recommended reading

Threatwatch

Barclays computer coughs up $2.1 million to gangsters

Social engineering; Unauthorized use of system administrator privileges

Police found a keyboard video mouse, or KVM, switch attached to one of the branch's computers.

Eight men between ages 24 and 47 have been arrested for their roles in a gang that took control of the Barclays Bank machine.

A man purporting to be an IT engineer placed installed the device a day before the theft on April 5.

“A KVM switch, which has a 3G router attached, allows a user to control multiple computers. This enabled the gang to remotely transfer funds to other back accounts,” explains the BBC.

Barclays officials said they were able to recover a significant amount of the stolen money.

"We identified the fraud and acted swiftly to recover funds on the same day. We can confirm that no customers suffered financial loss as a result of this action,” a bank official said.

The money was transferred from the branch in Swiss Cottage in north London.

The raid might be tied to an attempted cyber heist of Santander that was revealed last week.

The same police team is carrying out both investigations.

A detective said the arrests "are a different level, it's really the top tier of this criminal network that have been arrested. . . All criminal networks have a head and we very much believe we have now apprehended our 'Mr. Big' as part of this operation."

ThreatWatch is a regularly updated catalog of data breaches successfully striking every sector of the globe, as reported by journalists, researchers and the victims themselves.

sector

Financial Services

reported

September 20, 2013

reported by

BBC

number affected

Unknown

location of breach

London, UK

perpetrators

Criminals

location of perpetrators

London, UK

date breach occurred

April 05, 2013

date breach detected

April 05, 2013

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.