BB Heist - Incident Analysis
BB Heist - Incident Analysis
BB Heist - Incident Analysis
Incident Analysis
Ramkumar Balu
[email protected]
1 INTRODUCTION
In one of the largest cyber heists that took place in February 2016, the Central
Bank of Bangladesh (Bangladesh Bank) lost $81 million from its account held in
Federal Reserve Bank of New York (Mazumder & Sobhan, 2021). The hackers
originally attempted to steal a whopping $951 million in a well-planned sophis-
ticated attack. They compromised the bank’s network and navigated the SWIFT1
gateway to send 35 fraudulent fund transfer requests on behalf of the bank.
This paper applies Diamond model of Intrusion Analysis on the discussed cyber
incident. In the later part, the paper discusses policy assessment at various levels
as well as the policy impact that happened in response to the incident.
Diamond model is a simple yet powerful analytic tool that serves as a formal
method for intrusion analysis (Caltagirone et al., 2013). As shown in Figure 1, the
four vertices of the diamond (core features) correspond to adversary, capability,
infrastructure, and victim, while the edges represent the relationship between
them.
2.1.1 Adversary
BAE systems was the first to find similarities between Bangladesh Bank (BB)
heist and Sony Pictures Entertainment (SPE) hack that happened in 2014 (BAE
Systems, 2016a). Kaspersky, after a yearlong investigation, published a report
linking “Lazarus Group2” to the BB heist (Kaspersky, 2017).
1
criminal complaint against one of the members of the group, Park Jin Hyok (U.S.
v. Park, 2018).
Adversary Customer—The FBI and NSA alleged that the attack was carried out
on behalf of the North Korean government based on its similarities with SPE
hack (Elias Groll, 2017; U.S. v. Park, 2018). However, the North Korean govern-
ment denied all the allegations.
2.1.2 Capability
The attack used highly sophisticated tools and techniques which suggested that
the adversary is an APT group. The various capabilities used against the Bangla-
desh Bank are as follows,
• Spear Phishing – For initial access to the bank’s network, the hackers
used job application themed3 spear phishing emails with malicious at-
tachments (U.S. v. Park, 2018).
3 Same tools and techniques used in Sony Pictures Entertainment hack (2014).
2
• Command and Control – The adversary used C&C servers and had direct
control of the infected systems using a backdoor.
• SWIFT-DRIDEX – The attackers developed a custom malware based on
DRIDEX to interact with victim’s SWIFT Alliance Access software (BAE
Systems, 2016b; Basoya & Arora, 2020). The malware helped them send
fraudulent payment requests and cover traces by tampering SWIFT re-
sponses.
• Fake TLS Protocol3 – Custom network protocol developed to mimic TLS
traffic to bypass network security measures (DiMaggio, 2022).
• Secure File Wiper – A unique file wipe-out module was used to erase
traces (BAE Systems, 2016a).
• Other malwares – The forensic analysis found traces of malwares
codenamed NestEgg, Macktruck3 and Sierra Charlie4 that were used for
lateral movement, persistence, and backdoor access (U.S. v. Park, 2018).
• Money laundering – The attackers made the stolen money disappear by
running it through a Philippine bank and a few casinos.
2.1.3 Infrastructure
The BAE Systems investigation revealed an Egypt IPv4 address (shown in Table
1) that was used as C&C in one of the malwares (BAE Systems, 2016b). The IP
address location suggests that it could be a compromised host or controlled by
an intermediary (type 2 infrastructure).
The FBI found email addresses used by the adversary to send spear-phishing
emails (infection vector) and perform reconnaissance on BB employees (U.S. v.
Park, 2018).
4 Shares common framework with Brambul worm used in SPE hack (2014).
5 Dynamic DNS
3
Table 1 — Attacker Infrastructure
bepons[.]us[.]to
agena316[at]gmail.com
watsonhenny[at]gmail.com
rasel.aflam[at]gmail.com
rsaflam8808[at]gmail.com
2.1.4 Victim
Victim Asset – Victim assets in this case include workstations belonging to the
Bangladesh Bank, SWIFT Alliance Access software, and Bangladesh Bank’s
funds (end-target) held in NY Federal Reserve Bank.
