literally a typo in a name

and potentially

not being patient enough,

waiting just one more hour.

We could be telling

a completely different story.

Presumably, these guys

kept perhaps 95 percent

of that cash.

You could walk out

with 95 percent

of what you came in with,

have nobody trace that money,

no record of it whatsoever,

and get on a plane with it,

and you're home free.

Even if you had invested

a year's work,

that you had recruited

a really decent set of hackers,

that you had corrupted

bank officials,

you'll be looking at a profit

of about $75 million.

For a year's work,

not a bad pay-off.

The Bank of Bangladesh heist

showed them what was possible.

They proved that

they could do it.

After that att*ck,

it didn't stop.

We saw continued att*cks

on various banks across Asia,

I think in

the Philippines again.

And also, they started hacking

the cryptocurrency exchanges,

where people store their Bitcoin

and Monero digital currency,

which has proved to be

incredibly lucrative for them.

In 2017,

Lazarus was thought

to have successfully att*cked

at least five Asian

cryptocurrency exchanges.

That's a total of

$571 million that was lost.

Cryptocurrency exchanges

just have the bare minimum

of security, we're learning now.

In 2020, as the global

pandemic spiralled,

AstraZeneca, makers of

one of the key vaccines,

was hit by an att*ck,

extorting the company

and stealing sensitive

information for profit.

The sums involved

are astronomical,

and Lazarus is still

very much at large.

They have been designated

by the United States an APT;

that's an

advanced persistent thr*at.

Now, the fundamental criteria

is that they represent a thr*at

to US national security

and national infrastructure.

So, just by dint of it

being called an APmeans that the Lazarus Group

is serious stuff.

Marvel fans,

think HYDRA.

James Bond films,

think of SPECTRE.

It's something like that.

Now, it's tempting to

think this comparison is absurd,

but this is the scale

that Lazarus operates on.

Arguably, they're the most

potent cyber criminals

in business today.

So the nation state's

involvement in cybercrime

means that cybercrime

has actually morphed

into cyber warfare.

You can have zero trust

in these systems.

You need to assume that

everything has been broken,

everything is being listened to,

that everything can be captured,

and operate accordingly.

If a small group

can plan something

and get away with $81 million,

which involved

the Fed in New York,

SWIFT in Brussels,

the Bangladeshi Bank in Dhaka,

and then all the peripherals

in Manila,

just think about what one of the

really professional operations

in China, Russia,

the NSA, GCHQ,

just think what havoc

they could wreak.

And every year, the hacks get

bigger, the damage greater,

the implications graver.

Armies literally have hackers

hammering at the gates.

And it just takes

a simple breach,

one person, one weak link,

and those armies

will storm the defences

and bring down a network

that our way of life depends on.

It happened in Bangladesh

in 2016.

And believe you me, it's going

to happen again very soon.
Post Reply