All language subtitles for Billion.Dollar.Heist.2023.720p.AMZN.WEBRip.x264-LAMA_track3_[eng]

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
ia Interlingua
ga Irish
it Italian
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranรฎ)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal) Download
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:01:10,852 --> 00:01:12,158 It's Friday, 2 00:01:12,158 --> 00:01:15,466 and it is, of course, the Muslim prayer day. 3 00:01:15,466 --> 00:01:18,556 Everyone's off, except for the skeleton staff 4 00:01:18,556 --> 00:01:20,688 at the Bangladeshi Bank, 5 00:01:20,688 --> 00:01:24,605 including Zubair Bin Huda, who is the duty manager. 6 00:01:27,913 --> 00:01:31,438 He's part of the elite team of employees 7 00:01:31,438 --> 00:01:35,138 who run the SWIFT banking system, 8 00:01:35,138 --> 00:01:38,706 which is a highly secure banking system 9 00:01:38,706 --> 00:01:41,361 that sends money around the world. 10 00:01:43,581 --> 00:01:47,324 Now, Bin Huda goes, as he does every day, 11 00:01:47,324 --> 00:01:49,195 to the SWIFT printer 12 00:01:49,195 --> 00:01:53,417 to check up on the transactions from the day before. 13 00:01:53,417 --> 00:01:56,202 There are usually printouts 14 00:01:56,202 --> 00:01:58,465 of transactions that came in overnight. 15 00:01:58,465 --> 00:02:02,817 The SWIFT software would print out a ledger every single day, 16 00:02:02,817 --> 00:02:06,995 an audit trace of every single transaction that occurred 17 00:02:06,995 --> 00:02:08,736 on paper. 18 00:02:08,736 --> 00:02:11,435 But when they came in on February 5th morning, 19 00:02:11,435 --> 00:02:12,914 as they usually do, 20 00:02:12,914 --> 00:02:15,787 they found there were no SWIFT messages at all. 21 00:02:15,787 --> 00:02:20,052 In fact, the printer's shut down. It won't work. 22 00:02:20,052 --> 00:02:21,401 They try and turn it on. 23 00:02:21,401 --> 00:02:25,231 Nothing will kick it back into life. 24 00:02:25,231 --> 00:02:28,191 He assumes it was simply a technical error, 25 00:02:28,191 --> 00:02:30,236 shrugs, goes home for the night, 26 00:02:30,236 --> 00:02:32,325 comes back in on Saturday morning 27 00:02:32,325 --> 00:02:34,545 to check the system again. 28 00:02:35,720 --> 00:02:36,982 The next day, 29 00:02:36,982 --> 00:02:40,203 they somehow manually get the printer to work. 30 00:02:40,203 --> 00:02:42,509 This deputy head manager walks in the room, 31 00:02:42,509 --> 00:02:46,165 the printer starts working, and these weird messages come out. 32 00:02:46,165 --> 00:02:49,603 The printer starts spewing out 33 00:02:49,603 --> 00:02:51,779 all of these transactions, 34 00:02:51,779 --> 00:02:56,349 including individual requests to the Fed in New York 35 00:02:56,349 --> 00:02:59,396 for $1 billion. 36 00:03:01,311 --> 00:03:04,923 At that moment, it's panic stations. 37 00:03:44,832 --> 00:03:50,273 When I was growing up, the biggest crime in Britain 38 00:03:50,273 --> 00:03:52,362 ever recorded was the Great Train Robbery. 39 00:03:52,362 --> 00:03:56,409 It was an extraordinary thing. They stole about ยฃ2.5 million. 40 00:03:56,409 --> 00:03:58,803 That's about $4 million. 41 00:03:58,803 --> 00:04:04,287 And that story ran literally for 30 years. 42 00:04:05,288 --> 00:04:06,811 Four million dollars. 43 00:04:07,899 --> 00:04:10,336 What you're about to hear 44 00:04:10,336 --> 00:04:14,079 is the story of an attempt to steal... 45 00:04:15,080 --> 00:04:17,561 a billion dollars 46 00:04:18,518 --> 00:04:20,477 It's told by world-leading 47 00:04:20,477 --> 00:04:24,002 cybersecurity and legal experts and journalists: 48 00:04:24,002 --> 00:04:26,352 the very people who uncovered the facts 49 00:04:26,352 --> 00:04:27,962 and threaded them together 50 00:04:27,962 --> 00:04:32,532 to reveal how dangerous the world of cybercrime is today. 51 00:04:49,941 --> 00:04:53,379 So, there are four big threats 52 00:04:53,379 --> 00:04:57,514 to the world and to the human race. 53 00:04:57,514 --> 00:04:59,646 One of them we've just experienced, 54 00:04:59,646 --> 00:05:01,779 that's the pandemic. 55 00:05:01,779 --> 00:05:04,869 Then you've got weapons of mass destruction. 56 00:05:04,869 --> 00:05:08,263 You've got climate change. 57 00:05:08,263 --> 00:05:14,008 But barrelling down towards us before those is cyber. 58 00:05:24,541 --> 00:05:25,977 This is the possibility 59 00:05:25,977 --> 00:05:30,111 of our overdependency on network technologies 60 00:05:30,111 --> 00:05:34,986 being undermined, either by malfunctioning of the system... 61 00:05:34,986 --> 00:05:36,640 New problems are emerging 62 00:05:36,640 --> 00:05:39,207 the day after an Amazon web service outage. 63 00:05:39,207 --> 00:05:42,297 Massive and mysterious, a global outage... 64 00:05:42,297 --> 00:05:45,257 ...or by a targeted attack. 65 00:05:45,257 --> 00:05:47,172 More than a thousand companies 66 00:05:47,172 --> 00:05:49,348 have been crippled by this attack so far. 67 00:05:49,348 --> 00:05:52,307 Sounds like we're looking at a 2022 with more hacks, 68 00:05:52,307 --> 00:05:53,613 more lost money. 69 00:05:59,967 --> 00:06:04,276 So, when I started hunting hackers in the early 1990s... 70 00:06:05,495 --> 00:06:07,714 our enemy was really simple. 71 00:06:07,714 --> 00:06:10,195 All the malware, all the viruses, 72 00:06:10,195 --> 00:06:13,154 all the attacks were done by teenage boys. 73 00:06:13,154 --> 00:06:15,505 What will your parents think? 