2.2 Meta-Features
2.2.1 Timestamp
Although the final phase of the attack happened between February 4–5, 2016, the
investigations revealed that the attackers entered the bank’s network a year be-
fore (U.S. v. Park, 2018).
2.2.2 Phase
The attack included most of the phases of cyber kill chain with some phases ex-
ecuted multiple times. For example, after initial foothold, the attackers further
learned about the internal banking infrastructure and delivered customized
6 Free DNS - https://freedns.afraid.org/
4
malware that interacted with the SWIFT gateway. The phases are illustrated in a
simplified activity thread shown in Table 2.
Lazarus Group
Reconnaissance 1 8
H
A
Weaponization 9
I
Delivery 2 5
G
10
B
Exploitation 3 E J
D
Installation C 6 11
F K
C2 4 7 12
L
Action on Objectives 13
Bangladesh Bank
5
Persistent Relationship – In Bangladesh Bank incident, the adversary was more
towards the Enduring side in the Degree of Persistence spectrum. The hackers
were inside the Bank’s network for almost a year and used capabilities to not get
detected.
Shared Threat Space – Financial institutions with access to fortunes fall under
the same threat space. In fact, after BB, the same adversary was found to have
attacked a bank in Philippines (Symantec, 2016).
The malwares used in Bangladesh Bank attack seems to be part of a wider attack
toolkit. The MACKTRUCK malware which was used to have backdoor access to
the bank’s workstations, communicated with C&C servers using a protocol dis-
guised as TLS traffic (Kasza & Yates, 2017). The malware used popular domain
names to create fake TLS handshake sessions with the C&C server. This made
the network traffic look legitimate. The underlying data exchange with the C&C
used HTTP REST standard.
The DRIDEX based malware which was used to control the SWIFT Alliance Ac-
cess software had an encrypted config file (BAE Systems, 2016b). The malware
behavior was highly configurable such that it can be easily reused for similar
attacks in future. The malware monitored SWIFT events and periodically com-
municated them to the C&C using HTTP REST messages (BAE Systems, 2016b).
3 POLICY ASSESSMENT
In response to the 2016 Bangladesh Bank heist, policy changes occurred at organ-
izational and industry level. However, there were little to no public policy
changes at the national and transnational level where it could be more effective.
6
almost $1 billion were successful, it would have been disastrous to the Bangla-
desh economy, whose GDP in 2016 was approximately $221 billion7. The Gov-
ernment of Bangladesh had launched “National Cybersecurity Strategy8” in 2014
(Md. R. Uddin, 2017). However, no immediate public policy change could be
seen in response to the 2016 bank heist.
Moving millions of dollars across borders is not trouble-free. Yet, major part of
the stolen money is still not recovered. The attackers used old school money
laundering techniques to vanish the stolen funds (Katz & Fan, 2017). The stolen
funds were initially transferred into 4 accounts in RCBC 9 Bank and were routed
through several casinos in Philippines. In 2016, casinos didn’t come under
AMLC10 scrutiny in Philippines (Hofilena & Sy, 2017). It is evident that Philip-
pines needs to tighten its Anti-Money Laundering (AML) laws and ease bank
secrecy law to be on par with international standards.
In response to the incident, the AML act was amended to include casinos (Repub-
lic Act No. 10927, 2017). Hofilena & Sy (2017) propose further amendments in-
cluding granting AMLC the authority to issue ex parte freeze order directly rather
than going through several court procedures.
7
Attribution Consortium independent of nation-states (Davis et al., 2017). The
need for such a neutral expert group is evident so that the attributions are taken
seriously by the international community.
Regarding law enforcement efforts, Bangladesh has no existing MLA treaty with
Philippines. Philippines claims that their AMLC coordinated regularly with fi-
nancial intelligence of Bangladesh. However, Katz & Fan (2017) claims that the
gamblers were allowed to continue their casino play even after Bangladesh offi-
cials called Philippines for help. Though eventually the remaining funds were
frozen, it was too late. This shows the importance of MLA treaties with emphasis
on immediate action for ongoing crimes.
Although the attackers didn’t exploit any vulnerabilities in the SWIFT payment
network, the incident demanded response from the Belgian cooperative society.
