WEBVTT FILE

1
00:00:02.000 --> 00:00:07.000
Downloaded from
YTS.MX

2
00:00:08.000 --> 00:00:13.000
Official YIFY movies site:
YTS.MX

3
00:01:10.809 --> 00:01:12.115
It's Friday,

4
00:01:12.115 --> 00:01:15.423
and it is, of course,
the Muslim prayer day.

5
00:01:15.423 --> 00:01:18.513
Everyone's off,
except for the skeleton staff

6
00:01:18.513 --> 00:01:20.645
at the Bangladeshi Bank,

7
00:01:20.645 --> 00:01:24.562
including Zubair Bin Huda,
who is the duty manager.

8
00:01:27.870 --> 00:01:31.395
He's part of
the elite team of employees

9
00:01:31.395 --> 00:01:35.095
who run
the SWIFT banking system,

10
00:01:35.095 --> 00:01:38.663
which is a highly secure
banking system

11
00:01:38.663 --> 00:01:41.318
that sends money
around the world.

12
00:01:43.538 --> 00:01:47.281
Now, Bin Huda goes,
as he does every day,

13
00:01:47.281 --> 00:01:49.152
to the SWIFT printer

14
00:01:49.152 --> 00:01:53.374
to check up on the transactions
from the day before.

15
00:01:53.374 --> 00:01:56.159
There are usually printouts

16
00:01:56.159 --> 00:01:58.422
of transactions
that came in overnight.

17
00:01:58.422 --> 00:02:02.774
The SWIFT software would print
out a ledger every single day,

18
00:02:02.774 --> 00:02:06.952
an audit trace of every single
transaction that occurred

19
00:02:06.952 --> 00:02:08.693
on paper.

20
00:02:08.693 --> 00:02:11.392
But when they came in
on February 5th morning,

21
00:02:11.392 --> 00:02:12.871
as they usually do,

22
00:02:12.871 --> 00:02:15.744
they found there were
no SWIFT messages at all.

23
00:02:15.744 --> 00:02:20.009
In fact, the printer's
shut down. It won't work.

24
00:02:20.009 --> 00:02:21.358
They try and turn it on.

25
00:02:21.358 --> 00:02:25.188
Nothing will kick it
back into life.

26
00:02:25.188 --> 00:02:28.148
He assumes it was simply
a technical error,

27
00:02:28.148 --> 00:02:30.193
shrugs, goes home for the night,

28
00:02:30.193 --> 00:02:32.282
comes back in
on Saturday morning

29
00:02:32.282 --> 00:02:34.502
to check the system again.

30
00:02:35.677 --> 00:02:36.939
The next day,

31
00:02:36.939 --> 00:02:40.160
they somehow manually
get the printer to work.

32
00:02:40.160 --> 00:02:42.466
This deputy head manager
walks in the room,

33
00:02:42.466 --> 00:02:46.122
the printer starts working, and
these weird messages come out.

34
00:02:46.122 --> 00:02:49.560
The printer
starts spewing out

35
00:02:49.560 --> 00:02:51.736
all of these transactions,

36
00:02:51.736 --> 00:02:56.306
including individual requests
to the Fed in New York

37
00:02:56.306 --> 00:02:59.353
for $1 billion.

38
00:03:01.268 --> 00:03:04.880
At that moment,
it's panic stations.

39
00:03:44.789 --> 00:03:50.230
When I was growing up,
the biggest crime in Britain

40
00:03:50.230 --> 00:03:52.319
ever recorded
was the Great Train Robbery.

41
00:03:52.319 --> 00:03:56.366
It was an extraordinary thing.
They stole about £2.5 million.

42
00:03:56.366 --> 00:03:58.760
That's about $4 million.

43
00:03:58.760 --> 00:04:04.244
And that story
ran literally for 30 years.

44
00:04:05.245 --> 00:04:06.768
Four million dollars.

45
00:04:07.856 --> 00:04:10.293
What you're about to hear

46
00:04:10.293 --> 00:04:14.036
is the story of an attempt
to steal...

47
00:04:15.037 --> 00:04:17.518
a billion dollars

48
00:04:18.475 --> 00:04:20.434
It's told by world-leading

49
00:04:20.434 --> 00:04:23.959
cybersecurity and legal experts
and journalists:

50
00:04:23.959 --> 00:04:26.309
the very people
who uncovered the facts

51
00:04:26.309 --> 00:04:27.919
and threaded them together

52
00:04:27.919 --> 00:04:32.489
to reveal how dangerous the
world of cybercrime is today.

53
00:04:49.898 --> 00:04:53.336
So, there are four big threats

54
00:04:53.336 --> 00:04:57.471
to the world
and to the human race.

55
00:04:57.471 --> 00:04:59.603
One of them
we've just experienced,

56
00:04:59.603 --> 00:05:01.736
that's the pandemic.

57
00:05:01.736 --> 00:05:04.826
Then you've got weapons
of mass destruction.

58
00:05:04.826 --> 00:05:08.220
You've got climate change.

59
00:05:08.220 --> 00:05:13.965
But barrelling down towards us
before those is cyber.

60
00:05:24.498 --> 00:05:25.934
This is the possibility

61
00:05:25.934 --> 00:05:30.068
of our overdependency
on network technologies

62
00:05:30.068 --> 00:05:34.943
being undermined, either by
malfunctioning of the system...

63
00:05:34.943 --> 00:05:36.597
New problems are emerging

64
00:05:36.597 --> 00:05:39.164
the day after an Amazon
web service outage.

65
00:05:39.164 --> 00:05:42.254
Massive and mysterious,
a global outage...

66
00:05:42.254 --> 00:05:45.214
...or by a targeted attack.

67
00:05:45.214 --> 00:05:47.129
More than a thousand companies

68
00:05:47.129 --> 00:05:49.305
have been crippled
by this attack so far.

69
00:05:49.305 --> 00:05:52.264
Sounds like we're looking
at a 2022 with more hacks,

70
00:05:52.264 --> 00:05:53.570
more lost money.

71
00:05:59.924 --> 00:06:04.233
So, when I started hunting
hackers in the early 1990s...

72
00:06:05.452 --> 00:06:07.671
our enemy was really simple.

73
00:06:07.671 --> 00:06:10.152
All the malware,
all the viruses,

74
00:06:10.152 --> 00:06:13.111
all the attacks were
done by teenage boys.

75
00:06:13.111 --> 00:06:15.462
What will your parents think?

76
00:06:17.594 --> 00:06:20.815
I've been doing this job
for two decades now.

77
00:06:24.253 --> 00:06:25.472
When we first started,

78
00:06:25.472 --> 00:06:27.909
the people writing viruses
and malware

79
00:06:27.909 --> 00:06:29.476
were doing it for fun,

80
00:06:29.476 --> 00:06:32.392
to get their name in lights,
to say, "Look what I can do."

81
00:06:32.392 --> 00:06:34.655
No flash, please.

82
00:06:34.655 --> 00:06:37.788
When I started analysing
viruses, they looked like this.

83
00:06:37.788 --> 00:06:41.052
Malware was still spread
on floppy disks.

84
00:06:41.052 --> 00:06:44.708
They were spreading at the speed
of people travelling the world

85
00:06:44.708 --> 00:06:47.102
and carrying the viruses
with them.

86
00:06:47.102 --> 00:06:50.540
Michelangelo has
proven less harmful than feared.

87
00:06:50.540 --> 00:06:53.108
All the stuff you've got
in there you may really want,

88
00:06:53.108 --> 00:06:54.414
it's just gone?

89
00:06:54.414 --> 00:06:56.459
Then the internet came around,
and suddenly,

90
00:06:56.459 --> 00:06:59.331
malware outbreaks could
go around the world in seconds.

91
00:06:59.331 --> 00:07:00.942
For the last 36 hours,

92
00:07:00.942 --> 00:07:04.685
the ILOVEYOU virus has been
creating havoc around the world.

93
00:07:04.685 --> 00:07:08.166
Experts have reason to worry.
The first attack, July 19th,

94
00:07:08.166 --> 00:07:11.648
infected about 300,000
systems in nine hours.

95
00:07:11.648 --> 00:07:14.129
First of all, the guys who
make a living doing security

96
00:07:14.129 --> 00:07:16.044
and are trying to protect themselves

97
00:07:16.044 --> 00:07:19.569
are scared shitless of you,
because you can just ruin 'em.

98
00:07:19.569 --> 00:07:20.875
After the period of time

99
00:07:20.875 --> 00:07:22.529
where hackers
were just doing things for fun,

100
00:07:22.529 --> 00:07:26.010
some of them realised that they
could use it to make money.

101
00:07:28.535 --> 00:07:31.668
Prior to, like, the 2000s...

102
00:07:31.668 --> 00:07:35.716
cyber was primarily around
a disruption of websites...

103
00:07:36.630 --> 00:07:38.893
defacement of a webpage.

104
00:07:38.893 --> 00:07:42.505
Just as we got around 2000,
the dot-com boom, the explosion,

105
00:07:42.505 --> 00:07:44.376
we started into
what would become

106
00:07:44.376 --> 00:07:46.161
financially motivated hackers.

107
00:07:46.161 --> 00:07:49.033
This really flourished,
especially in Eastern European,

108
00:07:49.033 --> 00:07:53.124
Russia, CIS bloc countries.

109
00:07:53.124 --> 00:07:55.953
This was the time
of gangster capitalism,

110
00:07:55.953 --> 00:08:00.001
when everyone's world in Eastern
Europe was falling apart,

111
00:08:00.001 --> 00:08:02.612
where organised crime and...

112
00:08:02.612 --> 00:08:05.528
former members of
the intelligence services

113
00:08:05.528 --> 00:08:09.314
were taking hold
of the economy.

114
00:08:10.881 --> 00:08:14.276
So you had a lot of young people
in the 1990s

115
00:08:14.276 --> 00:08:17.932
who were very good
mathematicians, physicists,

116
00:08:17.932 --> 00:08:20.282
computer scientists,

117
00:08:20.282 --> 00:08:23.503
who simply took
the logic and the morality

118
00:08:23.503 --> 00:08:26.593
of gangster capitalism online.

119
00:08:30.074 --> 00:08:32.163
Virus writers
were writing viruses

120
00:08:32.163 --> 00:08:33.817
to infect Windows computers,

121
00:08:33.817 --> 00:08:36.951
and those computers were then
sold to email spammers,

122
00:08:36.951 --> 00:08:39.954
who were using those machines
to send Viagra spam

123
00:08:39.954 --> 00:08:42.652
or what have you,
basically making money.

124
00:08:42.652 --> 00:08:44.436
And that changed everything.

125
00:08:48.789 --> 00:08:51.574
People at that time
began to use online banking,

126
00:08:51.574 --> 00:08:54.621
and they began to steal people's
online banking credentials,

127
00:08:54.621 --> 00:08:57.275
from there, also get
credit card numbers,

128
00:08:57.275 --> 00:08:59.408
and use that
to basically transfer funds.

129
00:08:59.408 --> 00:09:02.672
Just in hundreds of dollars at
a time from these individuals.

130
00:09:02.672 --> 00:09:05.893
They eventually realised
that going after individuals

131
00:09:05.893 --> 00:09:07.198
was much more difficult

132
00:09:07.198 --> 00:09:10.288
than just going after
the banks themselves.

133
00:09:10.288 --> 00:09:11.942
Get into databases,

134
00:09:11.942 --> 00:09:14.423
those databases held
credit card numbers.

135
00:09:14.423 --> 00:09:17.600
Take those numbers and then
sell them on the black market.

136
00:09:19.341 --> 00:09:23.345
Originally, the internet
was set up at the Pentagon...

137
00:09:25.042 --> 00:09:29.003
just to be able to share
resources between computers.

138
00:09:32.136 --> 00:09:35.226
And it was really never
designed to have

139
00:09:35.226 --> 00:09:38.490
banking attached to it,

140
00:09:38.490 --> 00:09:41.711
critical infrastructure
attached to it.

141
00:09:41.711 --> 00:09:44.366
It was really designed
for availability.

142
00:09:44.366 --> 00:09:47.108
It was never designed
for security.

143
00:09:48.500 --> 00:09:50.502
Whereas in the early 1990s

144
00:09:50.502 --> 00:09:53.505
when there was only 30,000
people connected to it

145
00:09:53.505 --> 00:09:56.813
and several hundred systems,
we've moved to a system

146
00:09:56.813 --> 00:09:59.947
which essentially is the
backbone of global finance.

147
00:10:01.339 --> 00:10:04.560
The fact that
it's able to do that...

148
00:10:04.560 --> 00:10:07.432
the fact that it's able
to sustain currently between

149
00:10:07.432 --> 00:10:10.392
15 and 20 percent
of GDP globally

150
00:10:10.392 --> 00:10:12.742
tells us something about
just how important

151
00:10:12.742 --> 00:10:14.918
this infrastructure is.

152
00:10:14.918 --> 00:10:17.094
Why did people move
into the internet

153
00:10:17.094 --> 00:10:18.661
to seek economic opportunity?

154
00:10:18.661 --> 00:10:21.621
Because that's where the
economic opportunity was,

155
00:10:21.621 --> 00:10:23.579
untethered by norms,

156
00:10:23.579 --> 00:10:25.799
untethered
by national boundaries,

157
00:10:25.799 --> 00:10:28.497
and essentially limited
only by the creativity

158
00:10:28.497 --> 00:10:30.194
that these individuals had.

159
00:10:40.814 --> 00:10:43.817
The user nagged
the Federal Reserve Bank

160
00:10:43.817 --> 00:10:48.386
with 35 payment instructions
worth $951 million.

161
00:10:48.386 --> 00:10:50.867
We'd just never heard
of such a thing before.

162
00:10:50.867 --> 00:10:53.043
We'd been investigating cybercrime

163
00:10:53.043 --> 00:10:55.567
for a couple of decades
at that point.

164
00:10:55.567 --> 00:10:57.700
You see cyber criminals go in,

165
00:10:57.700 --> 00:11:01.748
and they try to transfer a few
hundred thousands of dollars,

166
00:11:01.748 --> 00:11:05.055
maybe a million,
a couple of million.

167
00:11:05.055 --> 00:11:09.059
But conducting a cyber-attack
to try to steal one billion?

168
00:11:09.059 --> 00:11:13.020
That was an order of magnitude
that we had never seen before.

169
00:11:13.020 --> 00:11:14.674
It was clear from early on

170
00:11:14.674 --> 00:11:18.112
that it was one of the biggest
cyber heists in the world.

171
00:11:18.112 --> 00:11:20.505
When we first started
hearing rumours

172
00:11:20.505 --> 00:11:23.813
about something affecting
SWIFT network,

173
00:11:23.813 --> 00:11:26.424
I didn't understand
how big it was.

174
00:11:26.424 --> 00:11:28.122
But when we started realising

175
00:11:28.122 --> 00:11:30.646
this is at a completely
different scale,

176
00:11:30.646 --> 00:11:32.561
it just blew my mind.

177
00:11:46.314 --> 00:11:47.445
Once they realised

178
00:11:47.445 --> 00:11:49.578
that the money actually
was really gone,

179
00:11:49.578 --> 00:11:51.623
then the panic began to set in.

180
00:11:51.623 --> 00:11:56.890
They lost $81 million instantly
to a bank in the Philippines.

181
00:11:56.890 --> 00:11:59.980
They see the $81 million
has already gone

182
00:11:59.980 --> 00:12:05.855
and that nearly $900 million
extra has been requested.

183
00:12:08.815 --> 00:12:13.254
They basically try to figure out
what to do next.

184
00:12:13.254 --> 00:12:15.865
They have no idea what to do.

185
00:12:15.865 --> 00:12:19.129
They hunted for ways to contact
the New York Fed.

186
00:12:20.957 --> 00:12:23.655
Desperate calls are made
by them.

187
00:12:27.834 --> 00:12:29.749
And it goes
to an answering machine.

