Friday, March 29, 2024

Mexican central bank Says that Hackers Stole Millions of Dollars from Mexico Banks

Mexican central bank confirms that hackers transferred more than $15 million from their domestic banks. The attack was detected in April and the central bank declines to reveal the banks hit with the cyber attack and how much cybercriminals money attackers pulled out in cash.

Governor of Mexican central bank Alejandro Diaz de Leon says “the electronic payments system SPEI was not directly targeted and the depositors’ money is safe. He also added it is impossible to say that all vulnerabilities had been closed”

The SPEI is a domestic payment system operated in Mexico to make electronic fund transfers, it is similar to the Society for Worldwide Interbank Financial Telecommunication(SWIFT).

Also Read City Union Bank Cyber Attack – Nearly $2 Million Transferred Illegally via SWIFT system

Diaz de Leon said Reuters that preliminary estimates pointed to around 300 million pesos in “irregular transactions,” but he said some of that had not been withdrawn and could still be recovered.

It still remain’s unclear on how much cash was withdrawn, but some trusted sources reported Reuters that there had been a number of withdrawals from the bank after the fraudulent transfers.

Diaz de Leon said, “We are very conscious that this has affected users, and we are sorry about that and we are taking immediate actions to recover the speed of the system with full security”.

Also, he added the Mexico central bank had a cybersecurity unit starting from 2013 and it strengthened after the 2016 Bangladesh attack.

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles