The unscrupulous activities 
of daredevil hackers who have made Automated Teller Machines (ATMs) easy
 targets in recent times pose a lot of danger to banks across the 
country, reports Ibrahim Apekhade Yusuf
In every age and time, technological 
advancement has always been a double-edged sword-offering one solution 
at a time as well as introducing, if you may, problem(s) with it. This 
is sadly the case of the Automated Teller Machines (ATM) which has 
become a nightmare of sort to banks across the globe because of the 
myriads of attacks by cyber fraudsters.
When ATM first came into the scene few 
years ago, they were generally thought to be impregnable but events have
 since proved otherwise as they have come under ferocious attacks in the
 past and it does appear that this ugly trend will continue for much 
longer.
Last week, the news media was awash with
 reports of some syndicate who invaded some banks’ ATMs across Lagos 
metropolis and other cities across the country, destroying several ATM 
facilities and subsequently made away with undisclosed cash in the 
process.
Commenting on this development, Richard 
Aloysius, a staff of a new generation bank, said this is certainly bad 
news for banks. “For banks and depositors alike, this is obviously not 
cheery news and for the growing level of unbanked population, such sad 
news would further serve to make them a lot more disinterested in owning
 bank accounts whether now or in the future.”
Echoing similar sentiments in a chat 
with a cross-section of security experts in Lagos, they told The Nation 
that cyber crimes, especially ATM-related frauds, were rampant these 
days and should be curbed before it further escalates.
While adducing reasons for the upsurge 
in ATM-related fraud, Andrew Ojei, an ICT expert in Ikeja, said ATMs 
have become easy targets because they are thought to be easy way of 
breaking into banks’ vaults these days, whether in Nigeria or abroad.
“ATM frauds are not peculiar to Nigeria.
 It’s even much worse overseas, especially judging by the spate of 
attacks and burglary in the last few weeks,” Ojei observed.
Ojei, who recalled that he once 
consulted for a new generation bank to build their ICT infrastructure, 
said not many banks are investing enough in the area of ICT security, a 
development, he said, is counterproductive.
Particularly disheartening, Ojei noted, 
is the several unreported cases of ATM-related frauds in the country. 
“Most of the banks affected have been maintaining a rather mute 
indifference,” he said somewhat regrettably.
“You have a situation where some of the 
banks deliberately compromise their ICT security and this is usually to 
the detriment of the bank on the long run because if hackers come 
calling mostly unannounced, such a bank would be a mince meat for them, 
no more no less,” he said matter-of-factly.
In the view of Bambgoye Dehinde, a 
Microsoft certified expert, he is worried that the outlook is really 
gloomy for the country where inertia has assumed a national culture of 
some sort.
“Unlike what other advanced countries 
are doing and will continue to do to nip the activities of these 
hydra-monsters in check, we in Nigeria, it does appear, are not doing 
enough in that regard and this is of serious concern.”
CBN directive on ATM security
Perhaps, this is why the apex bank had 
in March last year ordered all Deposit Money Banks to install 
anti-skimming devices on their ATMs on or before June 1, 2014, following
 the alarming rate of ATM-related frauds across the country.
The CBN had warned at the time that 
failure to do so would attract severe penalties as it would invoke 
appropriate sanctions for non-compliance in line with the regulations 
guiding ATM security.
The directive was contained in a 
circular dated March 5, 2014, which read in part, “The CBN has observed 
with satisfaction the growth in the adoption of ATMs by Nigerians as one
 of the channels of e-payment. The bank is, therefore, committed to 
ensuring that the deployment and management of ATMs are in line with 
global best practices.
“However, we have observed with dismay 
the upward increase in the number of ATM-related frauds in the banking 
system. This development does not portend good news for the industry and
 requires urgent steps to curb the abuse.
