|
Operation High Roller was a series of fraud in the banking system in different parts of the world that used cyber-collection agents in order to collect PC and smart-phone information to electronically raid bank accounts.〔Rachael King, ''Operation High Roller Targets Corporate Bank Accounts'', (Wall Street Journal ), June 26, 2012〕 It was dissected in 2012 by McAfee and Guardian Analytics.〔("Operation High Roller auto-targets bank funds", CNET News )〕 A total of roughly $78 million was siphoned out of bank accounts due to this attack.〔(Time magazine (onlie) Business and Money, "How Exactly Do Cyber Criminals Steal $78 Million?", July 3rd 2012 )〕 The attackers were operating from servers in Russia, Albania and China to carry out electronic fund transfers.〔(SC Magazine : "High roller" fraud campaign persists, origin revealed Danielle WalkerOctober 29, 2012 )〕 ==Specifications== This cyber attack is described to have the following features:〔(Huffington Post on Operation High Roller, By Michael Rundle, June 26th 2012 )〕 * Bypassed Chip and PIN authentication. * Required no human participation. * Instruction came from cloud-based servers (rather than the hacker's PC) to further hide the identity of the attacker. * Included elements of "insider levels of understanding". * Banks in Europe, United States and Colombia were targeted. * Impacted several classes of financial institution such as credit unions, large global banks, regional banks, and high-net-worth individuals. While some sources have suggested it to be an extension of Man-in-the-browser attack〔( DailyTech, June 26, 2012, "High Roller" Hacker Attack is Stealing Hundreds of Millions From the Rich )〕 Operation High Roller is reported to have harnessed a more extensive level of automation distinguishing it from the traditional methods.〔( The Register, June 27th 2012, 'Operation High Roller' stole from the rich to give to unknown auto-mule crims in the cloud )〕 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Operation High Roller」の詳細全文を読む スポンサード リンク
|