The Bangladesh Bank robbery, also known colloquially as the Bangladesh Bank cyber heist,[1] was a theft that took place in February 2016. Thirty-five fraudulent instructions were issued by security hackers via the SWIFT network to illegally transfer close to US$1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh Bank, the central bank of Bangladesh. Five of the thirty-five fraudulent instructions were successful in transferring US$101 million, with US$81 million traced to the Philippines and US$20 million to Sri Lanka. The Federal Reserve Bank of New York blocked the remaining thirty transactions, amounting to US$850 million, due to suspicions raised by a misspelled instruction.[2] As of 2018, only around US$18 million of the US$81 million transferred to the Philippines has been recovered,[3] and all the money transferred to Sri Lanka has since been recovered. Most of the money transferred to the Philippines went to four personal accounts, held by single individuals, and not to companies or corporations.
Background
Like many other national banks, Bangladesh Bank, the central bank of Bangladesh, maintains an account with the Federal Reserve Bank of New York to deposit, maintain, and transfer foreign currency reserve of Bangladesh. The foreign currency reserve of Bangladesh, a growing economy, often reaches multiple billions of US dollars. As of September 2020, Bangladesh has a foreign currency reserve of US$39 billion.[4] The Society for Worldwide Interbank Financial Telecommunication (SWIFT) network is used to communicate with the bank holding the foreign exchange account in order to withdraw, transfer, or deposit the currency.
The 2016 cyber-attack on the Bangladesh Bank was not the first attack of its kind. In 2013, the Sonali Bank of Bangladesh was also successfully targeted by hackers who were able to remove US$250,000.
In both cases, the perpetrators were suspected to have been aided by insiders within the targeted banks, who assisted in taking advantage of weaknesses in the banks' access to the SWIFT global payment network.[5][6]
Events
Capitalizing on weaknesses in the security of the Bangladesh central bank, including the possible involvement of some of its employees,[7] perpetrators attempted to steal US$951 million from the Bangladesh Bank's account with the Federal Reserve Bank of New York. The theft happened sometime between 4–5 February 2016, when Bangladesh Bank's offices were closed for the weekend.
The perpetrators managed to compromise Bangladesh Bank's computer network, observe how transfers are done, and gain access to the bank's credentials for payment transfers. They used these credentials to authorise about three dozen requests to the Federal Reserve Bank of New York. These requests were made to transfer funds to accounts in the Philippines and Sri Lanka.
Thirty transactions worth US$851 million were flagged by the banking system for staff review, but five requests were granted; US$20 million to Sri Lanka (later recovered),[8][9] and US$81 million lost to the Philippines, entering the Southeast Asian country's banking system on 5 February 2016. This money was laundered through casinos and some later transferred to Hong Kong.
According to a report published in The Straits Times, investigators suspected that the criminals used the Dridex malware for the attack.[10]
Funds diverted to the Philippines
The money transferred to the Philippines was deposited in five separate accounts with the Rizal Commercial Banking Corporation (RCBC); the accounts were later found to be under fictitious identities. The funds were then transferred to a foreign exchange broker to be converted to Philippine pesos, returned to the RCBC and consolidated in an account of a Chinese-Filipino businessman;[11][9] the conversion was made from 5 to 13 February 2016.[12] It was also found that the four U.S. dollar accounts involved were opened at the RCBC as early as 15 May 2015, remaining untouched until 4 February 2016, the date the transfer from the Federal Reserve Bank of New York was made.[12]
On 8 February 2016, during the Chinese New Year, Bangladesh Bank informed RCBC through SWIFT to stop the payment, refund the funds, and to "freeze and put the funds on hold" if the funds had already been transferred. Chinese New Year is a non-working holiday in the Philippines and a SWIFT message from Bangladesh Bank containing similar information was received by RCBC only a day later. By this time, a withdrawal amounting to about US$58.15 million had already been processed by RCBC's Jupiter Street (in Makati City) branch.[12]
On 16 February, the Governor of Bangladesh Bank requested Bangko Sentral ng Pilipinas' assistance in the recovery of its US$81 million funds, saying that the SWIFT payment instructions issued in favor of RCBC on 4 February 2016, were fraudulent.[12]
Attempted fund diversion to Sri Lanka
The US$20 million transfer to Sri Lanka was intended by hackers to be sent to the Shalika Foundation, a Sri Lanka-based private limited company. The hackers misspelled "Foundation" in their request to transfer the funds, spelling the word as "Fandation" or "Fundation". This spelling error gained suspicion from Deutsche Bank, a routing bank which put a halt to the transaction in question after seeking clarifications from Bangladesh Bank.[8][13][14]