74 00:06:17,637 --> 00:06:20,858 I've been doing this job for two decades now. 75 00:06:24,296 --> 00:06:25,515 When we first started, 76 00:06:25,515 --> 00:06:27,952 the people writing viruses and malware 77 00:06:27,952 --> 00:06:29,519 were doing it for fun, 78 00:06:29,519 --> 00:06:32,435 to get their name in lights, to say, "Look what I can do." 79 00:06:32,435 --> 00:06:34,698 No flash, please. 80 00:06:34,698 --> 00:06:37,831 When I started analysing viruses, they looked like this. 81 00:06:37,831 --> 00:06:41,095 Malware was still spread on floppy disks. 82 00:06:41,095 --> 00:06:44,751 They were spreading at the speed of people travelling the world 83 00:06:44,751 --> 00:06:47,145 and carrying the viruses with them. 84 00:06:47,145 --> 00:06:50,583 Michelangelo has proven less harmful than feared. 85 00:06:50,583 --> 00:06:53,151 All the stuff you've got in there you may really want, 86 00:06:53,151 --> 00:06:54,457 it's just gone? 87 00:06:54,457 --> 00:06:56,502 Then the internet came around, and suddenly, 88 00:06:56,502 --> 00:06:59,374 malware outbreaks could go around the world in seconds. 89 00:06:59,374 --> 00:07:00,985 For the last 36 hours, 90 00:07:00,985 --> 00:07:04,728 the ILOVEYOU virus has been creating havoc around the world. 91 00:07:04,728 --> 00:07:08,209 Experts have reason to worry. The first attack, July 19th, 92 00:07:08,209 --> 00:07:11,691 infected about 300,000 systems in nine hours. 93 00:07:11,691 --> 00:07:14,172 First of all, the guys who make a living doing security 94 00:07:14,172 --> 00:07:16,087 and are trying to protect themselves 95 00:07:16,087 --> 00:07:19,612 are scared shitless of you, because you can just ruin 'em. 96 00:07:19,612 --> 00:07:20,918 After the period of time 97 00:07:20,918 --> 00:07:22,572 where hackers were just doing things for fun, 98 00:07:22,572 --> 00:07:26,053 some of them realised that they could use it to make money. 99 00:07:28,578 --> 00:07:31,711 Prior to, like, the 2000s... 100 00:07:31,711 --> 00:07:35,759 cyber was primarily around a disruption of websites... 101 00:07:36,673 --> 00:07:38,936 defacement of a webpage. 102 00:07:38,936 --> 00:07:42,548 Just as we got around 2000, the dot-com boom, the explosion, 103 00:07:42,548 --> 00:07:44,419 we started into what would become 104 00:07:44,419 --> 00:07:46,204 financially motivated hackers. 105 00:07:46,204 --> 00:07:49,076 This really flourished, especially in Eastern European, 106 00:07:49,076 --> 00:07:53,167 Russia, CIS bloc countries. 107 00:07:53,167 --> 00:07:55,996 This was the time of gangster capitalism, 108 00:07:55,996 --> 00:08:00,044 when everyone's world in Eastern Europe was falling apart, 109 00:08:00,044 --> 00:08:02,655 where organised crime and... 110 00:08:02,655 --> 00:08:05,571 former members of the intelligence services 111 00:08:05,571 --> 00:08:09,357 were taking hold of the economy. 112 00:08:10,924 --> 00:08:14,319 So you had a lot of young people in the 1990s 113 00:08:14,319 --> 00:08:17,975 who were very good mathematicians, physicists, 114 00:08:17,975 --> 00:08:20,325 computer scientists, 115 00:08:20,325 --> 00:08:23,546 who simply took the logic and the morality 116 00:08:23,546 --> 00:08:26,636 of gangster capitalism online. 117 00:08:30,117 --> 00:08:32,206 Virus writers were writing viruses 118 00:08:32,206 --> 00:08:33,860 to infect Windows computers, 119 00:08:33,860 --> 00:08:36,994 and those computers were then sold to email spammers, 120 00:08:36,994 --> 00:08:39,997 who were using those machines to send Viagra spam 121 00:08:39,997 --> 00:08:42,695 or what have you, basically making money. 122 00:08:42,695 --> 00:08:44,479 And that changed everything. 123 00:08:48,832 --> 00:08:51,617 People at that time began to use online banking, 124 00:08:51,617 --> 00:08:54,664 and they began to steal people's online banking credentials, 125 00:08:54,664 --> 00:08:57,318 from there, also get credit card numbers, 126 00:08:57,318 --> 00:08:59,451 and use that to basically transfer funds. 127 00:08:59,451 --> 00:09:02,715 Just in hundreds of dollars at a time from these individuals. 128 00:09:02,715 --> 00:09:05,936 They eventually realised that going after individuals 129 00:09:05,936 --> 00:09:07,241 was much more difficult 130 00:09:07,241 --> 00:09:10,331 than just going after the banks themselves. 131 00:09:10,331 --> 00:09:11,985 Get into databases, 132 00:09:11,985 --> 00:09:14,466 those databases held credit card numbers. 133 00:09:14,466 --> 00:09:17,643 Take those numbers and then sell them on the black market. 134 00:09:19,384 --> 00:09:23,388 Originally, the internet was set up at the Pentagon... 135 00:09:25,085 --> 00:09:29,046 just to be able to share resources between computers. 136 00:09:32,179 --> 00:09:35,269 And it was really never designed to have 137 00:09:35,269 --> 00:09:38,533 banking attached to it, 138 00:09:38,533 --> 00:09:41,754 critical infrastructure attached to it. 139 00:09:41,754 --> 00:09:44,409 It was really designed for availability. 140 00:09:44,409 --> 00:09:47,151 It was never designed for security. 141 00:09:48,543 --> 00:09:50,545 Whereas in the early 1990s 142 00:09:50,545 --> 00:09:53,548 when there was only 30,000 people connected to it 143 00:09:53,548 --> 00:09:56,856 and several hundred systems, we've moved to a system 144 00:09:56,856 --> 00:09:59,990 which essentially is the backbone of global finance. 145 00:10:01,382 --> 00:10:04,603 The fact that it's able to do that... 146 00:10:04,603 --> 00:10:07,475 the fact that it's able to sustain currently between 147 00:10:07,475 --> 00:10:10,435 15 and 20 percent of GDP globally 148 00:10:10,435 --> 00:10:12,785 tells us something about just how important 149 00:10:12,785 --> 00:10:14,961 this infrastructure is. 150 00:10:14,961 --> 00:10:17,137 Why did people move into the internet 151 00:10:17,137 --> 00:10:18,704 to seek economic opportunity? 