Tuesday, March 4, 2025
HomeComputer SecurityIn a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000)...

In a Single Night Cybercriminal Gang stole 3.8 million slopes (€ 860,000) from 32 ATMs

Published on

SIEM as a Service

Follow Us on Google News

Within a single night, attackers stole 3.8 million slopes (€ 860,000) from 32 ATMs that belong to Romania bank Raiffeisen in the year 2016.

Attackers used an infected RTF document file to leverage the Microsoft Word vulnerability and installed the cobalt malware in bank systems and gained control over the bank network.

The ATM looting operation took place between 9 August 2016 and 4 September 2016. On the night of 3/4 September attackers simultaneously withdraws money from different parts of the country.

Bank confirms the customer accounts are safe and they are not affected by the breach.

Also Read Advanced ATM Penetration Testing Methods

According to report attackers gained control over the ATM remotely and instructed all the 32 ATMs remotely to dispense all the money that it had available and had some people in front of the ATM to sit and collect the money.

The operation that occurs within a single night exceeds any robbery ever committed in Romania, 3.8 million lei, about 860 thousand euros reports bzi.

The extremely well-coordinated criminal organization, wearing sunglasses and hooded anoraks waiting for the command, waited for bags and bags in their hands before the Raiffeisen Iasi, Bucharest, Suceava, Timeshare, Constanta, Plitvice, Saxon and Crevedia automats.
At the hands of their leaders, at least a few buttons, 32 cars released them all the money. If more men had been involved with the criminal organization, they could have virtually eliminated all the automatons of the bank.

One of the members of the network was caught in Iasi named Dmitrii Cvasov and the authorities recovered 80,000 lei Out of 3.8 million lei from him.

All these people who took over the cash issued by ATMs were coordinated – either from the group’s command center or from other members of the group.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...