188
00:12:29.749 --> 00:12:31.751
<i>You've reached
the Federal Reserve Bank...</i>

189
00:12:31.751 --> 00:12:33.622
Because it's Saturday
in New York,

190
00:12:33.622 --> 00:12:36.016
and nobody's picking
up the phone.

191
00:12:36.016 --> 00:12:39.106
<i>- Please call back...</i>
- It's a complete shitshow.

192
00:12:39.106 --> 00:12:43.153
Total disorganisation,
at both ends, I would stress.

193
00:12:45.503 --> 00:12:49.246
<i>The New York Times Magazine</i>
was planning a true-crime issue,

194
00:12:49.246 --> 00:12:50.421
and my editor came to me

195
00:12:50.421 --> 00:12:52.902
and asked I was interested
in doing it.

196
00:12:54.251 --> 00:12:55.600
I looked into it a bit.

197
00:12:55.600 --> 00:12:58.125
There definitely were
some intriguing elements,

198
00:12:58.125 --> 00:12:59.779
and made me pay attention.

199
00:13:02.129 --> 00:13:04.435
The Federal Reserve
has pretty much

200
00:13:04.435 --> 00:13:07.177
depended on the SWIFT
banking system,

201
00:13:07.177 --> 00:13:11.878
and since there has rarely
been a hack, if ever,

202
00:13:11.878 --> 00:13:14.837
of the SWIFT banking system...

203
00:13:14.837 --> 00:13:18.058
the Federal Reserve
has never instituted

204
00:13:18.058 --> 00:13:20.800
any sort of 24-7 hotline.

205
00:13:22.540 --> 00:13:26.501
Eventually, they get
hold of somebody at SWIFT,

206
00:13:26.501 --> 00:13:28.155
and SWIFT says,

207
00:13:28.155 --> 00:13:29.765
"Just shut the whole lot down

208
00:13:29.765 --> 00:13:32.507
until we know
what's going on here."

209
00:13:32.507 --> 00:13:36.163
Badrul Khan decides before he
can actually make that decision,

210
00:13:36.163 --> 00:13:39.166
he has to talk to the deputy
governor of the bank,

211
00:13:39.166 --> 00:13:40.820
which he does.

212
00:13:40.820 --> 00:13:43.823
Deputy governor doesn't want to
take the decision upon himself,

213
00:13:43.823 --> 00:13:47.435
so he talks to the governor.
And guess what.

214
00:13:47.435 --> 00:13:50.655
The governor says,
"It's probably a mistake.

215
00:13:50.655 --> 00:13:52.614
We won't shut it down."

216
00:13:56.009 --> 00:13:58.750
Work week begins
at the Bangladesh Bank

217
00:13:58.750 --> 00:14:00.187
on Sunday morning,

218
00:14:00.187 --> 00:14:02.972
and it's then that the general
manager of the bank

219
00:14:02.972 --> 00:14:05.845
comes in and begins to take
stock of what had happened.

220
00:14:05.845 --> 00:14:07.411
They're running out of options.

221
00:14:07.411 --> 00:14:11.111
They're not sure what to do.
Fed is still closed in New York.

222
00:14:11.111 --> 00:14:13.200
They go through
all the SWIFT material,

223
00:14:13.200 --> 00:14:16.072
discover that most of
the money has gone

224
00:14:16.072 --> 00:14:18.205
to the bank in Manila.

225
00:14:18.205 --> 00:14:21.164
And these desperate
messages are sent out:

226
00:14:21.164 --> 00:14:22.600
"Stop the transactions.

227
00:14:22.600 --> 00:14:25.168
Hold that money. Do not
allow it to be withdrawn.

228
00:14:25.168 --> 00:14:27.127
It's our money.
It's been stolen."

229
00:14:28.650 --> 00:14:30.260
But there's a problem.

230
00:14:30.260 --> 00:14:32.219
Five, four,

231
00:14:32.219 --> 00:14:35.135
three, two, one!

232
00:14:35.135 --> 00:14:37.920
Happy New Year!

233
00:14:41.924 --> 00:14:43.795
It's Chinese New Year,

234
00:14:43.795 --> 00:14:46.929
and the Rizal Commercial Bank
is closed.

235
00:14:51.673 --> 00:14:56.199
The thieves chose
a sequence of days...

236
00:14:56.199 --> 00:15:00.638
from Friday, Saturday,
Sunday and Monday,

237
00:15:00.638 --> 00:15:03.815
when one or another
of the three countries

238
00:15:03.815 --> 00:15:06.557
that would be communicating
with one another

239
00:15:06.557 --> 00:15:09.169
was shut down for a holiday.

240
00:15:15.566 --> 00:15:17.612
You've got to hand it
to these guys.

241
00:15:17.612 --> 00:15:19.005
They knew it.

242
00:15:19.005 --> 00:15:21.703
They knew that if they did it
over that weekend,

243
00:15:21.703 --> 00:15:23.966
with the Friday,
the Muslim holiday,

244
00:15:23.966 --> 00:15:27.187
the Sunday and the Saturday,
everything closed in New York,

245
00:15:27.187 --> 00:15:30.538
and the Monday,
Chinese New Year.

246
00:15:32.322 --> 00:15:37.110
They've got four days
to get the heist done.

247
00:15:37.110 --> 00:15:39.373
This is really classy planning.

248
00:15:41.375 --> 00:15:45.422
In that respect,
it was really an ingenious plan.

249
00:15:45.422 --> 00:15:49.426
It's kind of like a great film
director in a malevolent way,

250
00:15:49.426 --> 00:15:53.082
planning out, you know,
a very complex film.

251
00:15:56.433 --> 00:15:58.131
The country of Bangladesh

252
00:15:58.131 --> 00:16:01.873
is the 170th poorest country
in the world.

253
00:16:01.873 --> 00:16:04.267
One billion dollars
is huge to them.

254
00:16:04.267 --> 00:16:06.356
When we talk
about cyber-attacks,

255
00:16:06.356 --> 00:16:08.054
they're not just zeros and ones.

256
00:16:08.054 --> 00:16:10.186
We're not just talking
about people

257
00:16:10.186 --> 00:16:13.755
moving around zeros and ones,
deleting zeros and ones.

258
00:16:15.539 --> 00:16:18.107
One billion dollars
to Bangladesh

259
00:16:18.107 --> 00:16:21.545
potentially means that people
starve in the country.

260
00:16:21.545 --> 00:16:25.245
These things have potential
serious repercussions.

261
00:16:27.725 --> 00:16:30.206
The Bangladesh Bank
heist was significant

262
00:16:30.206 --> 00:16:34.297
because it showed how fragile
global banking was as a whole.

263
00:16:36.169 --> 00:16:40.260
Banks don't just operate
as single isolated entities.

264
00:16:40.260 --> 00:16:42.784
They're part of a system.

265
00:16:42.784 --> 00:16:45.482
And that system is vulnerable.

266
00:16:47.702 --> 00:16:52.402
The US Federal Reserve holds
trillions of dollars in accounts

267
00:16:52.402 --> 00:16:55.579
kept by central banks
all around the world.

268
00:16:55.579 --> 00:16:59.279
Its computer security systems
are state of the art, making it

269
00:16:59.279 --> 00:17:03.587
one of the most difficult
financial institutions to hack.

270
00:17:07.287 --> 00:17:10.551
The criminals realise
that it can't get into

271
00:17:10.551 --> 00:17:14.076
the network system of the Fed,

272
00:17:14.076 --> 00:17:17.906
but the Fed has to talk
to other central banks

273
00:17:17.906 --> 00:17:19.777
around the world,

274
00:17:19.777 --> 00:17:23.390
and this is
where they find a flaw.

275
00:17:25.305 --> 00:17:27.437
The criminals turn
their attention

276
00:17:27.437 --> 00:17:30.440
to the banks'
communication systems.

277
00:17:31.963 --> 00:17:35.402
Every day, the Fed places
thousands of transactions

278
00:17:35.402 --> 00:17:39.058
on behalf of the central banks
that hold US dollar reserves

279
00:17:39.058 --> 00:17:40.320
at the Fed.

280
00:17:40.320 --> 00:17:42.757
The Federal Reserve
has pretty much depended

281
00:17:42.757 --> 00:17:45.107
on the SWIFT banking system

282
00:17:45.107 --> 00:17:48.067
to get its instructions
about transfers.

283
00:17:48.067 --> 00:17:51.026
SWIFT sends money
around the world

284
00:17:51.026 --> 00:17:52.941
to thousands of member banks.

285
00:17:52.941 --> 00:17:57.946
It's the main way that banks
dispatch money to one another.

286
00:17:59.165 --> 00:18:01.602
SWIFT allows you
to transfer money

287
00:18:01.602 --> 00:18:02.777
from one bank to another,

288
00:18:02.777 --> 00:18:04.561
no matter where you are
in the world.

289
00:18:04.561 --> 00:18:07.347
Make international
wire transfers.

290
00:18:07.347 --> 00:18:11.568
The whole banking system
is integrated,

291
00:18:11.568 --> 00:18:15.659
and they depend
above all else on SWIFT,

292
00:18:15.659 --> 00:18:21.143
the international transaction
mechanisms, to work.

293
00:18:21.143 --> 00:18:23.319
What it means is,
all it takes

294
00:18:23.319 --> 00:18:28.803
is a single weak link
to bring down the whole network.

295
00:18:30.370 --> 00:18:33.373
So although the target
is the Fed,

296
00:18:33.373 --> 00:18:37.725
they are looking for a bank
with which the Fed communicates,

297
00:18:37.725 --> 00:18:42.338
which holds a lot
of its reserves in New York.

298
00:18:42.338 --> 00:18:44.123
But it's a long way away,

299
00:18:44.123 --> 00:18:48.562
in a distant time zone
from the Fed,

300
00:18:48.562 --> 00:18:51.304
and it's likely to have

301
00:18:51.304 --> 00:18:56.396
patchy security systems in place
in its computer network.

302
00:18:58.963 --> 00:19:00.791
My colleagues in Dhaka,

303
00:19:00.791 --> 00:19:04.012
they were chasing it
for a long time.

304
00:19:04.012 --> 00:19:07.450
It was a robbery of a scale
that we hadn't heard of.

305
00:19:09.235 --> 00:19:11.585
The first thought
that came to my mind was,

306
00:19:11.585 --> 00:19:14.631
because it was the
Bangladeshi Central Bank,

307
00:19:14.631 --> 00:19:17.243
I thought the hackers found it

308
00:19:17.243 --> 00:19:19.549
somehow easier to target it.

309
00:19:19.549 --> 00:19:21.377
Because it was Bangladesh,

310
00:19:21.377 --> 00:19:24.424
I suspected they would
be more vulnerable

311
00:19:24.424 --> 00:19:26.774
to cyber-attacks as such.

312
00:19:28.515 --> 00:19:31.344
"Hmm. A Bangladeshi bank.

313
00:19:31.344 --> 00:19:33.998
Probably doesn't have
the same level of security

314
00:19:33.998 --> 00:19:36.218
and if they do,
it's probably one or two people,

315
00:19:36.218 --> 00:19:40.222
not a team of 6,000
working on it.

316
00:19:41.136 --> 00:19:42.355
Let's go for it."

317
00:19:42.355 --> 00:19:44.661
These attackers
weren't just skilled

318
00:19:44.661 --> 00:19:45.923
in breaching networks,

319
00:19:45.923 --> 00:19:47.838
figuring out how
to get into an organisation.

320
00:19:47.838 --> 00:19:52.016
They had to study that
SWIFT software deeply.

321
00:19:52.016 --> 00:19:55.194
This attack happened
well before that February 5th,

322
00:19:55.194 --> 00:19:56.847
when the bank employee walked in

323
00:19:56.847 --> 00:19:59.894
and saw that printer hadn't
printed out the audit jobs

324
00:19:59.894 --> 00:20:01.939
and couldn't figure out
what was going on.

325
00:20:01.939 --> 00:20:04.812
This attack started more
than a year prior to that.

326
00:20:04.812 --> 00:20:07.293
These attackers had been
working for months

327
00:20:07.293 --> 00:20:09.120
in the build-up until that day.

328
00:20:09.120 --> 00:20:11.253
It is a mistake
for people to think

329
00:20:11.253 --> 00:20:13.560
that this was something
that happened overnight.

330
00:20:13.560 --> 00:20:15.649
It is a mistake
for people to think

331
00:20:15.649 --> 00:20:18.956
that this happened in a month,
or two months or three months.

332
00:20:18.956 --> 00:20:21.394
It is a slow,
methodical approach,

333
00:20:21.394 --> 00:20:25.528
because it's a business,
all right? You build it.

334
00:20:32.274 --> 00:20:35.146
Bank robberies used to be
something that happened

335
00:20:35.146 --> 00:20:37.497
in the real world.

336
00:20:37.497 --> 00:20:40.630
Now they only happen
in the online world.

337
00:20:42.806 --> 00:20:46.767
If you would try to steal
$100 million in banknotes,

338
00:20:46.767 --> 00:20:49.160
that would be, like,
ten trucks full of notes.

339
00:20:49.160 --> 00:20:51.511
If you drive ten trucks
full of notes out of the bank,

340
00:20:51.511 --> 00:20:54.035
someone would notice.

341
00:20:54.035 --> 00:20:57.299
But when you do the same thing
online, no one notices anything.

342
00:20:57.299 --> 00:21:01.042
Every movie you've ever seen
of them breaking into a bank

343
00:21:01.042 --> 00:21:03.436
is them doing it
over a bank holiday

344
00:21:03.436 --> 00:21:05.394
or something of that nature.

345
00:21:05.394 --> 00:21:07.222
Same concept here.

346
00:21:12.096 --> 00:21:15.361
This isn't Matthew Broderick
sitting in front of a computer,

347
00:21:15.361 --> 00:21:17.450
like <i>War Games</i>
back in the 1980s,

348
00:21:17.450 --> 00:21:19.321
some kid in their basement.

349
00:21:21.105 --> 00:21:24.370
These are
criminal organisations.

350
00:21:24.370 --> 00:21:26.023
Each person has a skill set.

351
00:21:26.023 --> 00:21:29.070
It's kind of like that
<i>Ocean's Eleven</i>-type thing.

352
00:21:30.593 --> 00:21:33.074
You know,
"This guy could crack the bank,

353
00:21:33.074 --> 00:21:35.337
this guy could do
the surveillance cameras,

354
00:21:35.337 --> 00:21:37.774
this is the getaway,
this is the conman."

355
00:21:37.774 --> 00:21:39.559
You all have a role to play,

356
00:21:39.559 --> 00:21:42.301
and you need everybody
to execute their role

357
00:21:42.301 --> 00:21:44.085
to the best of their abilities

358
00:21:44.085 --> 00:21:46.870
for you to be
successful and get it out.

359
00:21:48.742 --> 00:21:53.007
So how do you pull off
a heist of this magnitude?

360
00:21:53.007 --> 00:21:58.317
It takes the right crew of
highly skilled specialists.

361
00:21:58.317 --> 00:22:03.191
And it all starts not with ones
and zeros, but with people.

362
00:22:07.151 --> 00:22:10.590
Cybercrime is about
gaining credentials

363
00:22:10.590 --> 00:22:12.635
to gain access,

364
00:22:12.635 --> 00:22:15.421
stealing the keys.

365
00:22:15.421 --> 00:22:19.816
The social engineer
is critical to a hack.

366
00:22:19.816 --> 00:22:22.253
It's how you get in,
and you get in

367
00:22:22.253 --> 00:22:26.388
not through digital means,
you get in through human means.

368
00:22:26.388 --> 00:22:28.956
It's to do with psychology.

369
00:22:31.306 --> 00:22:35.528
The criminals have to ensnare
one of the employees

370
00:22:35.528 --> 00:22:38.052
of the Bangladeshi Bank,

371
00:22:38.052 --> 00:22:41.882
beginning by going through
their social media profiles

372
00:22:41.882 --> 00:22:44.711
and looking
for suitable targets.