Sri Lanka-based Pan Asia Bank initially took notice of the transaction, with one official noting the transaction as too big for a country like Sri Lanka. Pan Asia Bank was the one which referred the anomalous transaction to Deutsche Bank. The Sri Lankan funds have been recovered by Bangladesh Bank.[8]
Investigation
Bangladesh
Initially, Bangladesh Bank was uncertain if its system had been compromised. The governor of the central bank engaged World Informatix Cyber Security, a US-based firm, to lead the security incident response, vulnerability assessment and remediation. World Informatix Cyber Security brought in the forensic investigation company Mandiant, for the investigation. These investigators found "footprints" and malware of hackers, which suggested that the system had been breached. The investigators also said that the hackers were based outside Bangladesh. An internal investigation has been launched by Bangladesh Bank regarding the case.[8]
The Bangladesh Bank's forensic investigation found out that malware was installed within the bank's system sometime in January 2016, and gathered information on the bank's operational procedures for international payments and fund transfers.[12]
The investigation also looked into an unsolved 2013 hacking incident at the Sonali Bank, wherein US$250,000 was stolen by still unidentified hackers. According to reports, just as in the 2016 central bank hack, the theft also used fraudulent fund transfers using the SWIFT global payment network. The incident was treated by Bangladeshi police authorities as a cold-case until the suspiciously similar 2016 Bangladesh central bank robbery.[15]
The Philippines
The Philippines' National Bureau of Investigation (NBI) launched a probe and looked into a Chinese-Filipino who allegedly played a key role in the money laundering of the illicit funds. The NBI is coordinating with relevant government agencies including the country's Anti-Money Laundering Council (AMLC). The AMLC started its investigation on 19 February 2016, of bank accounts linked to a junket operator.[12] AMLC has filed a money laundering complaint before the Department of Justice against a RCBC branch manager and five unknown persons with fictitious names in connection with the case.[16]
A Philippine Senate hearing was held on 15 March 2016, led by Senator Teofisto Guingona III, head of the Blue Ribbon Committee and Congressional Oversight Committee on the Anti-Money Laundering Act.[17] A closed-door hearing was later held on 17 March.[18]Philippine Amusement and Gaming Corporation (PAGCOR) has also launched its own investigation.[8] On 12 August 2016, RCBC was reported to have paid half of the Ph₱ 1 billion penalty imposed by the Filipino central bank (BSP).[19] Prior to that, the bank reorganized its board of directors by increasing the number of independent directors from four to seven.[20]
On 10 January 2019, Maia Santos Deguito, a former manager at RCBC, was convicted on 8 counts of money laundering and sentenced to 4 to 7 years imprisonment for each count at a Makati City Regional Trial Court.[21] On 12 March 2019, RCBC sued Bangladesh Bank for embarking "on a massive ploy and scheme to extort money from plaintiff RCBC by resorting to public defamation, harassment and threats geared towards destroying RCBC's good name, reputation, and image."[22]
On 6 February 2023, the First Division of the Court of Appeals dismissed Deguito's appeal and upheld the Makati City Regional Trial Court's conviction in 2019.[23]
In the February 29, 2024 judgment on the Bangladesh Bank robbery, the New York Supreme Court dismissed 3 causes of action—conversion, aiding and abetting conversion, and conspiracy to commit conversion—against Rizal Commercial Banking Corporation and defendants Ismael Reyes, Brigitte Capiña, Romualdo Agarrado and Nestor Pineda for lack of personal jurisdiction. It however allowed the Bangladesh Bank case concerning the $81-million cyberheist to proceed on other grounds including the return of money received.[24]
United States
FireEye's Mandiant forensics division and World Informatix Cyber Security, both US-based companies, investigated the hacking case. According to investigators, the perpetrators' familiarity with the internal procedures of Bangladesh Bank was probably gained by spying on its workers. The US Federal Bureau of Investigation (FBI) reported that agents have found evidence pointing to at least one bank employee acting as an accomplice. The FBI also alleged that there is evidence that points to several more people as possibly assisting hackers in navigating the Bangladesh Bank's computer system.[25] The government of Bangladesh has considered suing the Federal Reserve Bank of New York in order to recover the stolen funds.[8]
FBI suspicion of North Korea
Federal prosecutors in the United States have revealed possible links between the government of North Korea and the theft.[26] According to this report, U.S. prosecutors suspected that the theft was perpetrated by criminals backed by the government of North Korea. The report also said that to be included in the charges are "alleged Chinese middlemen", who facilitated the transfer of the funds after it had been diverted to the Philippines.[27]
