100 Hackers Stole $13m from ATMs in JapanAdded: Tuesday, May 24th, 2016
Category: About Torrents > Staying Safe And Secure
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2016
Police suspect an international crime syndicate of stealing over $12.7m from cash machines across Japan in less than 3 hours: this audacious heist involved thousands of well-coordinated withdrawals.
It is believed that a hundred people, none of whom have been apprehended, coordinated the use of fake bank cards carrying account details illegally obtained from a bank in South Africa. Apparently, 100 hackers used the forged cards at 1,400 convenience store ATMs in the capital Tokyo and 16 other prefectures, each making withdrawals of 100,000 yen at a time (the limit of the cash machines), thus making 14,000 withdrawals altogether.
As part of the investigation, Japanese police have asked the authorities in South Africa to find out how the bank card information was obtained. According to transaction data retrieved from the ATMs, the thieves most likely used information for 1,600 bank cards issued by the unnamed South African bank.
The local media reported that the withdrawals began just after 5am on 15 May, and the last one was made just before 8am the same day. The police believe that the members of the international crime syndicate may no longer be in the country. By using bank cards issued in a different country from the one where the fraud occurred (and on Sunday when banks were closed), the thieves were probably able to buy themselves enough time to leave Japan before their crime was discovered.
Industry watchers point out that Japan is the latest victim of a range of ATM heists which took place using bank cards forged using leaked bank information. In one case, criminals withdrew 4.5bn yen in 26 countries, including Japan, over two years.
Tuesday, May 24th, 2016
|Wish I could have been in on that!|
|If 14,000 cash advances by 100 people using 1600 forged South Afrikaan Card's credentials in Japan over a 15 hr period (that 8am should be a PM unless Ninja's were involved) A "few" red flags should have been raised & some kind of automated shutdown action should have been activated on all SA cards in Japan , until someone at Card Services assisted processing the dodgy data with a human perspective to see if the flagged transactions were a genuine skurity breech. It's not as if the monitoring for suspicious CC transactions gets turned off on Sundays. A possible security exploit that may have exploited is that the reported "swarm crime" only hit on convenience store ATM baby machines , rather than the adult street ATM's.This scenario is only a wild guess as I never really got to intimately know the workings of the baby ATM's & how they were connected to Card Service's processing center's|
Be careful of what you wish bobpa , if you were hypothetically at the top of the food chain on this seemingly clean rip of $1400 million Yen , you would hypothetically end up with ~1000 Million Yen in cash. I these baby ATM's would only hold & dispence the 1,000 & 5,000 Yen notes & not hold or dispence the 10,000 Yen note. On average I'd expect to get back a 70 30 split of 1000 /5000 yen notes , which makes for a large stack of cash to get in & out of your alledged Criminal Mastermind Hotel room. When you try to move 700,000 x 1000 Yen & 60,000 x 5000 yen notes the volume of cash money starts to become a problem to turn into a much smaller size & volume to get outta the country.... I would hypothetically buy expensive stamps that had a buyer waiting for me in another country to move "money" around back in the skurity free 20th century. 760,000 individual notes are impossible to get thru customs no matter how ou pack them.
|posted by (2016-05-25 14:27:36)|
|13 million... That's a drop in the bucket to help expose a huge security flaw. You could almost call them white hat hackers. lol|
|Funny. I have an account with that bank, switching banks!||
Most Popular Stories