373
00:22:45.929 --> 00:22:48.932
Our relationship
with the computer

374
00:22:48.932 --> 00:22:51.848
is one of perceived intimacy;

375
00:22:51.848 --> 00:22:54.373
that when we're using
a computer,

376
00:22:54.373 --> 00:22:57.767
no one else can see
what we're doing, we believe,

377
00:22:57.767 --> 00:23:00.379
and it's just us and the screen.

378
00:23:02.119 --> 00:23:05.819
And if we were to read
an email from a friend,

379
00:23:05.819 --> 00:23:08.909
we tend to believe it
at face value.

380
00:23:12.216 --> 00:23:15.219
They found
close to three dozen employees.

381
00:23:15.219 --> 00:23:18.832
And they constructed
a simple spear-phish email:

382
00:23:18.832 --> 00:23:21.748
an email message that pretended
to be from a guy

383
00:23:21.748 --> 00:23:24.446
named Rasal Alam.

384
00:23:24.446 --> 00:23:26.056
And Rasal Alam said,

385
00:23:26.056 --> 00:23:28.581
"Hey, I just wanna
work at your company.

386
00:23:28.581 --> 00:23:31.410
Here's a résumé attached.
Have a look."

387
00:23:31.410 --> 00:23:34.108
And it turned out
that they mailed that

388
00:23:34.108 --> 00:23:36.893
to about 36 different employees,
and three of them

389
00:23:36.893 --> 00:23:39.722
opened that attachment
connected to that email.

390
00:23:40.984 --> 00:23:42.333
It was a zip file,

391
00:23:42.333 --> 00:23:44.640
and the zip file contained
just a document inside.

392
00:23:44.640 --> 00:23:47.295
They opened up the document
and it was his résumé.

393
00:23:47.295 --> 00:23:50.733
It was a résumé for Rasel Ahlam,
who wanted to work at the bank,

394
00:23:50.733 --> 00:23:52.996
but unbeknownst
to those individuals,

395
00:23:52.996 --> 00:23:56.826
also contained
malicious code inside.

396
00:23:56.826 --> 00:23:58.741
We can look at any data breach,

397
00:23:58.741 --> 00:24:01.222
and the root cause
has either been

398
00:24:01.222 --> 00:24:03.311
a technical problem

399
00:24:03.311 --> 00:24:05.400
or a people problem.

400
00:24:05.400 --> 00:24:08.229
And the technical problems
can be really hard

401
00:24:08.229 --> 00:24:10.536
and really expensive
and really slow to fix,

402
00:24:10.536 --> 00:24:12.581
but at least we can fix them.

403
00:24:12.581 --> 00:24:16.150
But in the end, we have
no patch for human brains.

404
00:24:17.804 --> 00:24:22.243
There's no way to fix the people
who do stupid mistakes.

405
00:24:22.243 --> 00:24:23.723
When attackers try to send

406
00:24:23.723 --> 00:24:27.030
these spear-phishing emails,
they try to do two things.

407
00:24:27.030 --> 00:24:30.512
They try to look very normal.
It was just a résumé.

408
00:24:30.512 --> 00:24:31.818
They try to fly under the radar,

409
00:24:31.818 --> 00:24:33.515
to look as legitimate
as possible.

410
00:24:33.515 --> 00:24:37.476
And the second is they often
try to use enticing techniques.

411
00:24:43.612 --> 00:24:47.050
New dangers tonight from
the Love Bug computer virus,

412
00:24:47.050 --> 00:24:49.966
this time disguised
as a friendlier email.

413
00:24:49.966 --> 00:24:53.579
The first internet virus
that went around the world

414
00:24:53.579 --> 00:24:57.887
in less than 48 hours was
called the ILOVEYOU virus.

415
00:24:57.887 --> 00:25:00.499
And already,
business interruption costs

416
00:25:00.499 --> 00:25:03.676
are estimated at more than
a billion dollars.

417
00:25:03.676 --> 00:25:06.592
You would be sitting
there working away,

418
00:25:06.592 --> 00:25:08.507
and then suddenly,
in your inbox,

419
00:25:08.507 --> 00:25:12.554
you get an email which says,
"I love you."

420
00:25:12.554 --> 00:25:15.252
And it could well be
that this is a person

421
00:25:15.252 --> 00:25:17.820
who you've always
held a torch for.

422
00:25:17.820 --> 00:25:20.344
And so, of course,
you're very excited,

423
00:25:20.344 --> 00:25:24.087
and you press on the link,
and then you're doomed.

424
00:25:24.087 --> 00:25:26.873
What happens is,
the virus infects your machine

425
00:25:26.873 --> 00:25:29.963
and proceeds to email everyone
you've ever emailed.

426
00:25:29.963 --> 00:25:32.618
The end result of that
is the mail servers

427
00:25:32.618 --> 00:25:33.706
get bogged down,

428
00:25:33.706 --> 00:25:36.143
and the only way
to solve the problem

429
00:25:36.143 --> 00:25:39.276
is to shut the servers down,
hence the interruption.

430
00:25:39.276 --> 00:25:42.323
The ILOVEYOU virus
was one of the first viruses

431
00:25:42.323 --> 00:25:45.065
that had really
worldwide impact.

432
00:25:47.110 --> 00:25:49.722
It was still a virus
written by a guy

433
00:25:49.722 --> 00:25:52.594
that just wanted to get
his name in lights.

434
00:25:52.594 --> 00:25:53.813
He wanted to see his virus

435
00:25:53.813 --> 00:25:55.597
travel around the world
a little bit

436
00:25:55.597 --> 00:25:57.381
and maybe get
in the news somewhere,

437
00:25:57.381 --> 00:25:59.819
and then him be able to say,
"Oh, I wrote that."

438
00:25:59.819 --> 00:26:03.083
Mr de Guzman hardly
seemed to comprehend the chaos

439
00:26:03.083 --> 00:26:05.041
inflicted on
the world's computers.

440
00:26:05.041 --> 00:26:08.610
But what happened was, it
spread so quickly and so fast,

441
00:26:08.610 --> 00:26:11.265
it brought down email
all over the world,

442
00:26:11.265 --> 00:26:13.920
and having email go down
was monumental.

443
00:26:13.920 --> 00:26:17.358
Experts say that the ILOVEYOU
virus could end up costing

444
00:26:17.358 --> 00:26:21.580
the world economy $10 billion
in lost work time.

445
00:26:21.580 --> 00:26:25.627
It became the first sign to show
that we relied on the internet.

446
00:26:25.627 --> 00:26:29.196
The internet was the basis for
our financial transactions,

447
00:26:29.196 --> 00:26:31.154
for the way we do business.

448
00:26:32.460 --> 00:26:33.635
I would talk to people

449
00:26:33.635 --> 00:26:35.332
and remind them
and educate them and say,

450
00:26:35.332 --> 00:26:36.899
"Look, you can't just click

451
00:26:36.899 --> 00:26:39.380
on any attachment
that comes to you in an email."

452
00:26:39.380 --> 00:26:42.818
I remember talking to a guy
about the Anna Kournikova virus

453
00:26:42.818 --> 00:26:45.995
that purported to be nude
pictures of Anna Kournikova.

454
00:26:45.995 --> 00:26:48.955
And he told me, he said,
"Yeah, I knew it was a virus.

455
00:26:48.955 --> 00:26:52.088
I thought it was probably
a virus. But what if it wasn't?

456
00:26:52.088 --> 00:26:53.960
What if it really was
nude pictures?

457
00:26:53.960 --> 00:26:55.788
So I double-clicked on it."

458
00:26:56.919 --> 00:26:58.399
People just don't realise

459
00:26:58.399 --> 00:27:02.055
what clicking on that
attachment means.

460
00:27:02.055 --> 00:27:06.102
Cyber criminals and hackers
realised a long time ago

461
00:27:06.102 --> 00:27:09.018
that your username and password,

462
00:27:09.018 --> 00:27:11.804
particularly to
your email account,

463
00:27:11.804 --> 00:27:15.285
could get them into your
stock brokerage account,

464
00:27:15.285 --> 00:27:18.201
to your online
banking account,

465
00:27:18.201 --> 00:27:23.903
to send phishing emails
to other contacts.

466
00:27:23.903 --> 00:27:27.994
If you protect
yourself properly,

467
00:27:27.994 --> 00:27:31.214
the chances are
you won't be a victim

468
00:27:31.214 --> 00:27:35.218
of what one would call
"drive-by hacking".

469
00:27:35.218 --> 00:27:39.483
If, however, you're being
specifically targeted

470
00:27:39.483 --> 00:27:42.965
by a hacking group,
they will follow that trace.

471
00:27:43.879 --> 00:27:45.533
And they will get you.

472
00:27:48.449 --> 00:27:53.280
Now, we know that at least three
members of the Bangladeshi Bank

473
00:27:53.280 --> 00:27:56.587
were targeted by this after
the social engineer

474
00:27:56.587 --> 00:27:58.981
had scanned
all of their social media,

475
00:27:58.981 --> 00:28:00.722
and at least three of them

476
00:28:00.722 --> 00:28:04.073
opened the letter
and took the bait.

477
00:28:04.073 --> 00:28:06.249
Once that code
began executing

478
00:28:06.249 --> 00:28:08.295
on those bank employees'
computers,

479
00:28:08.295 --> 00:28:10.906
it would reach out back
to the attackers

480
00:28:10.906 --> 00:28:13.866
and tell them that
these machines are now infected

481
00:28:13.866 --> 00:28:15.302
and give them full control,

482
00:28:15.302 --> 00:28:18.044
as if they were sitting
in front of the keyboard,

483
00:28:18.044 --> 00:28:21.134
just like those employees.

484
00:28:21.134 --> 00:28:23.745
There was malware
in the system

485
00:28:23.745 --> 00:28:26.574
that was actually
copying screenshots,

486
00:28:28.358 --> 00:28:33.450
copying keystrokes of employees,
and no one knew.

487
00:28:33.450 --> 00:28:35.801
They've got
their foot in the door.

488
00:28:35.801 --> 00:28:38.760
This is the essential
first step.

489
00:28:38.760 --> 00:28:42.677
The first layer of security
has been breached.

490
00:28:48.639 --> 00:28:52.339
And the digger, the person who
is getting deeper and deeper

491
00:28:52.339 --> 00:28:54.558
into the computer network,

492
00:28:54.558 --> 00:28:58.258
has to be a very
advanced hacker.

493
00:28:58.258 --> 00:29:02.958
This is when you need
a real professional.

494
00:29:02.958 --> 00:29:05.656
They're like ghosts.
Nobody can see them,

495
00:29:05.656 --> 00:29:10.009
but they're mapping every
single bit of that network.

496
00:29:11.967 --> 00:29:13.577
In the Bank of Bangladesh,

497
00:29:13.577 --> 00:29:16.145
you had computers that are all
interconnected to each other,

498
00:29:16.145 --> 00:29:19.279
and they're connected
using what's called a switch.

499
00:29:19.279 --> 00:29:23.022
In your average bank, that has
a good security program,

500
00:29:23.022 --> 00:29:25.676
those switches are
what's called segmented.

501
00:29:25.676 --> 00:29:27.591
So each of those switches
only allow

502
00:29:27.591 --> 00:29:30.290
a certain number of computers
to talk to each other

503
00:29:30.290 --> 00:29:32.814
rather than every computer
to talk to each other.

504
00:29:32.814 --> 00:29:35.382
But in the case of
the Bank of Bangladesh,

505
00:29:35.382 --> 00:29:38.559
in the back-office network, they
were using these very cheap,

506
00:29:38.559 --> 00:29:42.084
literally $10 switches
that didn't do any segmentation.

507
00:29:42.084 --> 00:29:45.348
Every computer was potentially
connected to each other.

508
00:29:45.348 --> 00:29:48.308
Basically,
it's a cost-cutting exercise.

509
00:29:48.308 --> 00:29:53.530
But that cost-cutting exercise
was what the digger needed.

510
00:29:53.530 --> 00:29:55.489
Those attackers
began to do

511
00:29:55.489 --> 00:29:58.231
what we call a lateral traverse
across the network,

512
00:29:58.231 --> 00:30:01.147
search for other computers
to infect,

513
00:30:01.147 --> 00:30:03.062
look for credentials.

514
00:30:04.585 --> 00:30:06.848
Whenever you log
into a computer,

515
00:30:06.848 --> 00:30:08.676
your credentials are cached.

516
00:30:08.676 --> 00:30:11.331
They're put into the memory
of the computer.

517
00:30:11.331 --> 00:30:14.290
Attackers are able
to filter through that memory

518
00:30:14.290 --> 00:30:16.640
and find used usernames
and passwords.

519
00:30:16.640 --> 00:30:19.469
They don't always know
what they're for,

520
00:30:19.469 --> 00:30:22.385
so they try to collect as many
credentials as they can

521
00:30:22.385 --> 00:30:25.432
and see, "What computers can
I see from this computer?",

522
00:30:25.432 --> 00:30:27.608
and just begin to use them
over and over again

523
00:30:27.608 --> 00:30:28.652
and just try them.

524
00:30:31.264 --> 00:30:32.613
Eventually, they hop on

525
00:30:32.613 --> 00:30:35.050
and are able to connect
to another computer.

526
00:30:35.050 --> 00:30:36.312
They get onto that one.

527
00:30:36.312 --> 00:30:38.271
It's still not what
they're interested in,

528
00:30:38.271 --> 00:30:40.664
but they're able to find more
usernames and passwords

529
00:30:40.664 --> 00:30:42.405
and try those
on all the other computers

530
00:30:42.405 --> 00:30:44.190
they can see
from that advantage point.

531
00:30:44.190 --> 00:30:48.020
That's how they move across
the network over and over again.

532
00:30:48.020 --> 00:30:50.544
They would delete
all traces of themselves

533
00:30:50.544 --> 00:30:52.894
as they moved
across the network,

534
00:30:52.894 --> 00:30:55.636
ultimately jumping from
computer to computer

535
00:30:55.636 --> 00:30:57.681
until they found
the SWIFT terminal,

536
00:30:57.681 --> 00:31:00.815
their ultimate goal in order
to make wire transfers

537
00:31:00.815 --> 00:31:02.817
out of the Bank of Bangladesh.

538
00:31:04.993 --> 00:31:06.777
It takes a long time.

539
00:31:06.777 --> 00:31:10.172
They're there for months.
This is an ongoing process.

540
00:31:10.172 --> 00:31:14.220
If at any moment they're
discovered to be in there,

541
00:31:14.220 --> 00:31:18.137
then the whole
operation is finished.

542
00:31:22.141 --> 00:31:24.056
With the Bangladeshi Bank heist,

543
00:31:24.056 --> 00:31:27.276
you basically have two
operations running in parallel.

544
00:31:27.276 --> 00:31:29.670
You have an offline operation
going on,

545
00:31:29.670 --> 00:31:32.238
which is to do with
the money laundering.

546
00:31:36.895 --> 00:31:38.940
It's the fence's responsibility

547
00:31:38.940 --> 00:31:43.902
to set up
the recipient accounts.

548
00:31:43.902 --> 00:31:46.382
They're gonna end up
with cold, hard cash,

549
00:31:46.382 --> 00:31:48.080
and they need individuals
on the ground

550
00:31:48.080 --> 00:31:50.909
to pick up that cash
and move it.

551
00:31:53.172 --> 00:31:54.434
And so, in May of 2015,

552
00:31:54.434 --> 00:31:56.871
before they'd even got
into the SWIFT terminal,

553
00:31:56.871 --> 00:31:59.656
they were able to recruit
a Chinese individual

554
00:31:59.656 --> 00:32:03.312
to go to the Philippines and
open up four bank accounts there

555
00:32:03.312 --> 00:32:05.227
at a bank called RCBC.

556
00:32:05.227 --> 00:32:08.883
You have to make sure
those people inside the bank

557
00:32:08.883 --> 00:32:10.711
in the Philippines

558
00:32:10.711 --> 00:32:12.974
have been properly corrupted

559
00:32:12.974 --> 00:32:17.674
and properly instructed
as to what their role is.

