The Lazarus Heist: The Real Money Heist

On February 5, 2016, around 8:30 PM, a printer on the 10th floor of the Bangladesh Bank started malfunctioning. When the staff caught on the malfunction at 8;45 PM, they supposed it was just another IT hiatus. Glitches had happened earlier and the staff did not suppose about it too much. Still, when the printer was rebooted, it began printing messai from the Federal Reserve Bank in New York, where Bangladesh keeps a US- dollar account, saying that the Fed entered instructions, supposedly from Bangladesh Bank, to drain the entire account-close to a billion dollars.

It was once the first signal of a compromised device that led hackers to try a daring billion-dollar heist from the Bangladesh Bank. The hackers eventually made off with USD eighty one million and the heist grew to become acknowledged as The Lazarus heist, the most audacious cyber-attack ever attempted.

Two years later, the FBI traced the heist returned to a team of North Korean hackers who went by using the identify of The Lazarus Group. And the story of the heist and the investigation comes alive now in a report through Geoff White and Jean H Lee of the BBC. According to the BBC report, the Bangladesh Bank hack was a mission that took years of planning and methodical training through a team of hackers skilled beneath the direct patronage of the government of North Korea and middlemen throughout Asia.

The hackers, Lazarus Group used fraudulent orders on the SWIFT payments system to steal US$951 million, which was once nearly all the cash in that account, from Bangladesh’s central bank account. The hackers used a Federal Reserve Bank account in New York and effectively managed to steal $81 million that was once transferred to money owed at Manila-based Rizal Commercial Banking Corporation.

The precise planning of the hack was once evident when investigations revealed that the hackers deliberately selected that particular week in February 2016 to execute their hack. That weekend additionally occurred to be the begin of the Lunar New Year in East and Southeast Asia. So, on February 8, Monday, when the money was once transferred to banks in Manila, it coincided with the begin of a most important national excursion there.

“By exploiting time variations between Bangladesh, New York and the Philippines, the hackers had engineered a clear five-day run to get the money away,” the BBC report explains. In January 2015, a harmless-looking e-mail had been sent to various Bangladesh Bank employees. It came from a job seeker calling himself Rasel Ahlam. His well mannered enquiry covered an invitation to download his CV and cover letter from a website. In reality, Rasel did not exist – he was actually a cover identity being used through the Lazarus Group, in accordance to FBI investigators,” the report says.

At least one individual inside the bank fell for the trick, downloaded the documents, and received infected with the viruses hidden inside. Once inside the bank’s systems, the Lazarus Group started out stealthily hopping from computer to computer, working their way toward the digital vaults and the billions of bucks they contained.”

The proper draining of the accounts came about solely a year later, the report says, because the hackers have been lining up the next stages, planning how to get rid of the money in such a way that it would no longer be viable to retrieve it.

As Bangladesh Bank found the missing money during that weekend, the officers struggled to work out what had happened. The Governor of the bank requested for US-based cyber-security specialist Rakesh Asthana and his organisation World Informatix’s assistance. Asthana was immediately at it and started out discovering simply how deep the hack went. He discovered out the thieves had received access to a key section of Bangladesh Bank’s systems, referred to as Swift. It’s the system used by lots of banks round the world to coordinate transfers of giant sums between themselves. The hackers did not need to take advantage of the loopholes in this system, as far as Swift’s software was involved the hackers regarded like real bank personnel

The burglars initiated the subsequent stage of their money-laundering operation on the casino floor of the Solaire, one of Asia’s most great casino floors and a famous vacation spot for mainland Chinese gamblers. $50 million was deposited in accounts at the Solaire and every other casino, the Midas, out of the $81 million that surpassed thru the RCBC bank. The last $31 million was passed to a Chinese man named Xu Weikang, who is thought to have departed city on a non-public aircraft and has no longer been viewed since, in accordance to a Philippines Senate Committee set up to investigate. The cause of using casinos was once to destroy the traceability chain. It would be almost not possible for authorities to track the stolen money as soon as it had been converted into casino chips, bet on the tables, and then modified again into cash.

Officials from the Bangladesh Bank had been capable to retrieve USD16 million of the stolen money from Kim Wong, one of the guys who organized the gambling trips at the Midas casino. He was arrested, however the costs have been dropped afterwards. The remaining USD 34 million, on the other hand, was evaporating. According to investigators, its subsequent vacation spot would convey it nearer to North Korea.

As detectives from the UK’s National Crime Agency started out working with the FBI on the investigation, they observed splendid parallels between the viruses used to breach Bangladesh Bank, and the FBI as a result brought this assault to Park Jin-hyok’s accusations. According to the FBI’s allegations, North Korea’s cyber military had now embraced cryptocurrency, which mostly bypasses the normal banking device and ought to consequently keep away from steeply-priced overheads, such as pay-offs to middlemen.

As of now, Bangladesh Bank is making an attempt to get better the relaxation of the stolen money to this day. The estimates are around USD 65 million. The Bank has taken legal action towards dozens of people and institutions, which includes the RCBC bank, which denies the allegation of breaking rules.

Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of, Inc. or its affiliates Read More


This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More