世界各地使用環(huán)球銀行金融電信協(xié)會(huì)(SWIFT)支付網(wǎng)絡(luò)的銀行被要求進(jìn)行一次緊急軟件升級(jí)。網(wǎng)絡(luò)安全專家警告稱,史上最大的銀行搶劫案之一、2月份針對(duì)孟加拉國(guó)央行的攻擊可能重演。
Swift, which has about 11,000 bank members, said yesterday that it hadordered clients usingits Alliance Access interface software to install amandatory upgrade after attackers“successfully compromised the banks’ ownenvironments” in order to send messages.
擁有大約1.1萬(wàn)銀行會(huì)員的SWIFT昨日表示,已指示使用其AllianceAccess接口軟件的客戶安裝一個(gè)強(qiáng)制性升級(jí),此前攻擊者“成功危及銀行自身運(yùn)行環(huán)境”,以發(fā)送指令。
Meanwhile, FireEye a cyber security group hired for the probe in Dhaka,said that it had“observed activity in other financial services organisations that islikely by the same threat actorbehind the cyber attack on Bangladesh Bank”.
同時(shí),受聘調(diào)查孟加拉國(guó)央行被黑事件的網(wǎng)絡(luò)安全公司FireEye表示,它已經(jīng)“在其他金融服務(wù)機(jī)構(gòu)觀察到了活動(dòng),很可能出自對(duì)孟加拉國(guó)央行發(fā)起網(wǎng)絡(luò)攻擊的同一個(gè)威脅源”。
The FireEye statement, which one person in the cyber security sectorsaid amounted to awarning of a criminal “campaign” targeting banks, followedan admission by Swift on Mondaythat it was aware of malicious softwaredesigned to prevent banks spotting fraudulenttransactions.
FireEye作出這一聲明之前,SWIFT周一承認(rèn),它知道某種惡意軟件旨在防止銀行察覺欺詐交易。網(wǎng)絡(luò)安全界的一名人士表示,F(xiàn)ireEye的聲明相當(dāng)于警告,犯罪分子發(fā)起了一波針對(duì)銀行的攻勢(shì)。
Swift is a global messaging network used by banks and other financialfirms across the worldto send payment instructions and has become a vital partof the global financial architecture.
SWIFT是一個(gè)全球性的電文傳遞網(wǎng)絡(luò),被世界各地的銀行和其他金融機(jī)構(gòu)用來(lái)發(fā)送支付指令,它已成為全球金融體系的重要組成部分。
“Central banks have been looking at cyber crime, first at their bankingsector and more recentlywith regard to their own websites,” said Nick Carver,publisher of Central Banking Publications. “But real-time gross settlementsystems and Swift are in a different league. Swift is the nervoussystem ofinternational payments. So central banks will be very concerned by thesefindings.”
“各國(guó)央行一直在關(guān)注網(wǎng)絡(luò)犯罪,最初把目光投向其國(guó)內(nèi)的銀行業(yè),近來(lái)又開始關(guān)注自己的網(wǎng)站,”《央行雜志》(Central Banking Publications)出版人尼克•卡佛(Nick Carver)表示。“但是,實(shí)時(shí)全額結(jié)算系統(tǒng)和SWIFT處在一個(gè)不同的層面。SWIFT是國(guó)際支付的神經(jīng)系統(tǒng)。因此,這些發(fā)現(xiàn)將讓各國(guó)央行非常擔(dān)憂。”
In an audacious weekend raid that sent tremors through the world’s banks, thehackers sent 35fake orders from Bangladesh Bank via Swift to the central bank’s account atthe Federal Reservein New York.
在一個(gè)周末發(fā)起的震撼全球銀行業(yè)的大膽攻擊中,黑客假冒孟加拉國(guó)央行,通過(guò)SWIFT向這家央行在紐約聯(lián)儲(chǔ)(New York Fed)開設(shè)的賬戶發(fā)送了35個(gè)假指令。
The transfers totalled $951m, although the thieves made off with only$81m. They were sent infour batches to accounts in the Philippines after oneSri Lanka order was questioned by asuspicious correspondent bank and the NewYork Fed decided for undisclosed reasons not toprocess the other 30 orders.
轉(zhuǎn)賬總額為9.51億美元,竊賊得手8100萬(wàn)美元。它們分四筆被發(fā)往菲律賓的賬戶,但是發(fā)往斯里蘭卡的一筆款項(xiàng)引起一家警惕性較高的代理行提出質(zhì)疑,之后紐約聯(lián)儲(chǔ)決定不處理另外30個(gè)指令,但沒有透露原因。
On Monday the threat research blog of BAE Systems said that it believedthat it had identifiedcustom malware, malicious software, linked to theBangladesh heist.
周一,BAE系統(tǒng)公司(BAESystems)在其威脅研究博客上表示,它相信自己已經(jīng)識(shí)別出了與孟加拉國(guó)央行被黑事件相關(guān)的惡意軟件。
It appeared to be part of an attack “toolkit”and wouldbe used to cover the attackers’tracks asthey sent forged payment instructions.
它似乎是一個(gè)攻擊“工具包”的一部分,被用于掩蓋攻擊者的作案痕跡,使他們能夠發(fā)送假冒的付款指令而不被發(fā)現(xiàn)。
BAE researcher Sergei Shevchenko said the malware registered itself as aservice and operatedin an environment running Swift’s AllianceAccess software suite, allowing transactions to bedeleted and records changed.
BAE研究員謝爾蓋•舍甫琴科(SergeiShevchenko)表示,該惡意軟件把自己登記為一個(gè)服務(wù),在運(yùn)行SWIFT的Alliance Access軟件包的環(huán)境中活動(dòng),使交易可被刪除,記錄可被變更。