560
00:32:17.674 --> 00:32:20.068
The fence opens up
these accounts,

561
00:32:20.068 --> 00:32:22.592
puts $500 in each of them,

562
00:32:22.592 --> 00:32:25.726
and then they just go to sleep
for nine months.

563
00:32:28.598 --> 00:32:31.950
These attackers were
inside the Bank of Bangladesh

564
00:32:31.950 --> 00:32:34.822
for a full year,
which is incredible.

565
00:32:41.307 --> 00:32:43.265
They actually got
onto that SWIFT terminal

566
00:32:43.265 --> 00:32:44.788
exactly one year later...

567
00:32:47.617 --> 00:32:50.229
on January 29th, 2016.

568
00:32:55.495 --> 00:32:58.019
In any bank,
you have different employees.

569
00:32:58.019 --> 00:33:01.414
You have back-office employees,
administrative employees,

570
00:33:01.414 --> 00:33:04.330
but you also have computers
that are connected

571
00:33:04.330 --> 00:33:07.159
directly to
financial transactions.

572
00:33:07.159 --> 00:33:11.076
And only users who have specific
access to those machines

573
00:33:11.076 --> 00:33:12.555
are allowed to use them.

574
00:33:12.555 --> 00:33:15.036
When we talk about the case of
the Bank of Bangladesh,

575
00:33:15.036 --> 00:33:18.605
there was a single computer
that had credentials

576
00:33:18.605 --> 00:33:20.085
from a shared employee.

577
00:33:20.085 --> 00:33:23.218
You had an employee that
would use that SWIFT terminal,

578
00:33:23.218 --> 00:33:26.830
but also had their own computer
in the normal back-office area.

579
00:33:26.830 --> 00:33:29.355
Once they got onto
that employee's computer,

580
00:33:29.355 --> 00:33:31.052
they were able to jump across.

581
00:33:31.052 --> 00:33:34.969
They waited. They basically
did a recon on the system.

582
00:33:34.969 --> 00:33:36.579
They crawled around.

583
00:33:36.579 --> 00:33:39.756
They looked and tried to fully
understand how this worked,

584
00:33:39.756 --> 00:33:43.804
how SWIFT worked, how each bank
employee would make a request

585
00:33:43.804 --> 00:33:47.155
into the SWIFT system,
where it would go,

586
00:33:47.155 --> 00:33:49.244
how to direct that to branches

587
00:33:49.244 --> 00:33:52.117
where they had set up
these accounts.

588
00:33:52.117 --> 00:33:55.729
And in this case, it was just
very simple and very clever.

589
00:33:58.166 --> 00:34:00.342
The thief is
not so much someone

590
00:34:00.342 --> 00:34:03.302
who is physically
taking out the money

591
00:34:03.302 --> 00:34:05.695
and stuffing it into a bag.

592
00:34:05.695 --> 00:34:07.610
They're making sure

593
00:34:07.610 --> 00:34:12.572
that every bit on the system
is coordinated.

594
00:34:12.572 --> 00:34:16.228
There are all sorts of things
to get right

595
00:34:16.228 --> 00:34:21.494
before that fatal moment
when the request is made.

596
00:34:21.494 --> 00:34:24.105
Everything has to be

597
00:34:24.105 --> 00:34:26.716
really, really
precisely coordinated

598
00:34:26.716 --> 00:34:29.937
to get all the timing right.
You've got four days.

599
00:34:29.937 --> 00:34:31.547
You can't afford a slip-up.

600
00:34:31.547 --> 00:34:34.333
When the attackers
got into the SWIFT terminal

601
00:34:34.333 --> 00:34:38.728
on January 29th of 2016,
they paused for about five days

602
00:34:38.728 --> 00:34:41.079
to get their malicious
software ready

603
00:34:41.079 --> 00:34:43.168
that allowed them
to cover their tracks

604
00:34:43.168 --> 00:34:45.257
when they were on
that SWIFT terminal.

605
00:34:45.257 --> 00:34:48.173
They decided to wait
until February 4th.

606
00:34:48.173 --> 00:34:49.826
And this is no accident.

607
00:34:52.960 --> 00:34:55.702
They have chosen
a long weekend

608
00:34:55.702 --> 00:34:58.574
due to holidays in different
parts of the world.

609
00:34:58.574 --> 00:35:01.186
That means,
instead of the usual two days

610
00:35:01.186 --> 00:35:02.535
they have to get away with it

611
00:35:02.535 --> 00:35:04.841
before alarms
start going off everywhere,

612
00:35:04.841 --> 00:35:07.931
they've got four days.
It's brilliant.

613
00:35:09.498 --> 00:35:11.935
February 4th, 2016,
was a Thursday.

614
00:35:11.935 --> 00:35:14.634
That's the last day of
the working week in Bangladesh.

615
00:35:14.634 --> 00:35:16.940
In Bangladesh, they work
from Sunday to Thursday.

616
00:35:16.940 --> 00:35:19.421
So, at some point late
in the afternoon,

617
00:35:19.421 --> 00:35:22.685
the SWIFT transaction operator
in the Bangladeshi Bank

618
00:35:22.685 --> 00:35:24.687
logs off his terminal.

619
00:35:28.778 --> 00:35:30.476
But three hours later,

620
00:35:30.476 --> 00:35:33.435
the thief logs into
that terminal

621
00:35:33.435 --> 00:35:35.829
and starts to impersonate him.

622
00:35:35.829 --> 00:35:38.919
They logged into that SWIFT
terminal at 8:36 p.m.,

623
00:35:38.919 --> 00:35:41.051
after they believed,
or really knew,

624
00:35:41.051 --> 00:35:44.403
that all the bank employees
had gone home for the weekend.

625
00:35:44.403 --> 00:35:48.233
And they put forward
35 different wire transactions

626
00:35:48.233 --> 00:35:52.280
from that SWIFT terminal,
totalling $951 million,

627
00:35:52.280 --> 00:35:55.631
almost $1 billion,
completely unheard of.

628
00:35:58.678 --> 00:36:02.029
Ten hours
behind Bangladesh,

629
00:36:02.029 --> 00:36:03.813
New York is waking up.

630
00:36:04.945 --> 00:36:07.252
The first thing
that the Fed sees

631
00:36:07.252 --> 00:36:09.297
is 35 requests

632
00:36:09.297 --> 00:36:13.214
for almost the entire holdings
of the Bangladeshi Bank.

633
00:36:13.214 --> 00:36:17.523
Usually, it's figures of sort
of $300,000, $500,000.

634
00:36:17.523 --> 00:36:19.525
They want almost a billion!

635
00:36:19.525 --> 00:36:23.746
The operator, perhaps
unsurprisingly, rejects it,

636
00:36:23.746 --> 00:36:26.488
sends it back to Bangladesh.

637
00:36:26.488 --> 00:36:28.751
But he rejects it not because

638
00:36:28.751 --> 00:36:32.581
this is an absolutely crazy
amount of money,

639
00:36:32.581 --> 00:36:36.585
but because the requests
are wrongly formatted.

640
00:36:36.585 --> 00:36:39.153
As much research
that they had done,

641
00:36:39.153 --> 00:36:41.851
they didn't really understand
how to fill out

642
00:36:41.851 --> 00:36:43.331
those SWIFT transfers.

643
00:36:43.331 --> 00:36:45.942
They were missing what's called
an intermediate bank.

644
00:36:45.942 --> 00:36:48.162
New York Federal Reserve
replied to them,

645
00:36:48.162 --> 00:36:50.469
via the SWIFT system,
back to their computer

646
00:36:50.469 --> 00:36:52.688
that they were sitting
in front of, virtually,

647
00:36:52.688 --> 00:36:56.475
saying, "Hey, these transactions
are missing information."

648
00:36:56.475 --> 00:36:58.520
They think on their feet.

649
00:36:58.520 --> 00:37:02.829
They reformat the requests,
send them back...

650
00:37:02.829 --> 00:37:06.006
and hold their breath
to see what happens.

651
00:37:06.006 --> 00:37:08.574
They ultimately corrected
34 of them.

652
00:37:08.574 --> 00:37:09.879
They had forgotten one.

653
00:37:09.879 --> 00:37:12.230
The one did have
the intermediate bank

654
00:37:12.230 --> 00:37:13.448
went to Deutsche Bank.

655
00:37:13.448 --> 00:37:15.581
That order was for $20 million

656
00:37:15.581 --> 00:37:19.802
to a charity called the Shalika
Foundation in Sri Lanka.

657
00:37:19.802 --> 00:37:22.109
But they had made
a typo as well,

658
00:37:22.109 --> 00:37:25.417
and they had misspelled
"foundation" as "fandation".

659
00:37:25.417 --> 00:37:27.680
And so Deutsche Bank
saw that typo

660
00:37:27.680 --> 00:37:29.856
and questioned it and, again,

661
00:37:29.856 --> 00:37:32.293
held that transaction
due to that typo.

662
00:37:34.643 --> 00:37:36.863
We use that
as the poster child

663
00:37:36.863 --> 00:37:40.083
for why you need
to learn how to spell.

664
00:37:40.083 --> 00:37:43.783
Otherwise, you can lose
$20 million.

665
00:37:43.783 --> 00:37:47.265
Ultimately, when
they return the other 34...

666
00:37:48.570 --> 00:37:50.268
Bingo.

667
00:37:50.268 --> 00:37:52.487
The operator approves them.

668
00:37:52.487 --> 00:37:55.795
Four of them went through.

669
00:37:55.795 --> 00:38:00.495
The green light is given.
The heist is on.

670
00:38:00.495 --> 00:38:03.629
Those four went through
to those bank accounts

671
00:38:03.629 --> 00:38:06.066
in the Philippines
that had been opened

672
00:38:06.066 --> 00:38:07.589
more than six months earlier.

673
00:38:07.589 --> 00:38:10.636
And they were able
to transfer out $81 million

674
00:38:10.636 --> 00:38:12.638
to the bank in the Philippines.

675
00:38:34.181 --> 00:38:37.837
Ultimately, they were about
to transfer $1 billion

676
00:38:37.837 --> 00:38:39.534
from the Bank of Bangladesh,

677
00:38:39.534 --> 00:38:42.494
but they didn't want
anyone to find out.

678
00:38:47.847 --> 00:38:51.459
They began to cover
their tracks.

679
00:38:51.459 --> 00:38:53.200
Normally, as a bank employee,

680
00:38:53.200 --> 00:38:55.071
you'll load up
the SWIFT software,

681
00:38:55.071 --> 00:38:57.944
you'll see on the screen
all the latest transactions,

682
00:38:57.944 --> 00:38:59.598
you can make transactions.

683
00:38:59.598 --> 00:39:04.342
And so the attackers deleted all
records of those transactions.

684
00:39:07.083 --> 00:39:08.563
But it's not just digital.

685
00:39:08.563 --> 00:39:13.002
In the world of finance,
everything must be a hard copy.

686
00:39:13.002 --> 00:39:16.005
And the attackers
knew that as well.

687
00:39:20.575 --> 00:39:23.622
Every SWIFT transaction
that takes place

688
00:39:23.622 --> 00:39:28.975
is immediately printed out
locally in the Bangladeshi Bank.

689
00:39:28.975 --> 00:39:31.978
So that printer cannot
be working

690
00:39:31.978 --> 00:39:34.676
when the heist is going on.

691
00:39:34.676 --> 00:39:37.549
The attackers hijacked
all of those print jobs,

692
00:39:37.549 --> 00:39:40.421
replaced all of those
print jobs with zeros

693
00:39:40.421 --> 00:39:43.555
so that nothing would
come out of the printer.

694
00:39:43.555 --> 00:39:48.516
Now, the other 30
wire transactions sat around.

695
00:39:48.516 --> 00:39:51.867
And, ultimately,
the attackers waited,

696
00:39:51.867 --> 00:39:54.261
and they waited...

697
00:39:54.261 --> 00:39:58.874
And they logged out at
3:59 a.m. Bangladesh time.

698
00:39:58.874 --> 00:40:01.442
Potentially, they thought
that in New York,

699
00:40:01.442 --> 00:40:03.096
the business day ended
at five p.m.,

700
00:40:03.096 --> 00:40:04.924
and they weren't gonna hear
any more.

701
00:40:04.924 --> 00:40:06.882
The New York Fed
had actually stopped

702
00:40:06.882 --> 00:40:08.449
the rest of the transactions,

703
00:40:08.449 --> 00:40:11.931
because the address for
the bank in the Philippines

704
00:40:11.931 --> 00:40:15.804
was on Jupiter Street.
J-U-P-I-T-E-R.

705
00:40:15.804 --> 00:40:20.853
Right, now this is when
the story gets really weird.

706
00:40:20.853 --> 00:40:24.857
In a totally unrelated incident
two years earlier,

707
00:40:24.857 --> 00:40:28.469
we have a Greek shipping
magnate, Dimitris Cambis,

708
00:40:28.469 --> 00:40:32.038
and he is buying eight tankers.

709
00:40:32.038 --> 00:40:35.258
What Dimitris knew,
but not many other people,

710
00:40:35.258 --> 00:40:39.872
was that the money
for these eight oil tankers

711
00:40:39.872 --> 00:40:41.917
came from Iran,

712
00:40:41.917 --> 00:40:45.660
and Iran was under US sanctions.

713
00:40:45.660 --> 00:40:48.358
Someone in the US
caught wind of the fact

714
00:40:48.358 --> 00:40:51.710
that the Iranians were
financing Mr Cambis.

715
00:40:51.710 --> 00:40:55.017
His company was put on
the sanctions watch list,

716
00:40:55.017 --> 00:40:58.325
and his company
was called Jupiter Seaways.

717
00:41:00.675 --> 00:41:02.590
It was just their bad luck

718
00:41:02.590 --> 00:41:05.201
that they designated
the money transfers

719
00:41:05.201 --> 00:41:11.338
to go to the Jupiter branch
of the Rizal Bank in Manila.

720
00:41:11.338 --> 00:41:15.211
As the transfers were being sent
out from the New York Reserve

721
00:41:15.211 --> 00:41:16.996
to the Philippines,

722
00:41:16.996 --> 00:41:20.956
the Jupiter name was caught
by the computer system.

723
00:41:20.956 --> 00:41:23.916
It halted these transactions.

724
00:41:23.916 --> 00:41:26.484
The Fed had to take
a second look.

725
00:41:26.484 --> 00:41:28.790
They stopped it
because they realised,

726
00:41:28.790 --> 00:41:31.184
"Wait, we have somewhere
in the order 35 transactions

727
00:41:31.184 --> 00:41:33.229
coming from
the Bank of Bangladesh,

728
00:41:33.229 --> 00:41:37.407
adding up to $1 billion?
You know, this isn't usual."

729
00:41:37.407 --> 00:41:40.062
So they held them
and sent a message back,

730
00:41:40.062 --> 00:41:41.890
asking for confirmation.

731
00:41:44.589 --> 00:41:47.766
Had the attackers waited
just one more hour,

732
00:41:47.766 --> 00:41:50.595
they could have replied to them
via the SWIFT system,

733
00:41:50.595 --> 00:41:53.206
saying these transactions
were not a mistake.

734
00:41:53.206 --> 00:41:55.295
Ultimately,
the Bank of Bangladesh

735
00:41:55.295 --> 00:41:57.253
might have lost
much, much more.

736
00:41:57.253 --> 00:42:01.344
So far, they managed
to get $81 million.

737
00:42:01.344 --> 00:42:05.435
But, boy, did they come close
to hitting the jackpot.

738
00:42:05.435 --> 00:42:07.655
Just under $1 billion

739
00:42:07.655 --> 00:42:11.572
was very, very nearly
stolen from this bank.

740
00:42:22.061 --> 00:42:25.194
The next day,
the bank employees came in,

741
00:42:25.194 --> 00:42:26.587
and the printer wasn't working,

742
00:42:26.587 --> 00:42:28.937
because they installed
their malicious code

743
00:42:28.937 --> 00:42:30.722
to prevent that from happening.

