How hackers steal 9 million USD from ATM in 1 hour

Cisco security experts explained the entire process that bad guys apply to withdraw the money with just over 100 real cards.

In theory, this is not possible because each card can be withdrawn for no more than 500 USD / day. However, the hacker used the method of counterfeiting in the following way:

How hackers steal 9 million USD from ATM in 1 hour Picture 1 First , they steal a real ATM card when breaking into the RBS WorldPay system (online payment service of the Royal Bank of Scotland system) stealing at least 100 payroll account information. According to WorldPay, a payroll card is a value-added money-saving card that can be used at any point of sale that accepts credit and debit cards.

Next, the hacker must figure out how to reload these cards. To do that, they broke into the RBS WorldPay system again, reloading the payroll card with a fake deposit (just numbers entered into the computer). These numbers will turn into real money when withdrawing through the ATM system.

In the next step , they have to duplicate the stolen card information into thousands of real payroll cards. This is quite easy and cheap when using different card printing devices, especially in countries that are not closely monitored.

Then , the criminals recruit a casher to go to ATMs, use fake payroll cards (but valid) and withdraw money.

Specific plans are set up with simultaneous actions in at least 49 cities around the world, including Atlanta, Chicago, Montreal, New York, Moscow, Hong Kong . on about 130 ATMs.

On November 8, 2008, this criminal network made plans and successfully withdrew $ 9 million in the night. The FBI has taken photos of some cashers from the ATM camera and is conducting an investigation.

4 ★ | 1 Vote

May be interested

  • Unique tricks to steal money from ATMsPhoto of Unique tricks to steal money from ATMs
    the vault in the middle of the street always elicits greed of bad guys and makes them find countless ways to withdraw, from using modern equipment, music players to bulldozers to picking up atms.
  • 5 tips for 'fishing' money onlinePhoto of 5 tips for 'fishing' money online
    internet crimes have been dubbed online magicians because they have thousands of moves to exploit the users' beliefs and innocence, especially taking advantage of blogging relationships.
  • Twitter was cut down by 17-year-old hackerPhoto of Twitter was cut down by 17-year-old hacker
    in just two weekends, twitter's 'microblogging' was knocked down twice by a young man living in brooklyn. the boy said he did so to alert twitter to patch the vulnerability
  • Hackers: Crime and punishmentPhoto of Hackers: Crime and punishment
    gather 10 cases of hackers around the world to see how severe the penalties are compared to the crimes committed by them
  • Russian Hacker performs a new attack tacticPhoto of Russian Hacker performs a new attack tactic
    russian hacker has stolen personal information in the us, combined with commercial software and social networks to organize destructive attacks on the internet.
  • Explore System Configuration UtilityPhoto of Explore System Configuration Utility
    among the many wizards and utilities built into microsoft windows xp, system configuration utility or msconfig is a pretty useful utility introduced in the windows 9.x operating system line.