152 00:10:18,704 --> 00:10:21,664 Because that's where the economic opportunity was, 153 00:10:21,664 --> 00:10:23,622 untethered by norms, 154 00:10:23,622 --> 00:10:25,842 untethered by national boundaries, 155 00:10:25,842 --> 00:10:28,540 and essentially limited only by the creativity 156 00:10:28,540 --> 00:10:30,237 that these individuals had. 157 00:10:40,857 --> 00:10:43,860 The user nagged the Federal Reserve Bank 158 00:10:43,860 --> 00:10:48,429 with 35 payment instructions worth $951 million. 159 00:10:48,429 --> 00:10:50,910 We'd just never heard of such a thing before. 160 00:10:50,910 --> 00:10:53,086 We'd been investigating cybercrime 161 00:10:53,086 --> 00:10:55,610 for a couple of decades at that point. 162 00:10:55,610 --> 00:10:57,743 You see cyber criminals go in, 163 00:10:57,743 --> 00:11:01,791 and they try to transfer a few hundred thousands of dollars, 164 00:11:01,791 --> 00:11:05,098 maybe a million, a couple of million. 165 00:11:05,098 --> 00:11:09,102 But conducting a cyber-attack to try to steal one billion? 166 00:11:09,102 --> 00:11:13,063 That was an order of magnitude that we had never seen before. 167 00:11:13,063 --> 00:11:14,717 It was clear from early on 168 00:11:14,717 --> 00:11:18,155 that it was one of the biggest cyber heists in the world. 169 00:11:18,155 --> 00:11:20,548 When we first started hearing rumours 170 00:11:20,548 --> 00:11:23,856 about something affecting SWIFT network, 171 00:11:23,856 --> 00:11:26,467 I didn't understand how big it was. 172 00:11:26,467 --> 00:11:28,165 But when we started realising 173 00:11:28,165 --> 00:11:30,689 this is at a completely different scale, 174 00:11:30,689 --> 00:11:32,604 it just blew my mind. 175 00:11:46,357 --> 00:11:47,488 Once they realised 176 00:11:47,488 --> 00:11:49,621 that the money actually was really gone, 177 00:11:49,621 --> 00:11:51,666 then the panic began to set in. 178 00:11:51,666 --> 00:11:56,933 They lost $81 million instantly to a bank in the Philippines. 179 00:11:56,933 --> 00:12:00,023 They see the $81 million has already gone 180 00:12:00,023 --> 00:12:05,898 and that nearly $900 million extra has been requested. 181 00:12:08,858 --> 00:12:13,297 They basically try to figure out what to do next. 182 00:12:13,297 --> 00:12:15,908 They have no idea what to do. 183 00:12:15,908 --> 00:12:19,172 They hunted for ways to contact the New York Fed. 184 00:12:21,000 --> 00:12:23,698 Desperate calls are made by them. 185 00:12:27,877 --> 00:12:29,792 And it goes to an answering machine. 186 00:12:29,792 --> 00:12:31,794 You've reached the Federal Reserve Bank... 187 00:12:31,794 --> 00:12:33,665 Because it's Saturday in New York, 188 00:12:33,665 --> 00:12:36,059 and nobody's picking up the phone. 189 00:12:36,059 --> 00:12:39,149 - Please call back... - It's a complete shitshow. 190 00:12:39,149 --> 00:12:43,196 Total disorganisation, at both ends, I would stress. 191 00:12:45,546 --> 00:12:49,289 The New York Times Magazine was planning a true-crime issue, 192 00:12:49,289 --> 00:12:50,464 and my editor came to me 193 00:12:50,464 --> 00:12:52,945 and asked I was interested in doing it. 194 00:12:54,294 --> 00:12:55,643 I looked into it a bit. 195 00:12:55,643 --> 00:12:58,168 There definitely were some intriguing elements, 196 00:12:58,168 --> 00:12:59,822 and made me pay attention. 197 00:13:02,172 --> 00:13:04,478 The Federal Reserve has pretty much 198 00:13:04,478 --> 00:13:07,220 depended on the SWIFT banking system, 199 00:13:07,220 --> 00:13:11,921 and since there has rarely been a hack, if ever, 200 00:13:11,921 --> 00:13:14,880 of the SWIFT banking system... 201 00:13:14,880 --> 00:13:18,101 the Federal Reserve has never instituted 202 00:13:18,101 --> 00:13:20,843 any sort of 24-7 hotline. 203 00:13:22,583 --> 00:13:26,544 Eventually, they get hold of somebody at SWIFT, 204 00:13:26,544 --> 00:13:28,198 and SWIFT says, 205 00:13:28,198 --> 00:13:29,808 "Just shut the whole lot down 206 00:13:29,808 --> 00:13:32,550 until we know what's going on here." 207 00:13:32,550 --> 00:13:36,206 Badrul Khan decides before he can actually make that decision, 208 00:13:36,206 --> 00:13:39,209 he has to talk to the deputy governor of the bank, 209 00:13:39,209 --> 00:13:40,863 which he does. 210 00:13:40,863 --> 00:13:43,866 Deputy governor doesn't want to take the decision upon himself, 211 00:13:43,866 --> 00:13:47,478 so he talks to the governor. And guess what. 212 00:13:47,478 --> 00:13:50,698 The governor says, "It's probably a mistake. 213 00:13:50,698 --> 00:13:52,657 We won't shut it down." 214 00:13:56,052 --> 00:13:58,793 Work week begins at the Bangladesh Bank 215 00:13:58,793 --> 00:14:00,230 on Sunday morning, 216 00:14:00,230 --> 00:14:03,015 and it's then that the general manager of the bank 217 00:14:03,015 --> 00:14:05,888 comes in and begins to take stock of what had happened. 218 00:14:05,888 --> 00:14:07,454 They're running out of options. 219 00:14:07,454 --> 00:14:11,154 They're not sure what to do. Fed is still closed in New York. 220 00:14:11,154 --> 00:14:13,243 They go through all the SWIFT material, 221 00:14:13,243 --> 00:14:16,115 discover that most of the money has gone 222 00:14:16,115 --> 00:14:18,248 to the bank in Manila. 223 00:14:18,248 --> 00:14:21,207 And these desperate messages are sent out: 224 00:14:21,207 --> 00:14:22,643 "Stop the transactions. 