Some security companies, including Symantec Corp and BAE Systems, claimed that the North Korea-based Lazarus Group, one of the world's most active state-sponsored hacking collectives, were probably behind the attack. They cite similarities between the methods used in the Bangladesh heist and those in other cases, such as the hack of Sony Pictures Entertainment in 2014, which U.S. officials also attributed to North Korea. Cybersecurity experts say Lazarus Group was also behind the WannaCry ransomware attack in May 2017 that infected hundreds of thousands of computers around the world.[28]
The Cybersecurity and Infrastructure Security Agency published an alert "FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks", which attributed the Bank of Bangladesh hack in 2016 to BeagleBoyz. The agency claimed that BeagleBoyz is a threat actor group under the North Korean government's Reconnaissance General Bureau, and have been active since 2014.[29]
US National Security Agency Deputy Director Richard Ledgett was also quoted as saying that, "If that linkage from the Sony actors to the Bangladeshi bank actors is accurate—that means that a nation state is robbing banks."[30]
The U.S. has charged a North Korean computer programmer, Park Jin Hyok,[31] with hacking the Bangladesh Bank, alleging this was carried out on behalf of the regime in Pyongyang. The same programmer has also been charged in connection with the WannaCry 2.0 virus and the 2014 Sony Pictures attack.[32]
Other attacks
Computer security researchers have linked the theft to as many as eleven other attacks, and alleged that North Korea had a role in the attacks, which, if true, would be the first known incident of a state actor using cyberattacks to steal funds.[33][34]
Response from linked organizations
The Rizal Commercial Banking Corporation (RCBC) said it did not tolerate the illicit activity in the RCBC branch involved in the case. Lorenzo V. Tan, RCBC's president, said that the bank cooperated with the Anti-Money Laundering Council and the Bangko Sentral ng Pilipinas regarding the matter.[35] Tan's legal counsel has asked the RCBC Jupiter Street branch manager to explain the alleged fake bank account that was used in the money laundering scam.[36]
The RCBC's board committee also launched a separate probe into the bank's involvement in the money laundering scam. RCBC president Lorenzo V. Tan filed an indefinite leave of absence to give way to the investigation by the authorities on the case.[37][38] On 6 May 2016, despite being cleared of any wrongdoing by the bank's internal investigation, Tan resigned as President of RCBC to "take full moral responsibility" for the incident.[39][40] Helen Yuchengco-Dee, daughter of RCBC founder Alfonso Yuchengco, will take over the bank's operations. The bank also apologised to the public for its involvement in the robbery.
Bangladesh Bank chief, governor Atiur Rahman, resigned from his post amid the investigation of the central bank robbery and subsequent laundering of the money by the RCBC staff in the Philippines. He submitted his resignation letter to Prime Minister Sheikh Hasina on 15 March 2016. Before the resignation was made public, Rahman stated that he would resign for the sake of his country.[41] After his resignation, Rahman defended himself by claiming that he had foreseen cyber security vulnerabilities one year ago and had hired an American cyber security firm to bolster the firewall, network and overall cyber security of the bank. However, he blamed bureaucratic hurdles for preventing the security firm from starting its operations in Bangladesh until after the cyber heist.[42]
On 5 August 2016, the Bangko Sentral ng Pilipinas approved a ₱1 billion (US$52.92 million) fine against RCBC for its non-compliance with banking laws and regulations in connection with the bank robbery. This is the largest monetary fine ever approved by BSP against any institution. RCBC stated that the bank would comply with the BSP's decision and pay the imposed fine.[43]
The Bangladesh Bank continued its efforts to retrieve the stolen money and had only recovered about US$15 million, mostly from a gaming junket operator based in Metro Manila. In February 2019, the Federal Reserve pledged it would help Bangladesh Bank recover the money and SWIFT has also decided to help the central bank rebuild its infrastructure. The Bangladeshi central bank also believed that RCBC was complicit with the robbery filing a legal case in U.S. District Court for the Southern District of New York regarding the case in early 2019 accusing the Philippine bank of "massive conspiracy". In response, RCBC filed a lawsuit accusing Bangladesh Bank of defamation believing that Bangladesh Bank's claims are baseless.[44]
In 2020, the Bangladesh Bank filed a case in the New York Supreme Court against RCBC over multiple causes of action. Three of these causes of action were dismissed on 29 February 2024. In June of the same year, the New York Court of Appeals rejected RCBC's petition to have the case heard in a different court.[45]
Aftermath
The case threatened to reinstate the Philippines to the Financial Action Task Force on Money Launderingblacklist of countries that made insufficient efforts against money laundering.[46] Attention was given to a potential weakness of Philippine authorities' efforts against money laundering after lawmakers in 2012 managed to exclude casinos from the roster of organizations required to report to the Anti-Money Laundering Council regarding suspicious transactions.