744
00:42:30.722 --> 00:42:32.637
Ultimately,
those bank employees

745
00:42:32.637 --> 00:42:34.900
didn't get it fixed
until February 6,

746
00:42:34.900 --> 00:42:36.554
which would have been a Sunday.

747
00:42:38.251 --> 00:42:41.297
When the printer started,
all these messages came out,

748
00:42:41.297 --> 00:42:42.908
messages from the Fed asking,

749
00:42:42.908 --> 00:42:46.041
"What are these 30 transactions?
Did you mean to make these?"

750
00:42:46.041 --> 00:42:48.304
That triggered
the Bank of Bangladesh

751
00:42:48.304 --> 00:42:51.003
to realise something
had gone wrong.

752
00:42:51.003 --> 00:42:53.658
It was very clear
that they were in deep,

753
00:42:53.658 --> 00:42:57.357
such that the bank manager...
This is the Bank of Bangladesh,

754
00:42:57.357 --> 00:43:00.534
the federal bank, the national
bank of the country,

755
00:43:00.534 --> 00:43:04.103
did not notify the leaders,

756
00:43:04.103 --> 00:43:07.236
the government of Bangladesh.
He kept it under wraps.

757
00:43:07.236 --> 00:43:10.544
He notified someone he knew
who knew about security.

758
00:43:10.544 --> 00:43:12.372
"Get on a plane,
get to Bangladesh.

759
00:43:12.372 --> 00:43:14.940
I need you to look at
these computer systems."

760
00:43:20.467 --> 00:43:22.948
Initially, the governor
and his whole team

761
00:43:22.948 --> 00:43:24.166
were quite perplexed.

762
00:43:24.166 --> 00:43:27.343
They didn't quite know
what had happened.

763
00:43:27.343 --> 00:43:30.216
So they thought that
some money had been routed

764
00:43:30.216 --> 00:43:33.045
to a wrong account;
it would come back.

765
00:43:36.309 --> 00:43:39.921
I get this strange phone call
from the governor's office

766
00:43:39.921 --> 00:43:42.707
asking me if I would
drop everything

767
00:43:42.707 --> 00:43:45.274
and come to Dhaka, Bangladesh.

768
00:43:49.061 --> 00:43:51.237
So I assembled a team...

769
00:43:52.107 --> 00:43:53.892
and we flew down.

770
00:43:57.896 --> 00:44:02.596
When we arrived there, we met
with the Bangladesh Bank team.

771
00:44:02.596 --> 00:44:06.121
And that's when I discovered
all the horrifying details

772
00:44:06.121 --> 00:44:08.471
of what had actually happened.

773
00:44:12.388 --> 00:44:15.217
They decide,
"Let's look at the CCTV.

774
00:44:15.217 --> 00:44:17.393
What's that going to tell us?"

775
00:44:17.393 --> 00:44:20.309
There were eight
hours' worth of tapes

776
00:44:20.309 --> 00:44:23.138
that had to be gone through.

777
00:44:23.138 --> 00:44:26.054
Your gut instinct is,
you have a malicious insider.

778
00:44:26.054 --> 00:44:27.708
A physical person had to go in,

779
00:44:27.708 --> 00:44:30.842
log into that machine
and try to make these transfers,

780
00:44:30.842 --> 00:44:34.715
because this attack
hadn't happened before.

781
00:44:34.715 --> 00:44:37.631
They had a SWIFT room,
which was locked.

782
00:44:37.631 --> 00:44:39.938
And typically when
the SWIFT operators

783
00:44:39.938 --> 00:44:43.724
needed to do something on SWIFT,
they had to go into the room,

784
00:44:43.724 --> 00:44:47.467
sit in that chair and terminal,

785
00:44:47.467 --> 00:44:52.037
and there was only
one shadow we could find.

786
00:44:52.037 --> 00:44:54.779
We eventually decided
it was the person

787
00:44:54.779 --> 00:44:58.391
sweeping the place after hours.

788
00:45:00.741 --> 00:45:04.310
They were saying, "How could
somebody process the transaction

789
00:45:04.310 --> 00:45:05.964
when there was nobody there?"

790
00:45:05.964 --> 00:45:10.577
I mean, even after the payment
instructions had been sent,

791
00:45:10.577 --> 00:45:15.408
they had no idea for a very long
time what was happening.

792
00:45:15.408 --> 00:45:19.412
They didn't think it was a hack.
They had no traces of a hack.

793
00:45:19.412 --> 00:45:22.632
But they watched eight hours of
that footage over that weekend

794
00:45:22.632 --> 00:45:25.635
and realised there was
no one at that computer.

795
00:45:25.635 --> 00:45:26.941
Nothing.

796
00:45:26.941 --> 00:45:29.248
They had no idea that
the Bank of Bangladesh

797
00:45:29.248 --> 00:45:31.859
had been breached by hackers.

798
00:45:31.859 --> 00:45:35.384
Only after we see these things
happen over and over again,

799
00:45:35.384 --> 00:45:39.171
we realise that cyber
has such capabilities.

800
00:45:44.045 --> 00:45:47.440
Bangladesh was a bit of
a bombshell for all of us.

801
00:45:49.311 --> 00:45:52.097
Hackers and most cybercrime,

802
00:45:52.097 --> 00:45:54.055
it's like smash-and-grab crime.

803
00:45:54.055 --> 00:45:56.492
Quickly grab something
and monetise it

804
00:45:56.492 --> 00:45:58.103
as swiftly as you can.

805
00:45:58.103 --> 00:46:01.236
You know, storm a bank
with shotguns, blow a safe,

806
00:46:01.236 --> 00:46:03.978
fill some bags with cash.

807
00:46:03.978 --> 00:46:06.024
Cybercrime...

808
00:46:06.024 --> 00:46:09.418
It doesn't lend itself well
to long conspiracy

809
00:46:09.418 --> 00:46:11.856
and lots of investigation
and investment

810
00:46:11.856 --> 00:46:13.596
into understanding your target.

811
00:46:13.596 --> 00:46:15.903
I mean, you couldn't
do Bangladesh

812
00:46:15.903 --> 00:46:19.037
unless you really understood
the internal workings

813
00:46:19.037 --> 00:46:21.909
of the central bank
and all the actors involved.

814
00:46:21.909 --> 00:46:24.607
That's not something
that freelance hackers

815
00:46:24.607 --> 00:46:26.827
really are good at.

816
00:46:26.827 --> 00:46:29.917
That requires a level of
investment into resources

817
00:46:29.917 --> 00:46:34.095
and frankly intelligence
that has to be sustained.

818
00:46:34.095 --> 00:46:38.012
To organise something
of that complexity

819
00:46:38.012 --> 00:46:40.841
and for it not to be noticed

820
00:46:40.841 --> 00:46:43.539
by the intelligence agencies
of the state

821
00:46:43.539 --> 00:46:46.020
where that is being planned

822
00:46:46.020 --> 00:46:50.285
would be very,
very difficult indeed.

823
00:46:50.285 --> 00:46:53.419
These hackers went in
and looked at the zeros and ones

824
00:46:53.419 --> 00:46:55.725
in the software
and reverse engineered it,

825
00:46:55.725 --> 00:46:58.380
turned it back into
understandable code.

826
00:46:58.380 --> 00:47:00.905
That's not something
that happens overnight.

827
00:47:00.905 --> 00:47:02.384
It was pretty clear

828
00:47:02.384 --> 00:47:04.865
that this isn't just
normal criminals.

829
00:47:04.865 --> 00:47:07.128
This has to be something bigger.

830
00:47:10.044 --> 00:47:13.961
Once attackers have gained
access to their target network,

831
00:47:13.961 --> 00:47:16.007
they want to stay undetected.

832
00:47:18.487 --> 00:47:20.968
And we've seen many
interesting examples

833
00:47:20.968 --> 00:47:23.014
of how exactly this is done.

834
00:47:26.278 --> 00:47:27.801
What exactly happened

835
00:47:27.801 --> 00:47:30.195
at the Natanz nuclear facility
last week?

836
00:47:30.195 --> 00:47:32.806
It's a question people in Iran
around the world

837
00:47:32.806 --> 00:47:35.461
have been asking
since a fire was reported

838
00:47:35.461 --> 00:47:38.856
at Iran's main uranium
enrichment facility on Thursday.

839
00:47:38.856 --> 00:47:41.902
We're used to Trojans
and viruses on the internet,

840
00:47:41.902 --> 00:47:43.338
but this is the first worm

841
00:47:43.338 --> 00:47:46.907
designed to damage
the physical world.

842
00:47:46.907 --> 00:47:51.042
In 2010, attackers created
a piece of malicious software

843
00:47:51.042 --> 00:47:55.350
that was designed to infiltrate
Iran's nuclear programme,

844
00:47:55.350 --> 00:47:57.004
to get into their centrifuges,

845
00:47:57.004 --> 00:47:59.050
in particular,
get onto computers

846
00:47:59.050 --> 00:48:00.921
that controlled
their centrifuges.

847
00:48:00.921 --> 00:48:04.142
Iran says it will
retaliate against any country

848
00:48:04.142 --> 00:48:06.884
that conducts cyber-attacks
on its nuclear sites.

849
00:48:06.884 --> 00:48:09.538
The intention
was to spin the centrifuges

850
00:48:09.538 --> 00:48:12.150
of Iran's nuclear capabilities
out of control,

851
00:48:12.150 --> 00:48:14.152
make the centrifuges explode

852
00:48:14.152 --> 00:48:15.414
and push them ten years back

853
00:48:15.414 --> 00:48:17.372
in the uranium enrichment programme.

854
00:48:17.372 --> 00:48:18.721
As a piece of malware,

855
00:48:18.721 --> 00:48:21.768
it was 40 times larger
than any piece of malware

856
00:48:21.768 --> 00:48:24.336
that had ever been
encountered before.

857
00:48:24.336 --> 00:48:28.514
It would have taken
the most advanced,

858
00:48:28.514 --> 00:48:30.995
brilliant computer engineers

859
00:48:30.995 --> 00:48:34.085
years and years of human
working hours

860
00:48:34.085 --> 00:48:35.956
to produce this.

861
00:48:35.956 --> 00:48:38.089
Why was it so big?

862
00:48:38.089 --> 00:48:42.310
Because it needed
to cover itself up.

863
00:48:44.834 --> 00:48:47.794
The attackers
were actually recording

864
00:48:47.794 --> 00:48:52.320
the network traffic,
the normal network traffic,

865
00:48:52.320 --> 00:48:55.062
and then playing it back
to the sensors

866
00:48:55.062 --> 00:48:58.848
when they started modifying the
operations of the centrifuges

867
00:48:58.848 --> 00:49:00.720
they were trying to break.

868
00:49:04.463 --> 00:49:06.900
This is the equivalent of,
in the real world,

869
00:49:06.900 --> 00:49:09.903
recording the CCTV footage
from a security camera

870
00:49:09.903 --> 00:49:12.166
and then playing it back
to the camera

871
00:49:12.166 --> 00:49:14.125
when you're doing
something bad.

872
00:49:14.125 --> 00:49:16.301
That's what Stuxnet was doing.

873
00:49:16.301 --> 00:49:18.042
And in the Bangladesh heist,

874
00:49:18.042 --> 00:49:20.218
they were doing
something similar.

875
00:49:20.218 --> 00:49:22.872
Once they made
their transactions,

876
00:49:22.872 --> 00:49:26.311
they wanted to make sure no one
realised they had happened.

877
00:49:26.311 --> 00:49:29.053
They were actually falsifying
the information

878
00:49:29.053 --> 00:49:30.576
about transactions.

879
00:49:30.576 --> 00:49:33.405
The recording of the
transactions were being done

880
00:49:33.405 --> 00:49:34.972
both in electronic format,

881
00:49:34.972 --> 00:49:38.540
but also falsifying the data
being sent to the printers,

882
00:49:38.540 --> 00:49:41.021
which actually looked like
everything was fine.

883
00:49:41.021 --> 00:49:44.242
So you find out how
you're being tracked,

884
00:49:44.242 --> 00:49:46.984
and then you try
to cover your tracks.

885
00:49:46.984 --> 00:49:48.246
Stuxnet did that.

886
00:49:48.246 --> 00:49:50.770
The Bangladeshi heist
did it as well.

887
00:49:53.207 --> 00:49:56.950
Once that money
arrived in the Philippines,

888
00:49:56.950 --> 00:50:00.519
they needed to change
that money into cold, hard cash.

889
00:50:00.519 --> 00:50:02.912
Right now, it's still in
digital ones and zeros,

890
00:50:02.912 --> 00:50:05.437
just a transaction that said
the money has moved

891
00:50:05.437 --> 00:50:06.829
from the Bank of Bangladesh

892
00:50:06.829 --> 00:50:10.094
to these accounts at RCBC.
Four accounts.

893
00:50:10.094 --> 00:50:13.532
The thieves had to
get it out of the Philippines,

894
00:50:13.532 --> 00:50:15.621
make it disappear.

895
00:50:15.621 --> 00:50:18.450
So how were they going
to do that?

896
00:50:18.450 --> 00:50:20.843
There is one industry
in the Philippines

897
00:50:20.843 --> 00:50:23.237
where there is absolutely
no oversight,

898
00:50:23.237 --> 00:50:27.241
where it's a cash-only business.
There are no records, no names.

899
00:50:27.241 --> 00:50:29.113
That is the casino industry.

900
00:50:41.125 --> 00:50:43.257
When we talk about
laundering funds,

901
00:50:43.257 --> 00:50:45.955
we're talking about
taking dirty, illicit funds,

902
00:50:45.955 --> 00:50:49.481
running them through
a legal business

903
00:50:49.481 --> 00:50:52.049
so that if I came
to you and said,

904
00:50:52.049 --> 00:50:55.400
"Hey, where'd you get
that $81 million?",

905
00:50:55.400 --> 00:51:00.318
you could have a paper trail
to show that you won it back.

906
00:51:00.318 --> 00:51:03.103
The hard part
is not stealing the money.

907
00:51:03.103 --> 00:51:06.628
The hard part is moving the
money into a form you can use

908
00:51:06.628 --> 00:51:08.152
without getting caught.

909
00:51:10.241 --> 00:51:15.202
And one method we've seen
for quite a while is gambling.

910
00:51:15.202 --> 00:51:17.074
It was very clear that,

911
00:51:17.074 --> 00:51:20.251
if, at all, there was a place
for you to do that,

912
00:51:20.251 --> 00:51:22.166
it would have been
the Philippines,

913
00:51:22.166 --> 00:51:25.038
because the casinos
are not regulated at all.

914
00:51:27.171 --> 00:51:30.304
It's like a lot of
high-flying gamblers

915
00:51:30.304 --> 00:51:33.307
who'd kind of fly to Manila,

916
00:51:33.307 --> 00:51:37.050
crowd these numerous casinos
in Manila,

917
00:51:37.050 --> 00:51:38.399
lots of money coming in.

918
00:51:38.399 --> 00:51:41.315
People don't question
that kind of money.

919
00:51:41.315 --> 00:51:42.795
I mean, you know...

920
00:51:42.795 --> 00:51:44.753
"Well, as long as
it's coming to us,

921
00:51:44.753 --> 00:51:47.887
we don't bother too much
about where it is coming from."

922
00:51:49.323 --> 00:51:52.283
The thieves knew
if they could get that money

923
00:51:52.283 --> 00:51:55.547
into the casinos,
it would essentially be lost.

924
00:51:56.809 --> 00:51:58.115
What happened was,

925
00:51:58.115 --> 00:52:00.421
the manager from
the Philippines bank,

926
00:52:00.421 --> 00:52:03.381
she was the one who'd opened
those four accounts

927
00:52:03.381 --> 00:52:05.557
using fraudulent IDs.

928
00:52:05.557 --> 00:52:09.952
She got the money withdrawn from
the bank in the Philippines.

929
00:52:11.563 --> 00:52:12.955
From there, it started to go

930
00:52:12.955 --> 00:52:14.566
through something
called Philrem.