225 00:14:22,643 --> 00:14:25,211 Hold that money. Do not allow it to be withdrawn. 226 00:14:25,211 --> 00:14:27,170 It's our money. It's been stolen." 227 00:14:28,693 --> 00:14:30,303 But there's a problem. 228 00:14:30,303 --> 00:14:32,262 Five, four, 229 00:14:32,262 --> 00:14:35,178 three, two, one! 230 00:14:35,178 --> 00:14:37,963 Happy New Year! 231 00:14:41,967 --> 00:14:43,838 It's Chinese New Year, 232 00:14:43,838 --> 00:14:46,972 and the Rizal Commercial Bank is closed. 233 00:14:51,716 --> 00:14:56,242 The thieves chose a sequence of days... 234 00:14:56,242 --> 00:15:00,681 from Friday, Saturday, Sunday and Monday, 235 00:15:00,681 --> 00:15:03,858 when one or another of the three countries 236 00:15:03,858 --> 00:15:06,600 that would be communicating with one another 237 00:15:06,600 --> 00:15:09,212 was shut down for a holiday. 238 00:15:15,609 --> 00:15:17,655 You've got to hand it to these guys. 239 00:15:17,655 --> 00:15:19,048 They knew it. 240 00:15:19,048 --> 00:15:21,746 They knew that if they did it over that weekend, 241 00:15:21,746 --> 00:15:24,009 with the Friday, the Muslim holiday, 242 00:15:24,009 --> 00:15:27,230 the Sunday and the Saturday, everything closed in New York, 243 00:15:27,230 --> 00:15:30,581 and the Monday, Chinese New Year. 244 00:15:32,365 --> 00:15:37,153 They've got four days to get the heist done. 245 00:15:37,153 --> 00:15:39,416 This is really classy planning. 246 00:15:41,418 --> 00:15:45,465 In that respect, it was really an ingenious plan. 247 00:15:45,465 --> 00:15:49,469 It's kind of like a great film director in a malevolent way, 248 00:15:49,469 --> 00:15:53,125 planning out, you know, a very complex film. 249 00:15:56,476 --> 00:15:58,174 The country of Bangladesh 250 00:15:58,174 --> 00:16:01,916 is the 170th poorest country in the world. 251 00:16:01,916 --> 00:16:04,310 One billion dollars is huge to them. 252 00:16:04,310 --> 00:16:06,399 When we talk about cyber-attacks, 253 00:16:06,399 --> 00:16:08,097 they're not just zeros and ones. 254 00:16:08,097 --> 00:16:10,229 We're not just talking about people 255 00:16:10,229 --> 00:16:13,798 moving around zeros and ones, deleting zeros and ones. 256 00:16:15,582 --> 00:16:18,150 One billion dollars to Bangladesh 257 00:16:18,150 --> 00:16:21,588 potentially means that people starve in the country. 258 00:16:21,588 --> 00:16:25,288 These things have potential serious repercussions. 259 00:16:27,768 --> 00:16:30,249 The Bangladesh Bank heist was significant 260 00:16:30,249 --> 00:16:34,340 because it showed how fragile global banking was as a whole. 261 00:16:36,212 --> 00:16:40,303 Banks don't just operate as single isolated entities. 262 00:16:40,303 --> 00:16:42,827 They're part of a system. 263 00:16:42,827 --> 00:16:45,525 And that system is vulnerable. 264 00:16:47,745 --> 00:16:52,445 The US Federal Reserve holds trillions of dollars in accounts 265 00:16:52,445 --> 00:16:55,622 kept by central banks all around the world. 266 00:16:55,622 --> 00:16:59,322 Its computer security systems are state of the art, making it 267 00:16:59,322 --> 00:17:03,630 one of the most difficult financial institutions to hack. 268 00:17:07,330 --> 00:17:10,594 The criminals realise that it can't get into 269 00:17:10,594 --> 00:17:14,119 the network system of the Fed, 270 00:17:14,119 --> 00:17:17,949 but the Fed has to talk to other central banks 271 00:17:17,949 --> 00:17:19,820 around the world, 272 00:17:19,820 --> 00:17:23,433 and this is where they find a flaw. 273 00:17:25,348 --> 00:17:27,480 The criminals turn their attention 274 00:17:27,480 --> 00:17:30,483 to the banks' communication systems. 275 00:17:32,006 --> 00:17:35,445 Every day, the Fed places thousands of transactions 276 00:17:35,445 --> 00:17:39,101 on behalf of the central banks that hold US dollar reserves 277 00:17:39,101 --> 00:17:40,363 at the Fed. 278 00:17:40,363 --> 00:17:42,800 The Federal Reserve has pretty much depended 279 00:17:42,800 --> 00:17:45,150 on the SWIFT banking system 280 00:17:45,150 --> 00:17:48,110 to get its instructions about transfers. 281 00:17:48,110 --> 00:17:51,069 SWIFT sends money around the world 282 00:17:51,069 --> 00:17:52,984 to thousands of member banks. 283 00:17:52,984 --> 00:17:57,989 It's the main way that banks dispatch money to one another. 284 00:17:59,208 --> 00:18:01,645 SWIFT allows you to transfer money 285 00:18:01,645 --> 00:18:02,820 from one bank to another, 286 00:18:02,820 --> 00:18:04,604 no matter where you are in the world. 287 00:18:04,604 --> 00:18:07,390 Make international wire transfers. 288 00:18:07,390 --> 00:18:11,611 The whole banking system is integrated, 289 00:18:11,611 --> 00:18:15,702 and they depend above all else on SWIFT, 290 00:18:15,702 --> 00:18:21,186 the international transaction mechanisms, to work. 291 00:18:21,186 --> 00:18:23,362 What it means is, all it takes 292 00:18:23,362 --> 00:18:28,846 is a single weak link to bring down the whole network. 293 00:18:30,413 --> 00:18:33,416 So although the target is the Fed, 294 00:18:33,416 --> 00:18:37,768 they are looking for a bank with which the Fed communicates, 295 00:18:37,768 --> 00:18:42,381 which holds a lot of its reserves in New York. 296 00:18:42,381 --> 00:18:44,166 But it's a long way away, 297 00:18:44,166 --> 00:18:48,605 in a distant time zone from the Fed, 298 00:18:48,605 --> 00:18:51,347 and it's likely to have 299 00:18:51,347 --> 00:18:56,439 patchy security systems in place in its computer network. 