“Consequently, in addition to the 
existing guidelines on card-related frauds and in order to guard against
 card-skimming at ATM channels across the country, all DMBs are hereby 
mandated to comply with the provisions of Section 3.2 ATM operations and
 Section 3.4 ATM security of the Standards and Guidelines on ATM 
operations in Nigeria, and also install risk-mitigating devices on their
 ATM terminals on or before June 1, 2014.”
However, when The Nation placed a call 
to Ibrahim Muazu, spokesman of the apex bank, to ascertain the degree of
 compliance with the CBN directive on security precautions against 
ATM-related frauds at the bank, he neither returned his calls nor 
responded to the text messages.
A staff of the CBN who asked not to be 
named, as he was not authorised to speak on behalf of the CBN, however, 
volunteered that a lot was being done by the CBN to whip erring banks 
into order.
Nigeria not alone
Worrisome as ATM hacking is to Nigerians, it is equally a very troubling phenomenon abroad.
Only last month, a gang of computer 
hackers was believed to have stolen tens of millions of pounds from UK 
banks by ordering ATM machines to dispense cash at pre-determined times –
 even without a bank card. It is unknown which banks have been targeted,
 and the scale of losses to British banks has not been disclosed.
The computer scam was so sophisticated 
that the gang, known as Carbanak, was apparently able to order ATM 
machines to dispense cash at pre-determined times – even without a bank 
card.
The massive theft was part of a bold 
£650million raid, meticulously orchestrated over the past two years, on 
more than 100 financial institutions around the world.
Attacks by the gang, thought to be based
 in Russia but with members in Ukraine and China, are feared to be 
continuing, despite being investigated by Interpol and international 
authorities.
Internet Corporation for Assigned Names 
and Numbers (ICANN), the internet regulator that manages the global 
top-level domain system (TLDs), last week joined a long list of major 
global companies that have been compromised by cyber hackers this year. 
The attack affected vital systems belonging to ICANN and accessed the 
system that manages the files with data on resolving specific domain 
names.
ICANN said it is investigating a recent 
intrusion into its systems and believed a “spear phishing” attack was 
initiated in late November 2014 involving email messages that were 
crafted to appear to come from its own domain being sent to members of 
its staff. The attack resulted in the compromise of the email 
credentials of several ICANN staff members.
A statement from ICANN said, “In early 
December 2014, it discovered that the compromised credentials were used 
to access other ICANN systems besides email such as Centralised Zone 
Data System (czds.icann.org); ICANN GAC Wiki (gacweb.icann.org); ICANN 
Blog (blog.icann.org) and ICANN WHOIS (whois.icann.org) information 
portal. No impact was found to either of these systems.”
ICANN joins a long list of global 
companies including European Central Bank, CNN, Sony Pictures 
Entertainment, eBay, Twitter, Skype, Snap chat, iCloud, Linux OpenSUSE, 
Forbes, Tesco, German Aerospace Centre, KT Corp, AOL Mail, Bangalore 
City Police, 4Chan, Avast, Israeli defence contractors, Sony Play 
station Network, Home depot, Infected ATMs, United States Postal 
Services, Drop box, Snapsaved, etc.
Modus operandi
The cyber-criminals would pull off a raid by first gaining entry into a bank employee’s computer.
They did this by sending 
authentic-looking emails that unsuspecting recipients then clicked on, 
inadvertently infecting the bank’s machines with Carbanak malware – a 
technique known as ‘spear phishing’.
Hackers were then able to infiltrate the internal network and track down administrators’ computers for video surveillance.
This allowed them to see and record 
everything that happened on the screens of staff who serviced the cash 
transfer systems, which meant the fraudsters got to know and could mimic
 every last detail of bank clerks’ work.
The cyber-criminals were able to hack 
into a bank employee’s computer, allowing them to record everything 
happening on-screen and then mimic workers online to transfer money into
 dummy accounts.
They used this information to 
impersonate bank staff online, in order to electronically transfer tens 
of millions of pounds from the bank into dummy accounts.
On average, each robbery took between 
two and four months, from infecting the first computer at the bank’s 
corporate network to making off with the money. Another method used was 
where the criminals would gain access to someone’s account and inflate 
the balance many times over before transferring the cash.