The case also highlighted the threat of cyber attacks to both government and private institutions by cyber criminals using real bank authorisation codes to make orders look genuine. Swift created the Swift CSP (customer security programme) as a response. SWIFT has advised banks using the SWIFT system to strengthen their cyber security posture and ensure they are following SWIFT security guidelines known as CSCF (customer security controls framework).[47]
Nana Sarnadi Informasi pribadiLahir7 Juni 1964 (umur 59)Bandung, Jawa BaratAlma materSepa Milsuk (1988)Karier militerPihak IndonesiaDinas/cabang TNI Angkatan DaratMasa dinas1988—2022Pangkat Brigadir Jenderal TNINRP32083[1]SatuanKesehatan (CKM)Sunting kotak info • L • B Brigadir Jenderal TNI (Purn.) dr. Nana Sarnadi, Sp.OG., M.M.R.S. (lahir 7 Juni 1964) adalah seorang Purnawirawan TNI-AD yang terakhir menjabat sebagai Kapusrehab Kemhan.[2] Nana Sa...
Monarchy of Ottoman Empire Sultan of the Ottoman EmpireOsmanlı padişahıImperialImperial Coat of armsLast to reignMehmed VI4 July 1918 – 1 November 1922 DetailsStyleHis Imperial MajestyFirst monarchOsman I (c. 1299–1323/4)Last monarchMehmed VI (1918–1922)Formationc. 1299Abolition1 November 1922ResidencePalaces in Istanbul: Eski Saray Topkapı (1460s–1853) Dolmabahçe (1853–1889; 1909–1922) Yıldız (1889–1909) AppointerHereditary Ottoman Imperial Standard Family tree...
JambesariDesaKantor Desa JambesariPeta lokasi Desa JambesariNegara IndonesiaProvinsiJawa TimurKabupatenBanyuwangiKecamatanGiriKode pos68425Kode Kemendagri35.10.17.2001 Luas... km²Jumlah penduduk... jiwaKepadatan... jiwa/km² Untuk tempat lain yang bernama sama, lihat Jambesari. Jambesari adalah sebuah desa yang berada di Kecamatan Giri, Banyuwangi. Desa ini menjadi persimpangan jalan menuju Kemiren, Boyolangu, dan Grogol. Pembagian Wilayah Desa Jambesari terdiri dari 5 dusun, 11 Rukun W...
Gempa bumi Sulawesi Barat 2021Pemandangan drone Gedung Gubernur Sulawesi Barat, yang hancur ketika gempaTampilkan peta SulawesiTampilkan peta IndonesiaWaktu UTC2021-01-15 01:28:17ISC619715767USGS-ANSSComCat ComCatTanggal setempat15 Januari 2021 (2021-01-15)Waktu setempat02:28:17 WITA (UTC+8)Kekuatan6.2 MwKedalaman10 km (6,2 mi)Episentrum2°59′S 118°56′E / 2.98°S 118.94°E / -2.98; 118.94Koordinat: 2°59′S 118°56′E /...
Виконт Колвилл Калросский (англ. Viscount Colville of Culross) в графстве Пертшир — наследственный титул в системе Пэрства Соединённого королевства. Содержание 1 История 2 Лорды Колвилл из Калросса (1604) 3 Бароны Колвилл из Калросса (1885) 4 Виконты Колвилл из Калросса (1902) 5 Ссылки Ист...
Sports season1995-96 IHL seasonLeagueInternational Hockey LeagueSportIce hockeyNumber of games82Number of teams19Regular seasonFred A. Huber TrophyLas Vegas ThunderSeason MVPStéphane Beauregard (Spiders)Top scorerRob Brown (Wolves)PlayoffsPlayoffs MVPTommy Salo (Grizzlies)Turner CupChampionsUtah Grizzlies Runners-upOrlando Solar BearsSeasons← 1994–951996–97 → The 1995–96 IHL season was the 51st season of the International Hockey League, a North American minor ...
Politics of Tanzania Constitution Human rights Government President (list) Samia Suluhu Hassan Vice-President Philip Mpango Prime Minister (list) Kassim Majaliwa Legislature Speaker Job Ndugai Judiciary Chief Justice of Tanzania Ibrahim Hamis Juma Court of Appeal High Court Elections Recent elections General: 201520202025 Political parties Subdivisions Regions Districts Foreign relations Ministry of Foreign Affairs Minister: Stergomena Tax Diplomatic missions of / in Tanzania Nationality law ...