300 00:18:59,006 --> 00:19:00,834 My colleagues in Dhaka, 301 00:19:00,834 --> 00:19:04,055 they were chasing it for a long time. 302 00:19:04,055 --> 00:19:07,493 It was a robbery of a scale that we hadn't heard of. 303 00:19:09,278 --> 00:19:11,628 The first thought that came to my mind was, 304 00:19:11,628 --> 00:19:14,674 because it was the Bangladeshi Central Bank, 305 00:19:14,674 --> 00:19:17,286 I thought the hackers found it 306 00:19:17,286 --> 00:19:19,592 somehow easier to target it. 307 00:19:19,592 --> 00:19:21,420 Because it was Bangladesh, 308 00:19:21,420 --> 00:19:24,467 I suspected they would be more vulnerable 309 00:19:24,467 --> 00:19:26,817 to cyber-attacks as such. 310 00:19:28,558 --> 00:19:31,387 "Hmm. A Bangladeshi bank. 311 00:19:31,387 --> 00:19:34,041 Probably doesn't have the same level of security 312 00:19:34,041 --> 00:19:36,261 and if they do, it's probably one or two people, 313 00:19:36,261 --> 00:19:40,265 not a team of 6,000 working on it. 314 00:19:41,179 --> 00:19:42,398 Let's go for it." 315 00:19:42,398 --> 00:19:44,704 These attackers weren't just skilled 316 00:19:44,704 --> 00:19:45,966 in breaching networks, 317 00:19:45,966 --> 00:19:47,881 figuring out how to get into an organisation. 318 00:19:47,881 --> 00:19:52,059 They had to study that SWIFT software deeply. 319 00:19:52,059 --> 00:19:55,237 This attack happened well before that February 5th, 320 00:19:55,237 --> 00:19:56,890 when the bank employee walked in 321 00:19:56,890 --> 00:19:59,937 and saw that printer hadn't printed out the audit jobs 322 00:19:59,937 --> 00:20:01,982 and couldn't figure out what was going on. 323 00:20:01,982 --> 00:20:04,855 This attack started more than a year prior to that. 324 00:20:04,855 --> 00:20:07,336 These attackers had been working for months 325 00:20:07,336 --> 00:20:09,163 in the build-up until that day. 326 00:20:09,163 --> 00:20:11,296 It is a mistake for people to think 327 00:20:11,296 --> 00:20:13,603 that this was something that happened overnight. 328 00:20:13,603 --> 00:20:15,692 It is a mistake for people to think 329 00:20:15,692 --> 00:20:18,999 that this happened in a month, or two months or three months. 330 00:20:18,999 --> 00:20:21,437 It is a slow, methodical approach, 331 00:20:21,437 --> 00:20:25,571 because it's a business, all right? You build it. 332 00:20:32,317 --> 00:20:35,189 Bank robberies used to be something that happened 333 00:20:35,189 --> 00:20:37,540 in the real world. 334 00:20:37,540 --> 00:20:40,673 Now they only happen in the online world. 335 00:20:42,849 --> 00:20:46,810 If you would try to steal $100 million in banknotes, 336 00:20:46,810 --> 00:20:49,203 that would be, like, ten trucks full of notes. 337 00:20:49,203 --> 00:20:51,554 If you drive ten trucks full of notes out of the bank, 338 00:20:51,554 --> 00:20:54,078 someone would notice. 339 00:20:54,078 --> 00:20:57,342 But when you do the same thing online, no one notices anything. 340 00:20:57,342 --> 00:21:01,085 Every movie you've ever seen of them breaking into a bank 341 00:21:01,085 --> 00:21:03,479 is them doing it over a bank holiday 342 00:21:03,479 --> 00:21:05,437 or something of that nature. 343 00:21:05,437 --> 00:21:07,265 Same concept here. 344 00:21:12,139 --> 00:21:15,404 This isn't Matthew Broderick sitting in front of a computer, 345 00:21:15,404 --> 00:21:17,493 like War Games back in the 1980s, 346 00:21:17,493 --> 00:21:19,364 some kid in their basement. 347 00:21:21,148 --> 00:21:24,413 These are criminal organisations. 348 00:21:24,413 --> 00:21:26,066 Each person has a skill set. 349 00:21:26,066 --> 00:21:29,113 It's kind of like that Ocean's Eleven-type thing. 350 00:21:30,636 --> 00:21:33,117 You know, "This guy could crack the bank, 351 00:21:33,117 --> 00:21:35,380 this guy could do the surveillance cameras, 352 00:21:35,380 --> 00:21:37,817 this is the getaway, this is the conman." 353 00:21:37,817 --> 00:21:39,602 You all have a role to play, 354 00:21:39,602 --> 00:21:42,344 and you need everybody to execute their role 355 00:21:42,344 --> 00:21:44,128 to the best of their abilities 356 00:21:44,128 --> 00:21:46,913 for you to be successful and get it out. 357 00:21:48,785 --> 00:21:53,050 So how do you pull off a heist of this magnitude? 358 00:21:53,050 --> 00:21:58,360 It takes the right crew of highly skilled specialists. 359 00:21:58,360 --> 00:22:03,234 And it all starts not with ones and zeros, but with people. 360 00:22:07,194 --> 00:22:10,633 Cybercrime is about gaining credentials 361 00:22:10,633 --> 00:22:12,678 to gain access, 362 00:22:12,678 --> 00:22:15,464 stealing the keys. 363 00:22:15,464 --> 00:22:19,859 The social engineer is critical to a hack. 364 00:22:19,859 --> 00:22:22,296 It's how you get in, and you get in 365 00:22:22,296 --> 00:22:26,431 not through digital means, you get in through human means. 366 00:22:26,431 --> 00:22:28,999 It's to do with psychology. 367 00:22:31,349 --> 00:22:35,571 The criminals have to ensnare one of the employees 368 00:22:35,571 --> 00:22:38,095 of the Bangladeshi Bank, 369 00:22:38,095 --> 00:22:41,925 beginning by going through their social media profiles 370 00:22:41,925 --> 00:22:44,754 and looking for suitable targets. 371 00:22:45,972 --> 00:22:48,975 Our relationship with the computer 372 00:22:48,975 --> 00:22:51,891 is one of perceived intimacy; 373 00:22:51,891 --> 00:22:54,416 that when we're using a computer, 374 00:22:54,416 --> 00:22:57,810 no one else can see what we're doing, we believe, 375 00:22:57,810 --> 00:23:00,422 and it's just us and the screen. 