The raids, which date back to 2013, were
 finally detected by Russian cyber security firm Kaspersky Lab, after a 
Ukrainian ATM was found to be giving out notes at random times – when no
 one had put in a card or touched a button.
The scale of the crime was global, with 
banks in the US, China, Russia and Europe targeted. Security experts are
 trying to identify the banks hit but say customers, such as this man, 
have not been affected… Security cameras showed how money would be 
picked up by customers who appeared to be in the right place at the 
right time.
Kaspersky’s principal security 
researcher Vicente Diaz said the theft was unusual as it targeted banks 
directly, rather than individuals’ bank accounts, and that the hackers 
seemed to set their limit to around £10million before moving onto 
another bank.
‘In this case, they are not interested in information. They’re only interested in the money,’ Mr Diaz said.
‘They’re flexible and quite aggressive and use any tool they find useful for doing whatever they want to do.’
A spokesman for the firm added: ‘The 
Carbanak criminal gang used techniques drawn from the arsenal of 
targeted attacks. The plot marks the beginning of a new stage in the 
evolution of cyber-criminal activity, where malicious users steal money 
directly from banks, and avoid targeting end users.’
The scale of the crime was global, with 
banks in the US, China, Russia and Europe targeted, and the attackers 
thought to be expanding throughout Asia, the Middle East and Africa.
In one case, an unnamed bank lost 
$7.3million (around £4.7million) through ATM fraud. Another financial 
institution lost $10million (around £6.5million) after the attackers 
exploited its online banking platform.
Kaspersky has not identified the banks 
hit by the scam, and is still working with law-enforcement agencies to 
investigate the attacks, which the company says are ongoing.
Losses to UK banks have not yet been disclosed, but are thought to run into tens of millions of pounds.
However, as the scam targets institutions rather than individuals, customers’ accounts have not been affected.
Despite the fact the fraud has been 
uncovered, it is feared that banks could be hit again, as once installed
 the malware can operate almost independently of the gang and is 
difficult to detect.
Sergey Golovanov, principal security researcher at Kaspersky Lab, said: ‘It was a very slick and professional cyber-robbery’.
They’re flexible and quite aggressive and use any tool they find useful for doing whatever they want to do.
US authorities are putting an increasing
 focus on cyber security in the wake of numerous data breaches of 
companies ranging from mass retailers like Target and Home Depot to Sony
 Pictures Entertainment and health insurer, Anthem.
The White House wants Congress to 
replace the existing patchwork of state laws with a national standard 
giving companies 30 days to notify consumers if their personal 
information has been compromised.
Timelines of major cyber attacks worldwide
Timelines of major cyber attacks showed 
that on January 1, 2014, Skype’s Twitter account, Facebook page and 
blogs were hacked into to protest the NSA surveillance resulting in the 
leak of contact information of its outgoing CEO, Steve Ballmer.
On January 2, hackers going by the name Snapchat DB posted usernames and phone numbers of 4.6 million Snapchat users.
On January 7, hackers going by the name 
H4x0r HuSsy hacked into the official forums of Linux distro OpenSUSE 
defacing it and compromising account details of 79,500 registered users.
 Again, on January 24, Syrian Electronic Army attacked many accounts 
belonging to CNN such as CNN’s Facebook page and Twitter account, along 
with several CNN Blogs; January 26 saw hackers defacing 2,618 Indian 
websites; February 2, computer networks of three major medical device 
makers were breached by suspected China-based hackers and February 14, 
websites of Forbes and Tesco and email accounts were.
Tesco stated that around 2,200 of its 
accounts were compromised. March 6, KT Corp, South Korea’s largest 
telecom service provider, was breached by hackers who accessed bank 
details, employment information and home addresses of around 16 million 
customers.