SWIFT can mandate standards at the industry level through private contracts
like ICANN11. In 2017, the SWIFT provider launched Customer Security Program
(CSP) in response to the Bangladesh Bank incident (SWIFT, 2017). As part of CSP,
the SWIFT published Customer Security Controls Framework (CSCF) that in-
cludes mandatory and advisory security controls for its customers. Participants
are needed to attest their level of compliance annually.
Also, after three years, in 2019, SWIFT Payment Controls feature was launched
that performs real time validation of payment messages according to the policy
set by the customer (SWIFT, 2019). SWIFT claims that it can identify uncharac-
teristic payments that could be a threat.
8
4 CONCLUSION
The Diamond Model analysis demonstrated the features of the event as well as
the relationship between them. The policy assessment provided useful insights
into the policy gaps at various levels.
5 REFERENCES
9
11. Kaspersky. (2017). LAZARUS UNDER THE HOOD. https://me-
dia.kasperskycontenthub.com/wp-content/up-
loads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf
12. Kasza, A., & Yates, M. (2017). The Blockbuster Sequel. Palo Alto Networks,
Unit 42. https://unit42.paloaltonetworks.com/unit42-the-blockbuster-se-
quel/
13. Katz, A., & Fan, W. (2017). A Baccarat Binge Helped Launder the World’s
Biggest Cyberheist. Bloomberg Markets. https://www.bloom-
berg.com/news/features/2017-08-03/a-baccarat-binge-helped-launder-the-
world-s-biggest-cyberheist
14. Kundu, S., Islam, K. A., Jui, T. T., Rail, S., Hossain, M. A., & Chowdhury, I.
H. (2018). Cyber crime trend in Bangladesh, an analysis, and ways out to
combat the threat. International Conference on Advanced Communication Tech-
nology, ICACT, 2018-February. https://doi.org/10.23919/ICACT.2018.8323800
15. Mazumder, M., & Sobhan, A. (2021). The spillover effect of the Bangladesh
Bank cyber heist on banks’ cyber risk disclosures in Bangladesh. The Journal
of Operational Risk. https://doi.org/10.21314/jop.2020.249
16. Microsoft. (2017). An attribution organization to strengthen trust online. In
Microsoft Policy Paper. https://query.prod.cms.rt.mi-
crosoft.com/cms/api/am/binary/RW67QI
17. Mueller, M., Grindal, K., Kuerbis, B., & Badiei, F. (2019). Cyber Attribution:
Can a New Institution Achieve Transnational Credibility? The Cyber Defense
Review, 4(1).
18. Perl, R., & Nanto, D. K. (2007). North Korean Crime-for-Profit Activities
(February 16, 2007). In CRS Report for Congress (RL33885) (Issue RL33885).
19. Republic Act No. 10927, (2017). https://www.officialga-
zette.gov.ph/2017/07/14/republic-act-no-10927/
20. SWIFT. (2017). Customer Security Programme (CSP).
https://www.swift.com/myswift/customer-security-programme-csp
21. SWIFT. (2019). Three years on from Bangladesh. https://www.swift.com/news-
events/webinars/three-years-bangladesh
22. Symantec. (2016). SWIFT attackers’ malware linked to more financial attacks.
https://community.broadcom.com/symantecenterprise/communities/com-
munity-home/librarydocuments/viewdocument?DocumentKey=8ae1ff71-
e440-4b79-9943-199d0adb43fc&CommunityKey=1ecf5f55-9545-44d6-b0f4-
4e4a7f5f5e68&tab=librarydocuments
10
23. Uddin, A. Z. (2016). BB to set up cyber security unit. Newage Business.
https://www.newagebd.net/article/843/bb-to-set-up-cyber-security-unit
24. Uddin, Md. R. (2017). The National Cybersecurity Strategy of Bangladesh: :
A Critical Analysis. Journal of International Affairs, 21(1 & 2).
25. U.S. v. Park. (2018). UNITED STATES DISTRICT COURT CENTRAL
DISTRICT OF CALIFORNIA. https://www.justice.gov/opa/press-re-
lease/file/1092091/download
11