376 00:23:02,162 --> 00:23:05,862 And if we were to read an email from a friend, 377 00:23:05,862 --> 00:23:08,952 we tend to believe it at face value. 378 00:23:12,259 --> 00:23:15,262 They found close to three dozen employees. 379 00:23:15,262 --> 00:23:18,875 And they constructed a simple spear-phish email: 380 00:23:18,875 --> 00:23:21,791 an email message that pretended to be from a guy 381 00:23:21,791 --> 00:23:24,489 named Rasal Alam. 382 00:23:24,489 --> 00:23:26,099 And Rasal Alam said, 383 00:23:26,099 --> 00:23:28,624 "Hey, I just wanna work at your company. 384 00:23:28,624 --> 00:23:31,453 Here's a rรฉsumรฉ attached. Have a look." 385 00:23:31,453 --> 00:23:34,151 And it turned out that they mailed that 386 00:23:34,151 --> 00:23:36,936 to about 36 different employees, and three of them 387 00:23:36,936 --> 00:23:39,765 opened that attachment connected to that email. 388 00:23:41,027 --> 00:23:42,376 It was a zip file, 389 00:23:42,376 --> 00:23:44,683 and the zip file contained just a document inside. 390 00:23:44,683 --> 00:23:47,338 They opened up the document and it was his rรฉsumรฉ. 391 00:23:47,338 --> 00:23:50,776 It was a rรฉsumรฉ for Rasel Ahlam, who wanted to work at the bank, 392 00:23:50,776 --> 00:23:53,039 but unbeknownst to those individuals, 393 00:23:53,039 --> 00:23:56,869 also contained malicious code inside. 394 00:23:56,869 --> 00:23:58,784 We can look at any data breach, 395 00:23:58,784 --> 00:24:01,265 and the root cause has either been 396 00:24:01,265 --> 00:24:03,354 a technical problem 397 00:24:03,354 --> 00:24:05,443 or a people problem. 398 00:24:05,443 --> 00:24:08,272 And the technical problems can be really hard 399 00:24:08,272 --> 00:24:10,579 and really expensive and really slow to fix, 400 00:24:10,579 --> 00:24:12,624 but at least we can fix them. 401 00:24:12,624 --> 00:24:16,193 But in the end, we have no patch for human brains. 402 00:24:17,847 --> 00:24:22,286 There's no way to fix the people who do stupid mistakes. 403 00:24:22,286 --> 00:24:23,766 When attackers try to send 404 00:24:23,766 --> 00:24:27,073 these spear-phishing emails, they try to do two things. 405 00:24:27,073 --> 00:24:30,555 They try to look very normal. It was just a rรฉsumรฉ. 406 00:24:30,555 --> 00:24:31,861 They try to fly under the radar, 407 00:24:31,861 --> 00:24:33,558 to look as legitimate as possible. 408 00:24:33,558 --> 00:24:37,519 And the second is they often try to use enticing techniques. 409 00:24:43,655 --> 00:24:47,093 New dangers tonight from the Love Bug computer virus, 410 00:24:47,093 --> 00:24:50,009 this time disguised as a friendlier email. 411 00:24:50,009 --> 00:24:53,622 The first internet virus that went around the world 412 00:24:53,622 --> 00:24:57,930 in less than 48 hours was called the ILOVEYOU virus. 413 00:24:57,930 --> 00:25:00,542 And already, business interruption costs 414 00:25:00,542 --> 00:25:03,719 are estimated at more than a billion dollars. 415 00:25:03,719 --> 00:25:06,635 You would be sitting there working away, 416 00:25:06,635 --> 00:25:08,550 and then suddenly, in your inbox, 417 00:25:08,550 --> 00:25:12,597 you get an email which says, "I love you." 418 00:25:12,597 --> 00:25:15,295 And it could well be that this is a person 419 00:25:15,295 --> 00:25:17,863 who you've always held a torch for. 420 00:25:17,863 --> 00:25:20,387 And so, of course, you're very excited, 421 00:25:20,387 --> 00:25:24,130 and you press on the link, and then you're doomed. 422 00:25:24,130 --> 00:25:26,916 What happens is, the virus infects your machine 423 00:25:26,916 --> 00:25:30,006 and proceeds to email everyone you've ever emailed. 424 00:25:30,006 --> 00:25:32,661 The end result of that is the mail servers 425 00:25:32,661 --> 00:25:33,749 get bogged down, 426 00:25:33,749 --> 00:25:36,186 and the only way to solve the problem 427 00:25:36,186 --> 00:25:39,319 is to shut the servers down, hence the interruption. 428 00:25:39,319 --> 00:25:42,366 The ILOVEYOU virus was one of the first viruses 429 00:25:42,366 --> 00:25:45,108 that had really worldwide impact. 430 00:25:47,153 --> 00:25:49,765 It was still a virus written by a guy 431 00:25:49,765 --> 00:25:52,637 that just wanted to get his name in lights. 432 00:25:52,637 --> 00:25:53,856 He wanted to see his virus 433 00:25:53,856 --> 00:25:55,640 travel around the world a little bit 434 00:25:55,640 --> 00:25:57,424 and maybe get in the news somewhere, 435 00:25:57,424 --> 00:25:59,862 and then him be able to say, "Oh, I wrote that." 436 00:25:59,862 --> 00:26:03,126 Mr de Guzman hardly seemed to comprehend the chaos 437 00:26:03,126 --> 00:26:05,084 inflicted on the world's computers. 438 00:26:05,084 --> 00:26:08,653 But what happened was, it spread so quickly and so fast, 439 00:26:08,653 --> 00:26:11,308 it brought down email all over the world, 440 00:26:11,308 --> 00:26:13,963 and having email go down was monumental. 441 00:26:13,963 --> 00:26:17,401 Experts say that the ILOVEYOU virus could end up costing 442 00:26:17,401 --> 00:26:21,623 the world economy $10 billion in lost work time. 443 00:26:21,623 --> 00:26:25,670 It became the first sign to show that we relied on the internet. 444 00:26:25,670 --> 00:26:29,239 The internet was the basis for our financial transactions, 445 00:26:29,239 --> 00:26:31,197 for the way we do business. 446 00:26:32,503 --> 00:26:33,678 I would talk to people 447 00:26:33,678 --> 00:26:35,375 and remind them and educate them and say, 448 00:26:35,375 --> 00:26:36,942 "Look, you can't just click 449 00:26:36,942 --> 00:26:39,423 on any attachment that comes to you in an email." 