Thursday, March 28, 2024

Mexican central bank Says that Hackers Stole Millions of Dollars from Mexico Banks

Mexican central bank confirms that hackers transferred more than $15 million from their domestic banks. The attack was detected in April and the central bank declines to reveal the banks hit with the cyber attack and how much cybercriminals money attackers pulled out in cash.

Governor of Mexican central bank Alejandro Diaz de Leon says “the electronic payments system SPEI was not directly targeted and the depositors’ money is safe. He also added it is impossible to say that all vulnerabilities had been closed”

The SPEI is a domestic payment system operated in Mexico to make electronic fund transfers, it is similar to the Society for Worldwide Interbank Financial Telecommunication(SWIFT).

Also Read City Union Bank Cyber Attack – Nearly $2 Million Transferred Illegally via SWIFT system

Diaz de Leon said Reuters that preliminary estimates pointed to around 300 million pesos in “irregular transactions,” but he said some of that had not been withdrawn and could still be recovered.

It still remain’s unclear on how much cash was withdrawn, but some trusted sources reported Reuters that there had been a number of withdrawals from the bank after the fraudulent transfers.

Diaz de Leon said, “We are very conscious that this has affected users, and we are sorry about that and we are taking immediate actions to recover the speed of the system with full security”.

Also, he added the Mexico central bank had a cybersecurity unit starting from 2013 and it strengthened after the 2016 Bangladesh attack.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles