Criminals stole millions from E. Europe banks with ATM “overdraft” hack

Crime ring opened minimal accounts with banks, then boosted their withdrawal limits.

Enlarge / Using a network of ATMs and a hack of card management apps, cybercriminals made off with millions from E. European banks. (credit: Sean Gallagher)

Banks in several former Soviet states were hit with a wave of debit card fraud earlier this year that netted millions of dollars worth of cash. These bank heists relied on a combination of fraudulent bank accounts and hacking to turn nearly empty bank accounts into cash generating machines. In a report being released by TrustWave's SpiderLabs today, SpiderLabs researchers detailed the crime spree: hackers gained access to bank systems and manipulated the overdraft protection on accounts set up by proxies and then used automated teller machines in other countries to withdraw thousands of dollars via empty or nearly empty accounts.

While SpiderLabs' investigation accounted for about $40 million in fraudulent withdrawals, the report's authors noted, "when taking into account the undiscovered or uninvestigated attacks along with investigations undertaken by internal groups or third parties, we estimate losses to be in the hundreds of millions in USD." This criminal enterprise was a hybrid of traditional credit fraud and hacking. It relied on an army of individuals with fake identity documents, as these folks were paid to set up accounts at the targeted institutions with the lowest possible deposit. From there, individuals requested debit cards for the accounts, which were forwarded to co-conspirators in other countries throughout Europe and in Russia.

Meanwhile, a phishing campaign was used by the attackers to implant remote access malware on bank employees' computers. The attackers used these backdoors to gain broader access to the banks' networks, breaking into multiple systems at each bank. The attackers then targeted a third-party payment processing provider, using banks' virtual private network credentials with the processor to gain access to their network. This allowed attackers to drop multiple malicious software packages onto the processor's network. "Key amongst them was a legitimate monitoring tool installed on the processor’s Terminal Server," SpiderLabs investigators reported. "That allowed users to access the card management application via a browser."

Read 4 remaining paragraphs | Comments

Tim O’Reilly on why the future probably won’t be all that terrible

Economies as AI, humans as gut bacteria for tech, and how the Luddites got it wrong.

Enlarge / Some classic O'Reilly titles. (OK, not really. But honestly these titles would teach some folks very valuable devops skills.) (credit: @ThePracticalDev)

Author and long-time friend of Ars Technica Rob Reid recently had the opportunity to interview legendary publisher Tim O'Reilly about O'Reilly's new future-focused nonfiction book. Given O'Reilly's importance and influence—and who hasn't consulted at least one of his company's animal-covered books to shed light on some difficult bit of tech?—we asked Rob to write us a summary of the interview that we could share with the Ars audience. The full interview is embedded in this piece.

It’s almost impossible to overstate the influence Tim O’Reilly has had on tech over his career’s long span. But I’ll try. First, he’s the preeminent publisher in a modern field that inhales books despite their ancient form as software developers, IT folks, and others constantly race to keep up with the languages and skillsets of their fields. He also launched the first commercial website long before Netscape or Yahoo even incorporated (prefiguring another huge trend: AOL bought that site, then immediately screwed it up).

Convinced the Web would be hot, his company convened the summit at which Marc Andreessen and Tim Berners Lee first met. He later hosted the conclave whereat "open source software" was quite literally named, and the open source movement’s precepts were enunciated. Though he didn’t coin the term, Tim (basically) named the Web 2.0 era, and also defined it with a wildly influential article and conference series. He later published the magazine which gave us both the word “maker” and the Maker Faire, and the magazine still sits at the heart of the maker movement.

Read 13 remaining paragraphs | Comments

Star Wars: The Last Jedi looks a lot like The Empire Strikes Back at first blush

Like Force Awakens and A New Hope, but for the second part of this new trilogy.


Lucasfilm released the second trailer for Star Wars: The Last Jedi on Monday evening. It shows that—like every Star Wars movie—the next edition will be filled with space battles, lightsaber duels, and campy dialog.

The trailer makes it clear that Rey will be the central character of the upcoming movie, set to release December 15 with tickets widely available now. Rey's training by Luke Skywalker and maturation as a Jedi appear to be major themes.

For anyone entering the Star Wars universe for the first time with this latest trilogy (wait, why?), the new trailer hints at obvious parallels to The Empire Strikes Back. In Empire, Luke ignores Yoda's warnings that his training isn't complete and rushes off to save his friends, leading to his hand being chopped off by Darth Vader.

Read 5 remaining paragraphs | Comments

Linux-Desktop: KDE Plasma 5.11 bringt neues Design der Systemeinstellungen

Die zentralen Systemeinstellungen bekommen mit dem nun verfügbaren Desktop Plasma 5.11 von KDE ein neues Design. Außerdem werden nun alte Benachrichtigungen gespeichert und Nutzer können leicht Dokumente und Ordner ver- und entschlüsseln. (KDE, Linux) …

Die zentralen Systemeinstellungen bekommen mit dem nun verfügbaren Desktop Plasma 5.11 von KDE ein neues Design. Außerdem werden nun alte Benachrichtigungen gespeichert und Nutzer können leicht Dokumente und Ordner ver- und entschlüsseln. (KDE, Linux)

Gewerbegebiete: Telekom macht Preis für symmetrische 1 GBit/s zum Geheimnis

Die Deutsche Telekom will die Preise für ihre schnellsten Glasfaser-Anschlüsse in Gewerbegebieten nicht öffentlich machen. Nur Firmen in den Ausbaugebieten erfahren das Angebot per E-Mail oder am Telefon. (Glasfaser, Telekom)

Die Deutsche Telekom will die Preise für ihre schnellsten Glasfaser-Anschlüsse in Gewerbegebieten nicht öffentlich machen. Nur Firmen in den Ausbaugebieten erfahren das Angebot per E-Mail oder am Telefon. (Glasfaser, Telekom)

Nvidia: Jensen Huang beschwört erneut Ende von Moore’s Law

Zum Start der europäischen GPU Technology Conference in München hat Nvidias Chef Jensen Huang schlechte und gute Nachrichten: Moore’s Law ist schon wieder tot, aber der Universalübersetzer bald erfunden. Von Nico Ernst (GTC-Europe-2017, Steam)

Zum Start der europäischen GPU Technology Conference in München hat Nvidias Chef Jensen Huang schlechte und gute Nachrichten: Moore's Law ist schon wieder tot, aber der Universalübersetzer bald erfunden. Von Nico Ernst (GTC-Europe-2017, Steam)

Sprachassistent: Microsoft bringt Cortana für Skype

Wie ist das Wetter? Wo ist das nächste Burger-Restaurant? Nutzer können künftig Cortana in Skype um Hilfe fragen. Der Sprachassistent analysiert auch Chatverläufe, um automatisch Vorschläge anzubieten. (Cortana, Skype)

Wie ist das Wetter? Wo ist das nächste Burger-Restaurant? Nutzer können künftig Cortana in Skype um Hilfe fragen. Der Sprachassistent analysiert auch Chatverläufe, um automatisch Vorschläge anzubieten. (Cortana, Skype)

Zotac Zbox PI225 im Test: Der Kreditkarten-Rechner

Kleiner als eine 2,5-Zoll-Festplatte: Zotacs Zbox PI225 ist ein besonders kompakter und lautloser Mini-PC mit zwei USB-Typ-C-Buchsen. Das recht umfangreiche Zubehör gefällt, bei der Leistung des x86-Chips müssen Nutzer aber Abstriche machen. Ein Test v…

Kleiner als eine 2,5-Zoll-Festplatte: Zotacs Zbox PI225 ist ein besonders kompakter und lautloser Mini-PC mit zwei USB-Typ-C-Buchsen. Das recht umfangreiche Zubehör gefällt, bei der Leistung des x86-Chips müssen Nutzer aber Abstriche machen. Ein Test von Marc Sauter und Sebastian Grüner (Zotac, Blender)