April 15, Germany’s Aerospace centre 
based in Cologne was attacked by hackers. The Trojans were so advanced 
that they would self destruct if detected. April 15, eBay said that 
hackers raided its network, accessing some 145 million users’ records, 
leaking names, email addresses, home addresses, phone numbers and date 
of birth.
April 19, Pakistani hackers attacked BJP
 websites of Bihar and LK Advani’s personal website and that of the 
Bangalore City Police. April 22, AOL Mail was hacked into and genuine 
user accounts were used to send spam messages. Around 50 million users 
were urged to change their passwords. April 30, 4chan, the image-based 
message board was hacked into. The hacker had gained access to the 
administrative functions due to software vulnerability.
On May 25, Avast’s security forum was 
hacked into, culminating in the release of details such as hashed 
passwords, usernames and email addresses of about 400,000 people. June 
10, names, addresses, social security numbers of Twitter staff members 
were leaked on the internet. On June 11, Twitter was overrun by a worm, 
which makes users tweet a self-propagating code. Due to this 84,700 
users tweet the same message at the same time, thereby reaching a 
millions of followers.
June 16, Evernote’s forum was hacked and
 company sent an email to around 164,600 members to change their 
passwords. Compromised data comprises profile details, password hashes, 
email addresses and birth dates. July 24, European Central Bank website 
hacked and personal information of employees and customers stolen. 
Hacker claimed to have a database of 20,000 email addresses, telephone 
numbers, and addresses of people who had registered for an ECB 
conference.
July 28, Israeli defence contractors 
responsible for the ‘Iron Dome’ missile shield, were hacked. The targets
 namely Elisra Group, Israel Aerospace Industries and Rafael Advanced 
Defence Systems were attacked and sensitive security documents 
pertaining to the Iron Dome were robbed. July 30, Tor Project, which 
allows one to surf anonymously protecting your location as well as 
browsing habits, was hacked.
August 24, hackers going by the name 
Lizard Squad hack into Sony’s PlayStation Network using DDoS attacks 
making the plane carrying Sony Online Entertainment president John 
Smedley to be diverted after posting through their twitter account that 
the American Airlines flight had explosives on board.
August 31, the iCloud accounts of 
several Hollywood celebs were hacked and nude photographs were released 
online. It first appeared on image-message board 4han and was later 
propagated via Reddit communities. September 2, US departmental store 
Home Depot payment systems were compromised by hackers across 2,200 
stores in the US and Canada compromising 56 million debit and credit 
cards details.
October 7, Popular cloud sharing 
service, Dropbox, was attacked by hackers, who exploited third-party 
apps resulting in close to seven million accounts being compromised. 
October 9, Snapsaved, a third party application that lets users save 
Snapchat images and videos, was hacked leading to a 13GB dump of stolen 
images and videos surfacing online.
November 10, hackers exposed personal 
details including names, addresses and social security numbers of 
600,000 USPS employees along with high profile customers. November 24, 
2014, Sony Pictures Entertainment was hacked by the hacker group 
Guardians of Peace exposing personal details of film celebs and staff.
Coming nearer home, report had it that 
the ICT security network of some banks in Nigeria were attacked by some 
hackers but not much later heard of the banks as the affected banks 
maintained sealed lips for fear of raising anguish of its customers who 
might get panicky.
Interpol to the rescue
Meanwhile, Sanjay Virmani, director of 
the Interpol Digital Crime Centre, said: ‘These attacks again underline 
the fact that criminals will exploit any vulnerability in any system,” 
adding that “the scale of the crime was global.”
The Financial Services Information 
Sharing and Analysis Centre, a non-profit organisation that alerts banks
 about hacking activity, said in a statement that its members received a
 briefing about the report in January.
“We cannot comment on individual actions
 our members have taken, but on the balance we believe our members are 
taking appropriate actions to prevent and detect these kinds of attacks 
and minimise any effects on their customers,” the organisation said.
“The report that Russian banks were the 
primary victims of these attacks may be a significant change in 
targeting strategy by Russian-speaking cyber-criminals.”