931
00:52:14.566 --> 00:52:18.004
It's a bit like a Western Union
in the Philippines,

932
00:52:18.004 --> 00:52:20.180
transferred into pesos.

933
00:52:20.180 --> 00:52:22.487
I don't know
if you've ever used

934
00:52:22.487 --> 00:52:24.010
Philippine pesos before,

935
00:52:24.010 --> 00:52:28.057
but that's one hell
of a lot of pesos, $22 million.

936
00:52:28.057 --> 00:52:33.454
In fact,
it's over one million banknotes.

937
00:52:33.454 --> 00:52:35.630
They actually had
to request that cash

938
00:52:35.630 --> 00:52:38.981
to come from a sister
branch location,

939
00:52:38.981 --> 00:52:40.853
that arrived in boxes.

940
00:52:40.853 --> 00:52:44.422
The bank manager was seen by
one of the other bank employees

941
00:52:44.422 --> 00:52:47.599
collecting those boxes
and literally going outside

942
00:52:47.599 --> 00:52:49.862
and loading them up
into a Lexus.

943
00:52:50.993 --> 00:52:53.344
And that money
was driven away.

944
00:52:59.785 --> 00:53:03.702
So, we're talking stacks
of bills carried in vans

945
00:53:03.702 --> 00:53:07.227
to the Solaire Casino
right by the airport.

946
00:53:07.227 --> 00:53:10.448
It allows the Chinese gamblers
to come off the plane.

947
00:53:10.448 --> 00:53:13.320
Five minutes, they're on
the floor playing baccarat.

948
00:53:16.410 --> 00:53:19.979
The money goes to this place.
It's wheeled in wheelbarrows

949
00:53:19.979 --> 00:53:24.113
across the casino floor
up to this guarded escalator.

950
00:53:35.255 --> 00:53:38.215
There's so much
physical cash involved,

951
00:53:38.215 --> 00:53:41.305
they've enlisted their
own crew of gamblers

952
00:53:41.305 --> 00:53:44.830
to launder the stolen funds.

953
00:53:44.830 --> 00:53:47.093
And they just played baccarat,

954
00:53:47.093 --> 00:53:49.617
all day long.

955
00:53:49.617 --> 00:53:51.140
They had individuals,

956
00:53:51.140 --> 00:53:54.231
mostly appeared to be Chinese
nationals that they had,

957
00:53:54.231 --> 00:53:57.538
I assume, hired to take
those funds and launder them.

958
00:53:57.538 --> 00:54:01.499
You change that cash
into casino chips,

959
00:54:01.499 --> 00:54:03.152
play a few games,

960
00:54:03.152 --> 00:54:04.937
cash in the chips.

961
00:54:04.937 --> 00:54:10.595
And when you get that cash back,
that is then laundered.

962
00:54:10.595 --> 00:54:13.119
And this wouldn't
have been unusual.

963
00:54:13.119 --> 00:54:15.513
This was the Chinese lunar week.

964
00:54:15.513 --> 00:54:18.298
That would've been very common
for individuals,

965
00:54:18.298 --> 00:54:20.561
high rollers, to come
into the Philippines

966
00:54:20.561 --> 00:54:22.868
and play at the casinos
during that time.

967
00:54:22.868 --> 00:54:26.611
Spending $22 million in
a casino over a weekend,

968
00:54:26.611 --> 00:54:28.569
let's face it, could be fun.

969
00:54:32.878 --> 00:54:36.708
Doing this story
and trying to figure out

970
00:54:36.708 --> 00:54:40.407
where in history
to sort of place this thing.

971
00:54:40.407 --> 00:54:43.323
Was this the biggest
heist of all time?

972
00:54:43.323 --> 00:54:47.327
No, but it certainly looked
to be the biggest cyber heist

973
00:54:47.327 --> 00:54:50.243
of a bank in history.

974
00:54:50.243 --> 00:54:54.378
And over the next few days,
I just remember

975
00:54:54.378 --> 00:54:58.425
calling up my sources
at Symantec

976
00:54:58.425 --> 00:55:00.993
and a couple other
cybersecurity firms

977
00:55:00.993 --> 00:55:04.257
and getting in touch with
a guy named Eric Chien.

978
00:55:06.085 --> 00:55:09.131
We have all kinds of
sensors sitting on networks

979
00:55:09.131 --> 00:55:10.785
and computers
all over the world.

980
00:55:10.785 --> 00:55:14.136
Any time some sort of
cyber criminal, some attacker,

981
00:55:14.136 --> 00:55:18.053
is trying to breach a computer,
they're leaving traces behind.

982
00:55:19.577 --> 00:55:23.537
Every attack
has a signature.

983
00:55:23.537 --> 00:55:25.104
If you look at it long enough,

984
00:55:25.104 --> 00:55:27.454
if you study it,
if you work it long enough,

985
00:55:27.454 --> 00:55:29.717
you can understand
the way they do things.

986
00:55:29.717 --> 00:55:31.284
The way they state something,

987
00:55:31.284 --> 00:55:34.461
the way they code
a particular way,

988
00:55:34.461 --> 00:55:39.901
the methodology of the attack,
the step-by-step approaches.

989
00:55:39.901 --> 00:55:42.904
It might be considered
like Sherlock Holmesian

990
00:55:42.904 --> 00:55:44.384
to come up with this idea.

991
00:55:44.384 --> 00:55:46.778
"Because he walks
with a gait this way,

992
00:55:46.778 --> 00:55:48.954
and he does this..."
But it is true.

993
00:55:48.954 --> 00:55:53.262
We see those signatures.
We see those patterns.

994
00:55:54.220 --> 00:55:56.004
What we discovered was,

995
00:55:56.004 --> 00:55:59.443
by looking at the artefacts
that these attackers had used,

996
00:55:59.443 --> 00:56:01.880
the malicious binaries
they had used,

997
00:56:01.880 --> 00:56:03.185
the code inside of it,

998
00:56:03.185 --> 00:56:05.753
as well as the email accounts
that they used

999
00:56:05.753 --> 00:56:07.929
to send the initial
spear-phishing messages,

1000
00:56:07.929 --> 00:56:12.499
we were able to map this back
to an attacker back in 2014.

1001
00:56:15.415 --> 00:56:18.505
Sony Pictures is mainly housed
in Culver City.

1002
00:56:18.505 --> 00:56:20.507
And in 2014,

1003
00:56:20.507 --> 00:56:24.598
Sony Pictures went down,
which was unheard of.

1004
00:56:24.598 --> 00:56:26.078
On that day in November,

1005
00:56:26.078 --> 00:56:28.559
people would have come in,
tried to swipe their badge

1006
00:56:28.559 --> 00:56:30.778
and not even be able
to get into the office.

1007
00:56:30.778 --> 00:56:32.780
They get
into the building finally

1008
00:56:32.780 --> 00:56:35.957
and then they discover that
nothing else is working either.

1009
00:56:35.957 --> 00:56:40.005
Printers aren't working,
computers aren't working.

1010
00:56:40.005 --> 00:56:43.225
People who had laptops
connected to the network

1011
00:56:43.225 --> 00:56:44.966
would have immediately seen

1012
00:56:44.966 --> 00:56:47.926
skulls and crossbones
show up on their screens,

1013
00:56:47.926 --> 00:56:51.016
scrolling with scary
<i>Halloween</i>-type music

1014
00:56:51.016 --> 00:56:52.496
playing in the background.

1015
00:56:52.496 --> 00:56:55.716
And it said,
"Hacked by the GOP."

1016
00:56:55.716 --> 00:56:58.980
Guardians of the Peace.

1017
00:56:58.980 --> 00:57:02.027
A mysterious crew of hackers,

1018
00:57:02.027 --> 00:57:05.987
also known as the Lazarus Group.

1019
00:57:05.987 --> 00:57:08.120
We'd call them
the Lazarus Group.

1020
00:57:08.120 --> 00:57:09.251
They've been responsible

1021
00:57:09.251 --> 00:57:11.123
for many, many attacks
over the years.

1022
00:57:11.123 --> 00:57:13.342
You know, political statements

1023
00:57:13.342 --> 00:57:15.954
and bringing down some
websites in South Korea

1024
00:57:15.954 --> 00:57:20.306
and also the White House in the
United States and the Pentagon.

1025
00:57:20.306 --> 00:57:23.875
Now, at this point,
the penny has dropped.

1026
00:57:23.875 --> 00:57:26.007
Sony has been hacked.

1027
00:57:26.007 --> 00:57:28.662
The hack attack
has had a devastating effect

1028
00:57:28.662 --> 00:57:31.491
on the entertainment company,
with an avalanche of leaks

1029
00:57:31.491 --> 00:57:34.189
revealing personal information
of employees

1030
00:57:34.189 --> 00:57:37.497
and salacious email exchanges
of A-list celebrities.

1031
00:57:37.497 --> 00:57:40.500
They ultimately compromised
Sony Pictures Network,

1032
00:57:40.500 --> 00:57:43.851
got inside
and wiped 10,000 computers.

1033
00:57:43.851 --> 00:57:45.592
On top of that,
they actually stole

1034
00:57:45.592 --> 00:57:48.682
all kinds of documents
and emails from Sony Pictures.

1035
00:57:48.682 --> 00:57:50.815
The hack
on Sony Pictures

1036
00:57:50.815 --> 00:57:53.382
is rocking Hollywood's
very foundation;

1037
00:57:53.382 --> 00:57:56.037
the industry,
warts and all, exposed.

1038
00:57:56.037 --> 00:57:59.258
Initially, we had no link
between the SWIFT attack

1039
00:57:59.258 --> 00:58:01.956
and the Sony Pictures attack.

1040
00:58:01.956 --> 00:58:04.481
But when we were looking
at the malware,

1041
00:58:04.481 --> 00:58:06.395
we found an interesting detail.

1042
00:58:06.395 --> 00:58:09.573
There was a component
called an indexing manager,

1043
00:58:09.573 --> 00:58:13.011
which was saving the logs
during the SWIFT attack

1044
00:58:13.011 --> 00:58:15.492
into an encrypted file.

1045
00:58:15.492 --> 00:58:18.538
The file was encrypted
with a really long key,

1046
00:58:18.538 --> 00:58:22.063
and when we just
googled for the key,

1047
00:58:22.063 --> 00:58:25.284
we found that the same key, exactly,

1048
00:58:25.284 --> 00:58:30.594
was used 18 months earlier
in the Sony Pictures attack.

1049
00:58:31.769 --> 00:58:34.119
This was
the moment we realised

1050
00:58:34.119 --> 00:58:36.077
the Bangladeshi SWIFT attack

1051
00:58:36.077 --> 00:58:39.733
was probably perpetrated
by the Lazarus Group.

1052
00:58:40.691 --> 00:58:42.301
So, who is Lazarus?

1053
00:58:42.301 --> 00:58:43.781
Well, from what we know,

1054
00:58:43.781 --> 00:58:46.740
they're a trans-global
criminal organisation

1055
00:58:46.740 --> 00:58:51.571
that's been trained
at a nation-state level.

1056
00:58:51.571 --> 00:58:55.444
The nation states really started
coming in on a criminal side...

1057
00:58:57.055 --> 00:58:59.231
when sanctions started.

1058
00:58:59.231 --> 00:59:02.277
When we start limiting
the capability of a nation

1059
00:59:02.277 --> 00:59:05.411
to get cash, and we up
the methodology

1060
00:59:05.411 --> 00:59:07.979
to monitor
the way they're getting cash,

1061
00:59:07.979 --> 00:59:11.025
they turn to different approaches.

1062
00:59:11.025 --> 00:59:13.898
So if you're a country
that's under sanction

1063
00:59:13.898 --> 00:59:17.162
and your ability to get funds
has been compromised,

1064
00:59:17.162 --> 00:59:20.121
you may be motivated to
go to the Lazarus Group

1065
00:59:20.121 --> 00:59:23.429
to fix your problem.

1066
00:59:23.429 --> 00:59:25.649
It's like a job for them.
It <i>is</i> a job for them.

1067
00:59:25.649 --> 00:59:27.694
They get recruited.
It's a nine-to-five job.

1068
00:59:27.694 --> 00:59:30.958
They come in, and each
of them has their specialties.

1069
00:59:30.958 --> 00:59:32.351
They have managers,

1070
00:59:32.351 --> 00:59:35.223
they have targets that
they're told to go after.

1071
00:59:35.223 --> 00:59:37.356
When you talk about
nation states,

1072
00:59:37.356 --> 00:59:39.619
obviously,
for your average nation state,

1073
00:59:39.619 --> 00:59:42.927
most cyber offensive campaigns
are under the military.

1074
00:59:42.927 --> 00:59:45.712
It's very similar to how
a military organisation

1075
00:59:45.712 --> 00:59:49.020
would be organised for their
cyber offensive campaigns.

1076
00:59:49.020 --> 00:59:51.457
There is a hotel,
for example, in China

1077
00:59:51.457 --> 00:59:53.590
where they've taken over
multiple floors

1078
00:59:53.590 --> 00:59:55.635
where they essentially
have dormitories.

1079
00:59:55.635 --> 00:59:59.073
They go to sleep in that hotel,
they eat in that hotel,

1080
00:59:59.073 --> 01:00:01.423
and they don't come
out of that hotel.

1081
01:00:01.423 --> 01:00:04.078
They just move from
one room to another,

1082
01:00:04.078 --> 01:00:05.863
hack all day and night.

1083
01:00:08.039 --> 01:00:10.650
And the Lazarus Group
is thought to be made up

1084
01:00:10.650 --> 01:00:13.392
of these state-trained hackers.

1085
01:00:18.745 --> 01:00:21.226
What's amazing about cyber,

1086
01:00:21.226 --> 01:00:23.794
when you talk about
nation states,

1087
01:00:23.794 --> 01:00:27.319
is the cost to entry
is extremely low.

1088
01:00:27.319 --> 01:00:29.713
We have nation states
who have been

1089
01:00:29.713 --> 01:00:33.194
trying to create
nuclear missiles,

1090
01:00:33.194 --> 01:00:35.066
tried to create
a nuclear programme.

1091
01:00:35.066 --> 01:00:36.981
Places like Iran, for example.

1092
01:00:36.981 --> 01:00:41.507
The dollars it costs to do so,
it's extraordinary.

1093
01:00:41.507 --> 01:00:44.684
But if you want to build
a cyber offensive campaign,

1094
01:00:44.684 --> 01:00:46.991
you get two, three,
four, five guys

1095
01:00:46.991 --> 01:00:50.472
and potentially threaten
to disable the power grid

1096
01:00:50.472 --> 01:00:52.039
in some country.

1097
01:00:52.039 --> 01:00:54.476
When you talk about
trying to rob a bank

1098
01:00:54.476 --> 01:00:57.175
or produce illicit drugs
and sell them,

1099
01:00:57.175 --> 01:00:59.830
the amount of people
required on the ground,

1100
01:00:59.830 --> 01:01:01.266
the amount of connections,

1101
01:01:01.266 --> 01:01:03.442
and for the dollars
that you would receive,

1102
01:01:03.442 --> 01:01:04.922
is nothing compared to,

1103
01:01:04.922 --> 01:01:07.446
"Let's get three guys,
break into a bank

1104
01:01:07.446 --> 01:01:10.667
and potentially
transfer $1 billion."

1105
01:01:16.063 --> 01:01:20.502
Back in the VIP room
of the Solaire Casino in Manila,

1106
01:01:20.502 --> 01:01:24.942
the money-laundering operation
is in full flight.

1107
01:01:26.683 --> 01:01:29.729
They just spend hours
upon hours gambling away,

1108
01:01:29.729 --> 01:01:31.296
collecting chips.

1109
01:01:31.296 --> 01:01:33.733
They transfer those chips
back into cold, hard currency.

1110
01:01:33.733 --> 01:01:36.693
You put a hundred
gamblers into the VIP lounge

1111
01:01:36.693 --> 01:01:40.784
playing cash, so maybe the house
has a one or two percent margin.