Ozo: Nokia hat keine Lust mehr auf VR-Hardware

Nokia stellt den Bau der teuren Ozo-Kameras ein, die 360-Grad-Aufnahmen erstellen können und konzentriert sich auf seine anderen Geschäftsfelder. Bis zu 310 Mitarbeiter verlieren ihren Arbeitsplatz. (Digitalkamera, Nokia)

Nokia stellt den Bau der teuren Ozo-Kameras ein, die 360-Grad-Aufnahmen erstellen können und konzentriert sich auf seine anderen Geschäftsfelder. Bis zu 310 Mitarbeiter verlieren ihren Arbeitsplatz. (Digitalkamera, Nokia)

Sweden Supreme Court: Don’t Presume Prison Sentences For Pirates

In the wake of a case involving the administrator of a now-defunct private torrent tracker, Sweden’s Supreme Court has handed down an important ruling. Following requests from prosecutors seeking jail sentences for copyright infringement, the Court has ruled that the offense is not one where the presumed sentence should be imprisonment.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

The trend over the past several years is for prosecutors to present copyright infringement offenses as serious crimes, often tantamount to those involving theft of physical goods.

This has resulted in many cases across the United States and Europe where those accused of distributing or assisting in the distribution of copyrighted content face the possibility of custodial sentences. Over in Sweden, prosecutors have homed in on one historical case in order to see where the boundaries lie.

Originally launched as Swepirate, ‘Biosalongen‘ (Screening Room) was shut down by local authorities in early 2013. A 50-year-old man said to have been the main administrator of the private tracker was arrested and charged with sharing at least 125 TV shows and movies via the site, including Rocky, Alien and Star Trek.

After the man initially pleaded not guilty, the case went to trial and a subsequent appeal. In the summer of 2015 the Court of Appeal in Gothenburg sentenced him to eight months in prison for copyright infringement offenses.

The former administrator, referenced in court papers as ‘BH’, felt that the punishment was too harsh, filing a claim with the Supreme Court in an effort to have the sentence dismissed.

Prosecutor My Hedström also wanted the Supreme Court to hear the case, seeking clarity on sentencing for these kinds of offenses. Are fines and suspended sentences appropriate or is imprisonment the way to deal with pirates, as most copyright holders demand?

The Supreme Court has now handed down its decision, upholding an earlier ruling of probation and clarifying that copyright infringement is not an offense where a custodial sentence should be presumed.

“Whether a crime should be punished by imprisonment is generally determined based on its penal value,” a summary from International Law Office reads.

“If the penal value is less than one year, imprisonment should be a last resort. However, certain crimes are considered of such a nature that the penalty should be a prison sentence based on general preventive grounds, even if the penal value is less than one year.”

In the Swepirate/Biosalongen/Screening Room case, the Court of Appeal found that BH’s copyright infringement had a penal value of six months, so there was no presumption for a custodial sentence based on the penal value alone.

Furthermore, the Supreme Court found that there are no legislative indications that copyright infringement should be penalized via a term of imprisonment. In reaching this decision the Court referenced a previous trademark case, noting that trademark
infringement and copyright infringement are similar offenses.

In the trademark case, it was found that there should be no presumption of imprisonment. The Court found that since it is a closely related crime, copyright infringement offenses should be treated in the same manner.

According to an analysis of the ruling by Henrik Wistam and Siri Alvsing at the Lindahl lawfirm, the decision by the Supreme Court represents a change from previous case law concerning penalties for illegal file-sharing.

The pair highlight the now-infamous case of The Pirate Bay, where three defendants – Peter Sunde, Fredrik Neij and Carl Lundström – were sentenced to prison terms of eight, ten and four months respectively.

“In 2010 the Svea Court of Appeal concluded that the penalty for such crimes should be imprisonment. The Supreme Court did not grant leave to appeal,” they note.

“The Supreme Court has now aligned the view on the severity of IP infringements. This is a welcome development, although rights holders may have benefited from a stricter view and a development in the opposite direction.

The full ruling is available here (pdf, Swedish)

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.