King of Saudi Arabia since 2015 Not to be confused with King Salmon, Solomon, or Salman bin Abdulaziz bin Salman Al Saud. In this Arabic name, the surname is Al Saud. Salman سلمانCustodian of the Two Holy MosquesKing Salman in 2020King of Saudi ArabiaReign23 January 2015 – presentBay'ah23 January 2015PredecessorAbdullahCrown princes Muqrin bin Abdulaziz (2015) Muhammad bin Nayef (2015–2017) Mohammed bin Salman (2017–present) Prime Minister of Saudi Arabia In office23 January 2015 �...
US Supreme Court justice from 1858 to 1881 Justice Clifford redirects here. For other uses, see Justice Clifford (disambiguation). Attorney General Clifford redirects here. For the Attorney General of Massachusetts, see John H. Clifford. This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Nathan Clifford – news · newspapers ...
American football player (born 1989) American football player Allen BaileyBailey with the Chiefs in 2015No. 97, 93Position:Defensive endPersonal informationBorn: (1989-03-25) March 25, 1989 (age 35)Sapelo Island, Georgia, U.S.Height:6 ft 3 in (1.91 m)Weight:288 lb (131 kg)Career informationHigh school:McIntosh County Academy(Darien, Georgia)College:Miami (FL)NFL draft:2011 / Round: 3 / Pick: 86Career history Kansas City Chiefs (2011–2018) At...
Religious food offered in Hinduism and Sikhism temples Several terms redirect here. For other uses, see Prasad (disambiguation). This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research should be removed. (March 2023) (Learn h...
سيساميا تقسيم إداري البلد اليونان [1] إحداثيات 40°57′29″N 23°25′29″E / 40.958055555556°N 23.424722222222°E / 40.958055555556; 23.424722222222 السكان التعداد السكاني 330 (resident population of Greece) (2021)493 (resident population of Greece) (2001)487 (resident population of Greece) (1991)329 (resident population of Greece) (2011) الرمز الجغرافي 734270 �...
Aggadic midrash; no longer extant Rabbinic literatureTalmud Readers by Adolf Behrman Talmudic literature Tannaitic Mishnah Tosefta Amoraic (Gemara) Jerusalem Talmud Babylonian Talmud Later Minor Tractates Halakhic Midrash Exodus Mekhilta of Rabbi Ishmael Mekhilta of Rabbi Shimon bar Yochai Leviticus Sifra (Torat Kohanim) Numbers and Deuteronomy Sifre Sifrei Zutta on Numbers (Mekhilta le-Sefer Devarim) Aggadic Midrash Tannaitic Seder Olam Rabbah Alphabet of Rabbi Akiva Baraita of the Forty-nin...
جامعة سيرمرسوك معلومات التأسيس 1987[1] الموقع الجغرافي إحداثيات 64°11′27″N 51°41′46″W / 64.190833333333°N 51.696111111111°W / 64.190833333333; -51.696111111111 المكان سيرمرسوك البلد جرينلاند إحصاءات عدد الطلاب 650 (2015)[2] عدد الموظفين 100 (2015)[3] الموقع الموقع الرسمي...
Sani KaitaSani Kaita con la divisa del Kuban'Nazionalità Nigeria Altezza178 cm Peso73 kg Calcio RuoloCentrocampista Termine carriera1º gennaio 2018 CarrieraGiovanili 2005 Kano Pillars Squadre di club1 2005-2008 Sparta Rotterdam22 (0)2008-2009 Monaco3 (0)2009→ Kuban'17 (0)2009→ Lokomotiv Mosca3 (0)2010→ Alanija Vladikavkaz6 (0)2010→ Metalist6 (0)2011→ Īraklīs6 (0)2011-2012 Tavrija7 (0)2012 Olympiakos Nicosia2 (0)2014...
مسجد عثمان كتخدا القازدغلى مسجد الكيخيا معلومات عامة القرية أو المدينة القاهرة الدولة مصر سنة التأسيس 1734 تاريخ بدء البناء (1147هـ / 1734م) تعديل مصدري - تعديل مسجد عثمان كتخدا القازدغلى أو مسجد الكيخيا (1147 هجرية / 1734م) ، هو أحد المساجد التي انشئت في عصر الدولة العثمانية في...
Historical method for giving addresses to physical data blocks on hard disk drives Cylinder, head, and sector of a hard drive. Cylinder-head-sector (CHS) is an early method for giving addresses to each physical block of data on a hard disk drive. It is a 3D-coordinate system made out of a vertical coordinate head, a horizontal (or radial) coordinate cylinder, and an angular coordinate sector. Head selects a circular surface: a platter in the disk (and one of its two sides). Cylinder is a cyli...