1112
01:01:40.784 --> 01:01:43.743
But all the rest is untraceable
money that they walk out with.

1113
01:01:43.743 --> 01:01:46.006
What's interesting
about these individuals,

1114
01:01:46.006 --> 01:01:47.704
they weren't interested
in winning.

1115
01:01:47.704 --> 01:01:50.184
They were just interested
in playing.

1116
01:01:50.184 --> 01:01:51.620
If you lose the money,

1117
01:01:51.620 --> 01:01:53.405
the money doesn't go
to the casino,

1118
01:01:53.405 --> 01:01:54.928
it goes to the other players.

1119
01:01:54.928 --> 01:01:58.410
So you can play the table
where the other players are,

1120
01:01:58.410 --> 01:01:59.846
your partners.

1121
01:01:59.846 --> 01:02:02.196
Then you can lose
the dirty money on purpose,

1122
01:02:02.196 --> 01:02:04.024
moving the money
to your partners.

1123
01:02:04.024 --> 01:02:05.678
Now it's cashed out.

1124
01:02:05.678 --> 01:02:09.073
Now it looks like it came from a
great win in a poker tournament

1125
01:02:09.073 --> 01:02:11.640
instead of being stolen
from somewhere.

1126
01:02:11.640 --> 01:02:14.513
So, casinos are a good way
of laundering money.

1127
01:02:14.513 --> 01:02:17.342
Real-world criminals have
done that for decades.

1128
01:02:17.342 --> 01:02:20.606
Online criminals
are doing it today.

1129
01:02:20.606 --> 01:02:23.740
They played for a whole week,
that whole lunar week,

1130
01:02:23.740 --> 01:02:25.698
every day, like workers,

1131
01:02:25.698 --> 01:02:28.309
nine to five, essentially,
in that casino.

1132
01:02:33.358 --> 01:02:36.361
Finally, the Chinese
New Year celebrations

1133
01:02:36.361 --> 01:02:37.884
have come to an end.

1134
01:02:37.884 --> 01:02:42.280
The staff at the RCBC bank
in Manila are back at work.

1135
01:02:44.369 --> 01:02:47.328
Now, the Bangladesh Bank
is still desperately trying

1136
01:02:47.328 --> 01:02:49.417
to put a stop
on any further withdrawals

1137
01:02:49.417 --> 01:02:52.159
from those accounts
in the Bank of the Philippines.

1138
01:02:52.159 --> 01:02:54.509
They've lost
$22 million already,

1139
01:02:54.509 --> 01:02:58.818
but there's still $59 million
left that they can save.

1140
01:02:58.818 --> 01:03:01.865
They're firing message
after message to Manila,

1141
01:03:01.865 --> 01:03:04.737
"Hold all transactions."

1142
01:03:04.737 --> 01:03:07.087
In the Philippines,
they got those messages.

1143
01:03:07.087 --> 01:03:08.567
They got those messages

1144
01:03:08.567 --> 01:03:10.830
as part of many other
transaction messages they got

1145
01:03:10.830 --> 01:03:12.701
that were sitting in
a printer queue

1146
01:03:12.701 --> 01:03:14.051
at the bottom of the stack,

1147
01:03:14.051 --> 01:03:16.357
and ultimately, they never
saw those messages.

1148
01:03:16.357 --> 01:03:20.797
At this point, the fence
gets in touch with the manager

1149
01:03:20.797 --> 01:03:22.799
of the bank in Jupiter Street.

1150
01:03:22.799 --> 01:03:26.672
"Can you please authorise
the transfer of $59 million?"

1151
01:03:26.672 --> 01:03:29.849
She authorises that $59 million.

1152
01:03:29.849 --> 01:03:34.114
It goes straight
to the Solaire Casino.

1153
01:03:34.114 --> 01:03:36.029
More money laundering.

1154
01:03:37.901 --> 01:03:39.424
Five hours later,

1155
01:03:39.424 --> 01:03:44.037
after increasingly urgent calls
from the Bangladesh Bank,

1156
01:03:44.037 --> 01:03:50.000
the manager finally puts a block
on all of the accounts.

1157
01:03:50.000 --> 01:03:52.829
But, really, it's too late.

1158
01:03:52.829 --> 01:03:54.831
The money's gone.

1159
01:03:59.139 --> 01:04:02.273
It's incredible when you think
what the Lazarus Group

1160
01:04:02.273 --> 01:04:05.885
was able to pull off with
just some ones and zeros.

1161
01:04:05.885 --> 01:04:07.756
They guide their bespoke malware

1162
01:04:07.756 --> 01:04:10.020
into the computer network
of a bank,

1163
01:04:10.020 --> 01:04:11.717
and then a year later,

1164
01:04:11.717 --> 01:04:15.025
they're literally washing
$100 million

1165
01:04:15.025 --> 01:04:17.331
through a casino
in the Philippines.

1166
01:04:17.331 --> 01:04:19.856
It's astonishing.

1167
01:04:19.856 --> 01:04:22.336
But what's really, really scary

1168
01:04:22.336 --> 01:04:25.687
is what happened
just a year later.

1169
01:04:27.428 --> 01:04:29.561
Now back to
the major cyber-attack,

1170
01:04:29.561 --> 01:04:34.087
the ransomware crippling 200,000
computers in 150 countries.

1171
01:04:34.087 --> 01:04:37.699
The thousands of targets all
received this ominous message

1172
01:04:37.699 --> 01:04:39.745
in English on their screens:

1173
01:04:49.276 --> 01:04:54.151
Everyone was basically locked up
with this malware

1174
01:04:54.151 --> 01:04:58.329
that we discovered had been
launched by the same attackers

1175
01:04:58.329 --> 01:05:01.158
as the Central Bank
of Bangladesh.

1176
01:05:01.158 --> 01:05:03.377
So they design this malware,

1177
01:05:03.377 --> 01:05:05.989
and then they lose
control of it entirely.

1178
01:05:05.989 --> 01:05:08.121
And that caused chaos.

1179
01:05:08.121 --> 01:05:11.385
Ambulances were
diverted to other hospitals.

1180
01:05:11.385 --> 01:05:14.823
Patients were turned away,
their operations cancelled.

1181
01:05:14.823 --> 01:05:17.696
You know,
the first sign that something

1182
01:05:17.696 --> 01:05:21.961
was seriously wrong was when
hospitals in the United Kingdom

1183
01:05:21.961 --> 01:05:24.529
started telling patients,
"Don't come."

1184
01:05:24.529 --> 01:05:28.533
That their systems had been
locked up with ransomware.

1185
01:05:28.533 --> 01:05:33.625
It's unclear if it was
accidentally released too early,

1186
01:05:33.625 --> 01:05:35.018
it appears so,

1187
01:05:35.018 --> 01:05:37.890
or if it was
designed not to work

1188
01:05:37.890 --> 01:05:41.241
and just begin wiping computers,
because it didn't matter.

1189
01:05:41.241 --> 01:05:44.157
Even if you paid them, you would
not get the decryption key.

1190
01:05:44.157 --> 01:05:45.985
They didn't have
the decryption key.

1191
01:05:45.985 --> 01:05:48.118
They couldn't decrypt your files anymore.

1192
01:05:48.118 --> 01:05:50.816
Japan, Turkey
and the Philippines

1193
01:05:50.816 --> 01:05:54.733
were also affected.
In the US, FedEx was hit.

1194
01:05:54.733 --> 01:05:59.694
That virulent virus
spiralled out of control.

1195
01:05:59.694 --> 01:06:04.047
In Germany, it attacked the
network of the Deutsche Bahn,

1196
01:06:04.047 --> 01:06:05.439
German Railway.

1197
01:06:05.439 --> 01:06:09.400
In Spain,
WannaCry hit Telefonica,

1198
01:06:09.400 --> 01:06:12.359
the biggest telecommunications company.

1199
01:06:12.359 --> 01:06:16.537
It hit the banking systems,
and ATMs didn't work.

1200
01:06:16.537 --> 01:06:21.847
This thing was hitting companies
in something like 150 countries.

1201
01:06:21.847 --> 01:06:23.588
Other targets in the US

1202
01:06:23.588 --> 01:06:26.025
include Merck Pharmaceutical
in New Jersey.

1203
01:06:26.025 --> 01:06:28.810
Even the company that makes
Oreo cookies may have been hit.

1204
01:06:28.810 --> 01:06:32.945
So, you had the health
service, you had transport,

1205
01:06:32.945 --> 01:06:36.470
you had communications,
you had the finance system,

1206
01:06:36.470 --> 01:06:37.906
and you had governance

1207
01:06:37.906 --> 01:06:42.824
all with one tiny piece
of crappy malware, WannaCry.

1208
01:06:42.824 --> 01:06:44.130
In other attacks,

1209
01:06:44.130 --> 01:06:46.002
they have to send you
a spear-phishing email,

1210
01:06:46.002 --> 01:06:48.047
trick you into double-clicking
on an attachment.

1211
01:06:48.047 --> 01:06:50.180
In this case, your computer
just had to be on,

1212
01:06:50.180 --> 01:06:51.485
connected to the internet,

1213
01:06:51.485 --> 01:06:54.053
and it would have got infected
by WannaCry.

1214
01:06:54.053 --> 01:06:57.274
It succeeded because
the crappy malware

1215
01:06:57.274 --> 01:07:00.407
was being infiltrated
into the systems

1216
01:07:00.407 --> 01:07:03.193
on the back
of a much more powerful tool

1217
01:07:03.193 --> 01:07:04.803
called EternalBlue,

1218
01:07:04.803 --> 01:07:08.459
which had been developed by
the National Security Agency

1219
01:07:08.459 --> 01:07:10.417
in the United States.

1220
01:07:10.417 --> 01:07:12.637
The thing the NSA
never wanted to talk about

1221
01:07:12.637 --> 01:07:15.640
was the fact that it was
travelling on a digital missile

1222
01:07:15.640 --> 01:07:19.426
that had been built
at its own intelligence agency.

1223
01:07:19.426 --> 01:07:22.560
They repurposed something
created by the US government,

1224
01:07:22.560 --> 01:07:24.170
leaked
by the Russian government,

1225
01:07:24.170 --> 01:07:26.825
put it into their ransomware
that allowed it to spread

1226
01:07:26.825 --> 01:07:30.742
all over the world,
any computer on at that time.

1227
01:07:30.742 --> 01:07:34.006
So one crappy piece
of malware

1228
01:07:34.006 --> 01:07:36.878
can hit every single aspect

1229
01:07:36.878 --> 01:07:39.142
of the critical national infrastructure

1230
01:07:39.142 --> 01:07:42.971
within the space
of about ten days

1231
01:07:42.971 --> 01:07:44.886
in different countries.

1232
01:07:57.508 --> 01:08:00.728
Eventually, there's a court case
after about a month.

1233
01:08:00.728 --> 01:08:03.601
There's a court case in Manila.

1234
01:08:03.601 --> 01:08:06.908
Ultimately, the bank manager
didn't want anyone to find out.

1235
01:08:06.908 --> 01:08:08.388
But when he finally got in touch

1236
01:08:08.388 --> 01:08:10.825
with the Bank
of the Philippines, they said,

1237
01:08:10.825 --> 01:08:12.827
"If you need this money returned,

1238
01:08:12.827 --> 01:08:15.700
you need to get a court order."
So he files a court order,

1239
01:08:15.700 --> 01:08:18.006
but court orders are public
in the Philippines,

1240
01:08:18.006 --> 01:08:19.573
like in many other countries.

1241
01:08:19.573 --> 01:08:22.576
A reporter spots it and realised
that this has happened,

1242
01:08:22.576 --> 01:08:25.101
publishes it in a newspaper,
and it all comes out.

1243
01:08:25.101 --> 01:08:28.016
The $81 million
money-laundering scandal

1244
01:08:28.016 --> 01:08:31.672
is now considered one of
the biggest bank heists in Asia.

1245
01:08:31.672 --> 01:08:33.805
But how exactly
did thieves steal

1246
01:08:33.805 --> 01:08:35.981
such a huge amount of money?

1247
01:08:35.981 --> 01:08:37.461
Not just known
in the Philippines

1248
01:08:37.461 --> 01:08:38.679
and the Bank of Bangladesh,

1249
01:08:38.679 --> 01:08:40.377
when the Bangladesh
government finds out

1250
01:08:40.377 --> 01:08:42.901
the bank manager has been
doing this behind the scenes,

1251
01:08:42.901 --> 01:08:44.337
but the whole world finds out.

1252
01:08:44.337 --> 01:08:46.774
And ultimately,
the Bangladesh Bank

1253
01:08:46.774 --> 01:08:48.863
needs to get assistance
from the FBI.

1254
01:08:48.863 --> 01:08:52.171
The New York Fed is involved.
The United States is involved.

1255
01:08:52.171 --> 01:08:54.304
This becomes
a whole worldwide issue

1256
01:08:54.304 --> 01:08:57.220
and begins to ripple across
the financial industry

1257
01:08:57.220 --> 01:08:58.743
that this was even possible.

1258
01:08:58.743 --> 01:09:00.527
Experts believe that hackers

1259
01:09:00.527 --> 01:09:04.183
were able to break into the
New York Federal Reserve's

1260
01:09:04.183 --> 01:09:06.403
special account for Bangladesh,

1261
01:09:06.403 --> 01:09:09.754
getting away with $81 million.

1262
01:09:09.754 --> 01:09:13.236
Now, Bangladesh's Central Bank
governor, Atiur Rahman,

1263
01:09:13.236 --> 01:09:16.935
has resigned after hackers stole
tens of millions of dollars

1264
01:09:16.935 --> 01:09:19.198
from the nation's
foreign reserves.

1265
01:09:19.198 --> 01:09:23.159
The bank was criticised for
its handling of the breach...

1266
01:09:23.159 --> 01:09:26.162
The governor was
an excellent central banker.

1267
01:09:26.162 --> 01:09:27.902
I have a lot of respect for him.

1268
01:09:27.902 --> 01:09:32.298
He was deemed one of the top
bankers by the Asia <i>MoneyWeek.</i>

1269
01:09:32.298 --> 01:09:34.126
And poor fellow, that time,

1270
01:09:34.126 --> 01:09:36.737
he was faced with
this sort of scenario

1271
01:09:36.737 --> 01:09:39.827
which he honestly
didn't understand.

1272
01:09:39.827 --> 01:09:42.787
He had really pushed
the financial system

1273
01:09:42.787 --> 01:09:45.529
in Bangladesh into
the 21st century.

1274
01:09:45.529 --> 01:09:48.575
He had to essentially fall
on his sword and resign

1275
01:09:48.575 --> 01:09:51.404
in disgrace,
and his career was ruined.

1276
01:09:51.404 --> 01:09:54.190
Many others at the bank
had to resign as well.

1277
01:09:54.190 --> 01:09:57.758
An emotional Maia Deguito,
the manager of the RCBC branch

1278
01:09:57.758 --> 01:10:01.153
in Jupiter Street in Makati,
insists she is innocent

1279
01:10:01.153 --> 01:10:02.763
in the face of accusations

1280
01:10:02.763 --> 01:10:05.636
she is involved in the
money-laundering scheme.

1281
01:10:05.636 --> 01:10:08.247
So far, only the branch manager

1282
01:10:08.247 --> 01:10:11.468
has been charged by the
Anti-Money Laundering Council.

1283
01:10:11.468 --> 01:10:14.384
One of the great
injustices of this whole scandal

1284
01:10:14.384 --> 01:10:17.343
is that the only person who
got convicted of anything

1285
01:10:17.343 --> 01:10:18.953
was Maia Deguito,

1286
01:10:18.953 --> 01:10:22.696
and she was just the mid-level
branch manager of the RCBC,

1287
01:10:22.696 --> 01:10:26.874
the bank in the Philippines
that received the actual funds.

1288
01:10:26.874 --> 01:10:28.180
Typical, isn't it?