450 00:26:39,423 --> 00:26:42,861 I remember talking to a guy about the Anna Kournikova virus 451 00:26:42,861 --> 00:26:46,038 that purported to be nude pictures of Anna Kournikova. 452 00:26:46,038 --> 00:26:48,998 And he told me, he said, "Yeah, I knew it was a virus. 453 00:26:48,998 --> 00:26:52,131 I thought it was probably a virus. But what if it wasn't? 454 00:26:52,131 --> 00:26:54,003 What if it really was nude pictures? 455 00:26:54,003 --> 00:26:55,831 So I double-clicked on it." 456 00:26:56,962 --> 00:26:58,442 People just don't realise 457 00:26:58,442 --> 00:27:02,098 what clicking on that attachment means. 458 00:27:02,098 --> 00:27:06,145 Cyber criminals and hackers realised a long time ago 459 00:27:06,145 --> 00:27:09,061 that your username and password, 460 00:27:09,061 --> 00:27:11,847 particularly to your email account, 461 00:27:11,847 --> 00:27:15,328 could get them into your stock brokerage account, 462 00:27:15,328 --> 00:27:18,244 to your online banking account, 463 00:27:18,244 --> 00:27:23,946 to send phishing emails to other contacts. 464 00:27:23,946 --> 00:27:28,037 If you protect yourself properly, 465 00:27:28,037 --> 00:27:31,257 the chances are you won't be a victim 466 00:27:31,257 --> 00:27:35,261 of what one would call "drive-by hacking". 467 00:27:35,261 --> 00:27:39,526 If, however, you're being specifically targeted 468 00:27:39,526 --> 00:27:43,008 by a hacking group, they will follow that trace. 469 00:27:43,922 --> 00:27:45,576 And they will get you. 470 00:27:48,492 --> 00:27:53,323 Now, we know that at least three members of the Bangladeshi Bank 471 00:27:53,323 --> 00:27:56,630 were targeted by this after the social engineer 472 00:27:56,630 --> 00:27:59,024 had scanned all of their social media, 473 00:27:59,024 --> 00:28:00,765 and at least three of them 474 00:28:00,765 --> 00:28:04,116 opened the letter and took the bait. 475 00:28:04,116 --> 00:28:06,292 Once that code began executing 476 00:28:06,292 --> 00:28:08,338 on those bank employees' computers, 477 00:28:08,338 --> 00:28:10,949 it would reach out back to the attackers 478 00:28:10,949 --> 00:28:13,909 and tell them that these machines are now infected 479 00:28:13,909 --> 00:28:15,345 and give them full control, 480 00:28:15,345 --> 00:28:18,087 as if they were sitting in front of the keyboard, 481 00:28:18,087 --> 00:28:21,177 just like those employees. 482 00:28:21,177 --> 00:28:23,788 There was malware in the system 483 00:28:23,788 --> 00:28:26,617 that was actually copying screenshots, 484 00:28:28,401 --> 00:28:33,493 copying keystrokes of employees, and no one knew. 485 00:28:33,493 --> 00:28:35,844 They've got their foot in the door. 486 00:28:35,844 --> 00:28:38,803 This is the essential first step. 487 00:28:38,803 --> 00:28:42,720 The first layer of security has been breached. 488 00:28:48,682 --> 00:28:52,382 And the digger, the person who is getting deeper and deeper 489 00:28:52,382 --> 00:28:54,601 into the computer network, 490 00:28:54,601 --> 00:28:58,301 has to be a very advanced hacker. 491 00:28:58,301 --> 00:29:03,001 This is when you need a real professional. 492 00:29:03,001 --> 00:29:05,699 They're like ghosts. Nobody can see them, 493 00:29:05,699 --> 00:29:10,052 but they're mapping every single bit of that network. 494 00:29:12,010 --> 00:29:13,620 In the Bank of Bangladesh, 495 00:29:13,620 --> 00:29:16,188 you had computers that are all interconnected to each other, 496 00:29:16,188 --> 00:29:19,322 and they're connected using what's called a switch. 497 00:29:19,322 --> 00:29:23,065 In your average bank, that has a good security program, 498 00:29:23,065 --> 00:29:25,719 those switches are what's called segmented. 499 00:29:25,719 --> 00:29:27,634 So each of those switches only allow 500 00:29:27,634 --> 00:29:30,333 a certain number of computers to talk to each other 501 00:29:30,333 --> 00:29:32,857 rather than every computer to talk to each other. 502 00:29:32,857 --> 00:29:35,425 But in the case of the Bank of Bangladesh, 503 00:29:35,425 --> 00:29:38,602 in the back-office network, they were using these very cheap, 504 00:29:38,602 --> 00:29:42,127 literally $10 switches that didn't do any segmentation. 505 00:29:42,127 --> 00:29:45,391 Every computer was potentially connected to each other. 506 00:29:45,391 --> 00:29:48,351 Basically, it's a cost-cutting exercise. 507 00:29:48,351 --> 00:29:53,573 But that cost-cutting exercise was what the digger needed. 508 00:29:53,573 --> 00:29:55,532 Those attackers began to do 509 00:29:55,532 --> 00:29:58,274 what we call a lateral traverse across the network, 510 00:29:58,274 --> 00:30:01,190 search for other computers to infect, 511 00:30:01,190 --> 00:30:03,105 look for credentials. 512 00:30:04,628 --> 00:30:06,891 Whenever you log into a computer, 513 00:30:06,891 --> 00:30:08,719 your credentials are cached. 514 00:30:08,719 --> 00:30:11,374 They're put into the memory of the computer. 515 00:30:11,374 --> 00:30:14,333 Attackers are able to filter through that memory 516 00:30:14,333 --> 00:30:16,683 and find used usernames and passwords. 517 00:30:16,683 --> 00:30:19,512 They don't always know what they're for, 518 00:30:19,512 --> 00:30:22,428 so they try to collect as many credentials as they can 519 00:30:22,428 --> 00:30:25,475 and see, "What computers can I see from this computer?", 520 00:30:25,475 --> 00:30:27,651 and just begin to use them over and over again 521 00:30:27,651 --> 00:30:28,695 and just try them. 522 00:30:31,307 --> 00:30:32,656 Eventually, they hop on 523 00:30:32,656 --> 00:30:35,093 and are able to connect to another computer. 