Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Gaping holes in South African government cyber defences

      Gaping holes in South African government cyber defences

      2 April 2026
      EV charging start-up Charge bypasses JSE for token-based raise - Joubert Roux

      EV charging start-up Charge bypasses JSE for token-based raise

      2 April 2026
      Ring, reject, repeat: South Africa's spam call crisis

      Ring, reject, repeat: South Africa’s spam call crisis

      2 April 2026
      Four astronauts begin humanity's return to the moon - Artemis II

      Four astronauts begin humanity’s return to the moon

      2 April 2026
      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      1 April 2026
    • World
      Amazon in talks to buy satellite operator Globalstar

      Amazon in talks to buy satellite operator Globalstar

      2 April 2026

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
    • In-depth
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
    • TCS
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Hacker army targeting world’s central banks

    Hacker army targeting world’s central banks

    By Agency Staff17 March 2017
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    In 2008, a group of thieves stole US$700 000 from Russia’s central bank the old-fashioned way: they infiltrated a processing centre, handcuffed a guard, and made off with the cash.

    These days, the criminal attacks on the Bank of Russia are far less labour-intensive — and far more lucrative. Over the course of last year, hackers looted up to $21m from accounts opened with the Bank of Russia.

    The thefts from the Bank of Russia are part of a surge in cyberattacks on global monetary authorities in 2016, from Bangladesh to Warsaw. This year is likely to be even worse.

    “For a central bank, the question is not if, but when, they will be victim of a cyberattack,” said Giulio Coraggio, a lawyer focusing on cybersecurity at DLA Piper in Milan.

    The hacking collective Anonymous, known for its activism against big corporations, security forces and governments, is specifically targeting central banks, according to two people with direct knowledge of the group’s activities, who asked not to be identified.

    While the people wouldn’t say which banks are being targeted, they said the group has been busy recruiting new hackers to aid it in its forays, and renewed its attack against a number of central banks in February.

    The group last year attacked at least eight monetary authorities, including the Dutch Central Bank, the Bank of Greece, and the Bank of Mexico, the two people said. In a change of tack, it is also considering plans to sell on any confidential information it obtains, according to one of the people.

    The actions by non-state hacking and hacktivist groups such as Anonymous “are a wake-up call that should alert us to the critical weaknesses of global financial systems”, said Stefano Zanero, a professor of computer security at Italian university Politecnico di Milano.

    A successful cybersecurity attack on the US banking system is “one of the most significant risks our country faces”, Federal Reserve chairwoman Janet Yellen said in testimony before the congressional joint economic committee in November.

    The most notable hack on a central bank so far resulted in a manhunt involving Interpol and the FBI, launched last year, to help solve the cyber heist from Bangladesh’s central bank, where hackers used Swift, the interbank messaging system, to steal $81m.

    “The Bangladeshi bank case last year really brought the focus on payments systems within central banks,” said Adrian Nish, head of threat intelligence at BAE Systems. “The realisation that central banks can be targeted this way for profit has become a greater concern since Bangladesh.”

    Poland’s financial regulator was targeted in January by a suspected “watering hole” attack, where hackers target an often-used website, according to research from BAE Systems.

    In this instance, the hack originated from the website of Polish Financial Supervision Authority (KNF), where code was planted that would serve malware to certain visitors of the site. The malicious code was selectively targeted at financial institutions, and multiple banks were compromised via their users simply browsing the KNF website.

    The authority said last month in a statement that it had identified external attempts to hack its website and it was in contact with representatives of supervised industries.

    Similar code was also believed to be present on the website of the state-owned Banco de la República Oriental del Uruguay, and the National Banking and Stock Commission of Mexico in late 2016, according to analysis from BAE Systems and US software company Symantec.

    Banco de la República Oriental del Uruguay and the National Banking and Stock Commission of Mexico did not respond to requests for comment.

    “Cyberattacks have become military attacks,” said Biagio De Marchis, senior vice president in the security and information systems division of Italian defense and security company Leonardo, which offers cybersecurity services to clients which span from financial institutions to large companies to the Nato alliance.

    In response, central banks and related agencies have been busy attempting to stem the increasing number of attacks.

    In June, Swift hired BAE Systems and UK cybersecurity adviser NCC Group in a bid to improve its security defences. BAE has since helped Swift analyse whether it needs to flag potential issues to correspondent banks.

    The number of warning flags raised due to concerns about a potential security issue BAE Systems has examined are in the “double digits”. The problems range from system crashes due to software update errors, to intruders hacking into banking platforms.

    The Bank of England is even scooping up start-ups to help it battle online threats. It is currently running an accelerator, launched in June 2016, and is to start working with Anomali in order to “hunt and investigate cybersecurity intelligence data in a highly automated fashion,” according to a case study published in February by the bank.

    Limor Kessem, a consultant at IBM Security Systems, says greater vigilance on the part of central banks makes sense in the face of the increased attacks they’re seeing. She said she has identified several groups targeting banks, and expects more to jump in this year.

    “If overall cybercrime activity on that sector is any indication,” Kessem said, “attacks on central banks are also likely to increase.”  — (c) 2017 Bloomberg LP

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleGovernment read riot act over grants crisis
    Next Article Swiss watchmakers warm to smartwatches

    Related Posts

    Gaping holes in South African government cyber defences

    Gaping holes in South African government cyber defences

    2 April 2026
    EV charging start-up Charge bypasses JSE for token-based raise - Joubert Roux

    EV charging start-up Charge bypasses JSE for token-based raise

    2 April 2026
    Ring, reject, repeat: South Africa's spam call crisis

    Ring, reject, repeat: South Africa’s spam call crisis

    2 April 2026
    Company News
    Synthesis helps financial enterprises transform with new Gemini Enterprise - Digicloud Africa

    Synthesis helps financial enterprises transform with new Gemini Enterprise

    2 April 2026
    The next churn wave is already in your contact centre conversations - CallMiner

    The next churn wave is already in your contact centre conversations

    2 April 2026
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Gaping holes in South African government cyber defences

    Gaping holes in South African government cyber defences

    2 April 2026
    EV charging start-up Charge bypasses JSE for token-based raise - Joubert Roux

    EV charging start-up Charge bypasses JSE for token-based raise

    2 April 2026
    Ring, reject, repeat: South Africa's spam call crisis

    Ring, reject, repeat: South Africa’s spam call crisis

    2 April 2026
    Amazon in talks to buy satellite operator Globalstar

    Amazon in talks to buy satellite operator Globalstar

    2 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}