{"id":319,"date":"2005-03-17T00:00:00","date_gmt":"2005-03-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/17\/keyloggers-foiled-in-attempted-423-million-bank-heist\/"},"modified":"2021-12-30T11:37:01","modified_gmt":"2021-12-30T11:37:01","slug":"keyloggers-foiled-in-attempted-423-million-bank-heist","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/17\/keyloggers-foiled-in-attempted-423-million-bank-heist\/","title":{"rendered":"Keyloggers Foiled In Attempted $423 Million Bank Heist"},"content":{"rendered":"<p>British authorities stymied a massive bank heist that reportedly was dependent on a keylogger, the same kind of spyware that has jumped three-fold in the last year and puts consumers at risk from hackers and phishers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to reports in the British media from the BBC and the Financial Times, among others, the scheme was set to steal 220 million pounds ($423 million) from the London offices of the Japanese bank Sumitomo Mitsui.<\/p>\n<p>The National Hi-Tech Crime Unit (NHTCU), the country&#8217;s cyber-cops, began investigating last October after the bank discovered that hackers had infiltrated its network and were using a keylogger to capture keystrokes.<\/p>\n<p>Keyloggers, a type of spyware, are used by hackers and increasingly, by phishers, to snatch users account information &#8212; such as log-in names and passwords &#8212; and grab other lucrative data, including credit card numbers.<\/p>\n<p>Police arrested an Israeli man, identified as Yeron Bolondi, 32, in Israel after an attempt was made to transfer 13.9 million pounds ($26.8 million) into an account there.<\/p>\n<p>If it had been successful, the robbery would have dwarfed Britain&#8217;s previous record, the armed theft of \u00a326 million ($50 million) from Belfast&#8217;s Northern Bank in December, a crime thought to have been conducted by the IRA.<\/p>\n<p>&#8220;From what we know from our SpyAudit data, there&#8217;s a good chance this wasn&#8217;t even a planned attack,&#8221; said Richard Stiennon, the vice president of threat research for Boulder, Colo.-based anti-spyware vendor Webroot.<\/p>\n<p>According to Webroot&#8217;s SpyAudit, a for-free spyware auditing tool it makes available on its own site as well as to EarthLink subscribers, 15 percent of enterprise PCs tested have a keylogger already installed.<\/p>\n<p>&#8220;It reminds me of how Microsoft was hacked back in 2004, when a Microsoft developer&#8217;s home computer lead the hackers into Microsoft.  It all comes back to this ongoing trend of more and more malicious code being developed with keyloggers,&#8221; said Gregg Mastora, a senior security analyst with Sophos.<\/p>\n<p>http:\/\/www.techweb.com\/wire\/security\/159901593<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-319","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/319\/revisions"}],"predecessor-version":[{"id":2806,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/319\/revisions\/2806"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}