1289
01:10:28.180 --> 01:10:30.965
A crime that was conceived
and carried out

1290
01:10:30.965 --> 01:10:32.402
by a whole bunch of men,

1291
01:10:32.402 --> 01:10:35.535
and the only person who
gets done for it is a woman

1292
01:10:35.535 --> 01:10:38.538
who probably wasn't that
guilty in the first place.

1293
01:10:38.538 --> 01:10:41.802
But she received a sentence
of 56 years in jail

1294
01:10:41.802 --> 01:10:44.979
and a fine of $109 million,

1295
01:10:44.979 --> 01:10:49.506
which is significantly more
than the thieves actually stole.

1296
01:10:50.985 --> 01:10:52.291
To my mind,

1297
01:10:52.291 --> 01:10:54.424
there's no question
that she was a scapegoat.

1298
01:10:54.424 --> 01:10:58.297
I mean, the currency traders
who turned that $81 million

1299
01:10:58.297 --> 01:11:01.300
into pesos got off scot-free.

1300
01:11:01.300 --> 01:11:03.737
There are a couple of
Chinese operators

1301
01:11:03.737 --> 01:11:06.566
who brought these gamblers
in from China.

1302
01:11:06.566 --> 01:11:10.396
We know that they received tens
of millions of dollars in cash.

1303
01:11:10.396 --> 01:11:15.314
They vanished back to Macau.
No trace of them was ever found.

1304
01:11:15.314 --> 01:11:17.751
We can't say for sure,
but certainly it looks like

1305
01:11:17.751 --> 01:11:20.798
people at the Rizal Bank headquarters

1306
01:11:20.798 --> 01:11:23.888
buried these requests
to stop these transactions.

1307
01:11:23.888 --> 01:11:27.239
But nobody else at the Rizal
Bank was ever accused.

1308
01:11:27.239 --> 01:11:31.199
Oddly enough, in this giant
scheme that involved

1309
01:11:31.199 --> 01:11:34.986
a half a dozen countries,
nearly $1 billion,

1310
01:11:34.986 --> 01:11:40.208
only one bank employee
in a small branch in Manila

1311
01:11:40.208 --> 01:11:42.646
was ever convicted of
doing anything wrong.

1312
01:11:42.646 --> 01:11:46.040
It's incredible. Total impunity.

1313
01:11:52.395 --> 01:11:54.788
I think the most
important lesson

1314
01:11:54.788 --> 01:11:57.878
of the Bangladesh Bank

1315
01:11:57.878 --> 01:11:59.880
is a lesson of scale.

1316
01:11:59.880 --> 01:12:01.882
The internet is
a fantastic thing.

1317
01:12:01.882 --> 01:12:04.320
It's made our world
much, much smaller.

1318
01:12:04.320 --> 01:12:07.061
You can do all sorts of things.
It's fantastic.

1319
01:12:07.061 --> 01:12:08.933
But that interconnectivity,

1320
01:12:08.933 --> 01:12:11.805
where everything
is linked to everything else,

1321
01:12:11.805 --> 01:12:15.418
means that if you get bad actors
in that system,

1322
01:12:15.418 --> 01:12:17.245
then the damage

1323
01:12:17.245 --> 01:12:22.076
is infinitely more immense
than it was before.

1324
01:12:23.687 --> 01:12:25.993
When I started this job
two decades ago,

1325
01:12:25.993 --> 01:12:29.083
you had to explain to people,
what is a virus?

1326
01:12:29.083 --> 01:12:31.042
What is a cyber-attack?

1327
01:12:31.042 --> 01:12:33.392
Today, we don't talk about

1328
01:12:33.392 --> 01:12:36.439
making sure this file doesn't
get deleted any more.

1329
01:12:36.439 --> 01:12:40.573
We literally talk about making
sure the supply chain is up,

1330
01:12:40.573 --> 01:12:42.619
food can reach people's tables.

1331
01:12:42.619 --> 01:12:45.665
Our job is not just to protect
people's computers.

1332
01:12:45.665 --> 01:12:49.060
Our job is to ensure
society is up and running.

1333
01:12:49.060 --> 01:12:52.063
Everything
that we use now,

1334
01:12:52.063 --> 01:12:53.978
water, electricity,

1335
01:12:53.978 --> 01:12:56.937
the financial system,
the comms system,

1336
01:12:56.937 --> 01:12:58.548
depends on the integrity

1337
01:12:58.548 --> 01:13:03.683
of unbelievably complex
networked computer systems.

1338
01:13:03.683 --> 01:13:07.992
And our dependence
is becoming such

1339
01:13:07.992 --> 01:13:10.386
that, should anything go wrong,

1340
01:13:10.386 --> 01:13:13.171
be it a technical hitch
or be it a hack,

1341
01:13:13.171 --> 01:13:17.131
it can actually lead
to our lives grinding to a halt

1342
01:13:17.131 --> 01:13:19.525
in a very short space of time.

1343
01:13:20.483 --> 01:13:22.136
We're sort of in a state

1344
01:13:22.136 --> 01:13:24.617
where we're increasing
our vulnerability

1345
01:13:24.617 --> 01:13:27.359
and our attack surface
every single day.

1346
01:13:27.359 --> 01:13:29.796
And instead of pausing

1347
01:13:29.796 --> 01:13:32.799
and thinking about
how to lock up our power grid,

1348
01:13:32.799 --> 01:13:37.848
really, where our energy has
been focused is on escalation.

1349
01:13:37.848 --> 01:13:41.373
Countries like the United
States, China and Russia

1350
01:13:41.373 --> 01:13:44.550
have already arrogated
the right to themselves

1351
01:13:44.550 --> 01:13:47.335
to attack with full force,

1352
01:13:47.335 --> 01:13:50.034
whether cyber
or conventional weapons,

1353
01:13:50.034 --> 01:13:51.905
against anyone who brings down

1354
01:13:51.905 --> 01:13:56.519
a serious piece of critical
national infrastructure.

1355
01:13:56.519 --> 01:14:01.480
We've had Stuxnet blowing
up the Natanz centrifuge plant.

1356
01:14:01.480 --> 01:14:04.962
We've had ransomware attacks,
which hit the Eastern Seaboard.

1357
01:14:04.962 --> 01:14:07.007
There was no gas
to the Eastern Seaboard

1358
01:14:07.007 --> 01:14:09.619
for a whole week
in the United States.

1359
01:14:09.619 --> 01:14:11.751
We had Russia
against the Ukraine,

1360
01:14:11.751 --> 01:14:14.537
shutting out the power
in the middle of winter.

1361
01:14:14.537 --> 01:14:17.453
We're talking about
people losing their lives.

1362
01:14:17.453 --> 01:14:19.019
We've also had cyber-attacks

1363
01:14:19.019 --> 01:14:21.413
that potentially affected
US elections.

1364
01:14:21.413 --> 01:14:23.763
We had the healthcare in the UK
brought down,

1365
01:14:23.763 --> 01:14:25.939
dialysis machines
no longer working.

1366
01:14:25.939 --> 01:14:29.421
This is an extremely
fragile situation,

1367
01:14:29.421 --> 01:14:33.599
much more fragile
than the period of détente,

1368
01:14:33.599 --> 01:14:37.255
because so many more
countries have these weapons.

1369
01:14:37.255 --> 01:14:41.389
Malware is much more difficult
to control than nuclear weapons.

1370
01:14:41.389 --> 01:14:44.871
People always warn me
of the cyber Pearl Harbor

1371
01:14:44.871 --> 01:14:47.091
or the cyber 9/11,

1372
01:14:47.091 --> 01:14:49.746
but it's almost worse than that.

1373
01:14:49.746 --> 01:14:53.619
Every day, there are thousands
of cyber-attacks,

1374
01:14:53.619 --> 01:14:58.232
and we're just getting more and
more and more inured to them.

1375
01:14:59.016 --> 01:15:00.887
It's like a plague.

1376
01:15:00.887 --> 01:15:05.152
I think we'll see much
more hostile cyber activity,

1377
01:15:05.152 --> 01:15:07.851
much more cyber bank robberies,

1378
01:15:07.851 --> 01:15:09.983
much more cyber espionage.

1379
01:15:09.983 --> 01:15:13.030
We'll see much more cyber war.

1380
01:15:13.030 --> 01:15:15.815
In many ways,
I think we've seen nothing yet.

1381
01:15:15.815 --> 01:15:19.253
As attacks increase
in their sophistication

1382
01:15:19.253 --> 01:15:21.386
and their range,

1383
01:15:21.386 --> 01:15:25.346
then the impact
can be ever greater.

1384
01:15:25.346 --> 01:15:29.873
There is a cyber-attack on
critical national infrastructure

1385
01:15:29.873 --> 01:15:31.744
coming to a place near you

1386
01:15:31.744 --> 01:15:35.269
within the next
five to ten years.

1387
01:15:35.269 --> 01:15:38.708
If it's done well,
and if it's really malicious,

1388
01:15:38.708 --> 01:15:41.232
that could be catastrophic.

1389
01:15:43.016 --> 01:15:47.586
What's amazing about the
Bank of Bangladesh heist is...

1390
01:15:47.586 --> 01:15:51.285
they almost walked away
with $1 billion.

1391
01:15:54.071 --> 01:15:56.203
The mistakes that they made

1392
01:15:56.203 --> 01:15:59.990
that led to them only walking
with $81 million

1393
01:15:59.990 --> 01:16:02.862
were literally a typo in a name

1394
01:16:02.862 --> 01:16:05.082
and potentially
not being patient enough,

1395
01:16:05.082 --> 01:16:06.562
waiting just one more hour.

1396
01:16:06.562 --> 01:16:09.913
We could be telling
a completely different story.

1397
01:16:09.913 --> 01:16:11.828
Presumably, these guys

1398
01:16:11.828 --> 01:16:15.309
kept perhaps 95 percent
of that cash.

1399
01:16:15.309 --> 01:16:16.528
You could walk out

1400
01:16:16.528 --> 01:16:18.399
with 95 percent
of what you came in with,

1401
01:16:18.399 --> 01:16:21.838
have nobody trace that money,
no record of it whatsoever,

1402
01:16:21.838 --> 01:16:26.233
and get on a plane with it,
and you're home free.

1403
01:16:26.233 --> 01:16:30.760
Even if you had invested
a year's work,

1404
01:16:30.760 --> 01:16:35.460
that you had recruited
a really decent set of hackers,

1405
01:16:35.460 --> 01:16:39.899
that you had corrupted
bank officials,

1406
01:16:39.899 --> 01:16:43.947
you'll be looking at a profit
of about $75 million.

1407
01:16:43.947 --> 01:16:47.037
For a year's work,
not a bad pay-off.

1408
01:16:49.126 --> 01:16:52.999
The Bank of Bangladesh heist
showed them what was possible.

1409
01:16:54.392 --> 01:16:56.742
They proved that
they could do it.

1410
01:17:01.617 --> 01:17:03.662
After that attack,
it didn't stop.

1411
01:17:03.662 --> 01:17:07.840
We saw continued attacks
on various banks across Asia,

1412
01:17:07.840 --> 01:17:10.451
I think in
the Philippines again.

1413
01:17:10.451 --> 01:17:14.673
And also, they started hacking
the cryptocurrency exchanges,

1414
01:17:14.673 --> 01:17:18.546
where people store their Bitcoin
and Monero digital currency,

1415
01:17:18.546 --> 01:17:21.724
which has proved to be
incredibly lucrative for them.

1416
01:17:23.726 --> 01:17:25.684
In 2017,
Lazarus was thought

1417
01:17:25.684 --> 01:17:27.338
to have successfully attacked

1418
01:17:27.338 --> 01:17:31.995
at least five Asian
cryptocurrency exchanges.

1419
01:17:31.995 --> 01:17:37.827
That's a total of
$571 million that was lost.

1420
01:17:37.827 --> 01:17:41.134
Cryptocurrency exchanges
just have the bare minimum

1421
01:17:41.134 --> 01:17:43.659
of security, we're learning now.

1422
01:17:43.659 --> 01:17:46.923
In 2020, as the global
pandemic spiralled,

1423
01:17:46.923 --> 01:17:50.143
AstraZeneca, makers of
one of the key vaccines,

1424
01:17:50.143 --> 01:17:53.538
was hit by an attack,
extorting the company

1425
01:17:53.538 --> 01:17:56.846
and stealing sensitive
information for profit.

1426
01:17:58.064 --> 01:18:00.632
The sums involved
are astronomical,

1427
01:18:00.632 --> 01:18:03.940
and Lazarus is still
very much at large.

1428
01:18:06.246 --> 01:18:11.774
They have been designated
by the United States an APT;

1429
01:18:11.774 --> 01:18:13.863
that's an
advanced persistent threat.

1430
01:18:13.863 --> 01:18:16.692
Now, the fundamental criteria

1431
01:18:16.692 --> 01:18:20.478
is that they represent a threat

1432
01:18:20.478 --> 01:18:24.612
to US national security
and national infrastructure.

1433
01:18:24.612 --> 01:18:28.486
So, just by dint of it
being called an APT

1434
01:18:28.486 --> 01:18:33.404
means that the Lazarus Group
is serious stuff.

1435
01:18:33.404 --> 01:18:35.623
Marvel fans,
think HYDRA.

1436
01:18:35.623 --> 01:18:38.801
James Bond films,
think of SPECTRE.

1437
01:18:38.801 --> 01:18:40.237
It's something like that.

1438
01:18:43.762 --> 01:18:47.635
Now, it's tempting to
think this comparison is absurd,

1439
01:18:47.635 --> 01:18:51.074
but this is the scale
that Lazarus operates on.

1440
01:18:51.074 --> 01:18:54.294
Arguably, they're the most
potent cyber criminals

1441
01:18:54.294 --> 01:18:56.427
in business today.

1442
01:18:56.427 --> 01:19:00.300
So the nation state's
involvement in cybercrime

1443
01:19:00.300 --> 01:19:02.955
means that cybercrime
has actually morphed

1444
01:19:02.955 --> 01:19:05.653
into cyber warfare.

1445
01:19:05.653 --> 01:19:08.613
You can have zero trust
in these systems.

1446
01:19:08.613 --> 01:19:12.095
You need to assume that
everything has been broken,

1447
01:19:12.095 --> 01:19:14.010
everything is being listened to,

1448
01:19:14.010 --> 01:19:17.274
that everything can be captured,
and operate accordingly.

1449
01:19:19.580 --> 01:19:22.453
If a small group
can plan something

1450
01:19:22.453 --> 01:19:25.499
and get away with $81 million,

1451
01:19:25.499 --> 01:19:27.937
which involved
the Fed in New York,

1452
01:19:27.937 --> 01:19:29.765
SWIFT in Brussels,

1453
01:19:29.765 --> 01:19:32.550
the Bangladeshi Bank in Dhaka,

1454
01:19:32.550 --> 01:19:36.032
and then all the peripherals
in Manila,

1455
01:19:36.032 --> 01:19:40.427
just think about what one of the
really professional operations

1456
01:19:40.427 --> 01:19:42.560
in China, Russia,

1457
01:19:42.560 --> 01:19:44.518
the NSA, GCHQ,

1458
01:19:44.518 --> 01:19:48.871
just think what havoc
they could wreak.

1459
01:19:48.871 --> 01:19:52.613
And every year, the hacks get
bigger, the damage greater,

1460
01:19:52.613 --> 01:19:54.702
the implications graver.

1461
01:19:56.139 --> 01:20:00.447
Armies literally have hackers
hammering at the gates.

1462
01:20:00.447 --> 01:20:02.710
And it just takes
a simple breach,

1463
01:20:02.710 --> 01:20:05.583
one person, one weak link,

1464
01:20:05.583 --> 01:20:08.238
and those armies
will storm the defences

1465
01:20:08.238 --> 01:20:12.851
and bring down a network
that our way of life depends on.

1466
01:20:12.851 --> 01:20:15.593
It happened in Bangladesh
in 2016.

1467
01:20:15.593 --> 01:20:21.033
And believe you me, it's going
to happen again very soon.

1468
01:21:14.957 --> 01:21:17.916
Iyuno





