Operation High Roller
Operation High Roller was a series of fraud in the banking system in different parts of the world that used cyber-collection agents in order to collect PC and smart-phone information to electronically raid bank accounts. It was dissected in 2012 by McAfee and Guardian Analytics. A total of roughly $78 million was siphoned out of bank accounts due to this attack. The attackers were operating from servers in Russia, Albania and China to carry out electronic fund transfers.
This cyber attack is described to have the following features:
- Bypassed Chip and PIN authentication.
- Required no human participation.
- Instruction came from cloud-based servers (rather than the hacker's PC) to further hide the identity of the attacker.
- Included elements of "insider levels of understanding".
- Banks in Europe, United States and Colombia were targeted.
- Impacted several classes of financial institution such as credit unions, large global banks, regional banks, and high-net-worth individuals.
While some sources have suggested it to be an extension of Man-in-the-browser attack Operation High Roller is reported to have harnessed a more extensive level of automation distinguishing it from the traditional methods.
- Rachael King, Operation High Roller Targets Corporate Bank Accounts, Wall Street Journal, June 26, 2012
- "Operation High Roller auto-targets bank funds", CNET News
- Time magazine (onlie) Business and Money, "How Exactly Do Cyber Criminals Steal $78 Million?", July 3rd 2012
- SC Magazine : "High roller" fraud campaign persists, origin revealed Danielle WalkerOctober 29, 2012
- Huffington Post on Operation High Roller, By Michael Rundle, June 26th 2012
- DailyTech, June 26, 2012, "High Roller" Hacker Attack is Stealing Hundreds of Millions From the Rich
- The Register, June 27th 2012, 'Operation High Roller' stole from the rich to give to unknown auto-mule crims in the cloud