524 00:30:35,093 --> 00:30:36,355 They get onto that one. 525 00:30:36,355 --> 00:30:38,314 It's still not what they're interested in, 526 00:30:38,314 --> 00:30:40,707 but they're able to find more usernames and passwords 527 00:30:40,707 --> 00:30:42,448 and try those on all the other computers 528 00:30:42,448 --> 00:30:44,233 they can see from that advantage point. 529 00:30:44,233 --> 00:30:48,063 That's how they move across the network over and over again. 530 00:30:48,063 --> 00:30:50,587 They would delete all traces of themselves 531 00:30:50,587 --> 00:30:52,937 as they moved across the network, 532 00:30:52,937 --> 00:30:55,679 ultimately jumping from computer to computer 533 00:30:55,679 --> 00:30:57,724 until they found the SWIFT terminal, 534 00:30:57,724 --> 00:31:00,858 their ultimate goal in order to make wire transfers 535 00:31:00,858 --> 00:31:02,860 out of the Bank of Bangladesh. 536 00:31:05,036 --> 00:31:06,820 It takes a long time. 537 00:31:06,820 --> 00:31:10,215 They're there for months. This is an ongoing process. 538 00:31:10,215 --> 00:31:14,263 If at any moment they're discovered to be in there, 539 00:31:14,263 --> 00:31:18,180 then the whole operation is finished. 540 00:31:22,184 --> 00:31:24,099 With the Bangladeshi Bank heist, 541 00:31:24,099 --> 00:31:27,319 you basically have two operations running in parallel. 542 00:31:27,319 --> 00:31:29,713 You have an offline operation going on, 543 00:31:29,713 --> 00:31:32,281 which is to do with the money laundering. 544 00:31:36,938 --> 00:31:38,983 It's the fence's responsibility 545 00:31:38,983 --> 00:31:43,945 to set up the recipient accounts. 546 00:31:43,945 --> 00:31:46,425 They're gonna end up with cold, hard cash, 547 00:31:46,425 --> 00:31:48,123 and they need individuals on the ground 548 00:31:48,123 --> 00:31:50,952 to pick up that cash and move it. 549 00:31:53,215 --> 00:31:54,477 And so, in May of 2015, 550 00:31:54,477 --> 00:31:56,914 before they'd even got into the SWIFT terminal, 551 00:31:56,914 --> 00:31:59,699 they were able to recruit a Chinese individual 552 00:31:59,699 --> 00:32:03,355 to go to the Philippines and open up four bank accounts there 553 00:32:03,355 --> 00:32:05,270 at a bank called RCBC. 554 00:32:05,270 --> 00:32:08,926 You have to make sure those people inside the bank 555 00:32:08,926 --> 00:32:10,754 in the Philippines 556 00:32:10,754 --> 00:32:13,017 have been properly corrupted 557 00:32:13,017 --> 00:32:17,717 and properly instructed as to what their role is. 558 00:32:17,717 --> 00:32:20,111 The fence opens up these accounts, 559 00:32:20,111 --> 00:32:22,635 puts $500 in each of them, 560 00:32:22,635 --> 00:32:25,769 and then they just go to sleep for nine months. 561 00:32:28,641 --> 00:32:31,993 These attackers were inside the Bank of Bangladesh 562 00:32:31,993 --> 00:32:34,865 for a full year, which is incredible. 563 00:32:41,350 --> 00:32:43,308 They actually got onto that SWIFT terminal 564 00:32:43,308 --> 00:32:44,831 exactly one year later... 565 00:32:47,660 --> 00:32:50,272 on January 29th, 2016. 566 00:32:55,538 --> 00:32:58,062 In any bank, you have different employees. 567 00:32:58,062 --> 00:33:01,457 You have back-office employees, administrative employees, 568 00:33:01,457 --> 00:33:04,373 but you also have computers that are connected 569 00:33:04,373 --> 00:33:07,202 directly to financial transactions. 570 00:33:07,202 --> 00:33:11,119 And only users who have specific access to those machines 571 00:33:11,119 --> 00:33:12,598 are allowed to use them. 572 00:33:12,598 --> 00:33:15,079 When we talk about the case of the Bank of Bangladesh, 573 00:33:15,079 --> 00:33:18,648 there was a single computer that had credentials 574 00:33:18,648 --> 00:33:20,128 from a shared employee. 575 00:33:20,128 --> 00:33:23,261 You had an employee that would use that SWIFT terminal, 576 00:33:23,261 --> 00:33:26,873 but also had their own computer in the normal back-office area. 577 00:33:26,873 --> 00:33:29,398 Once they got onto that employee's computer, 578 00:33:29,398 --> 00:33:31,095 they were able to jump across. 579 00:33:31,095 --> 00:33:35,012 They waited. They basically did a recon on the system. 580 00:33:35,012 --> 00:33:36,622 They crawled around. 581 00:33:36,622 --> 00:33:39,799 They looked and tried to fully understand how this worked, 582 00:33:39,799 --> 00:33:43,847 how SWIFT worked, how each bank employee would make a request 583 00:33:43,847 --> 00:33:47,198 into the SWIFT system, where it would go, 584 00:33:47,198 --> 00:33:49,287 how to direct that to branches 585 00:33:49,287 --> 00:33:52,160 where they had set up these accounts. 586 00:33:52,160 --> 00:33:55,772 And in this case, it was just very simple and very clever. 587 00:33:58,209 --> 00:34:00,385 The thief is not so much someone 588 00:34:00,385 --> 00:34:03,345 who is physically taking out the money 589 00:34:03,345 --> 00:34:05,738 and stuffing it into a bag. 590 00:34:05,738 --> 00:34:07,653 They're making sure 591 00:34:07,653 --> 00:34:12,615 that every bit on the system is coordinated. 592 00:34:12,615 --> 00:34:16,271 There are all sorts of things to get right 593 00:34:16,271 --> 00:34:21,537 before that fatal moment when the request is made. 594 00:34:21,537 --> 00:34:24,148 Everything has to be 595 00:34:24,148 --> 00:34:26,759 really, really precisely coordinated 596 00:34:26,759 --> 00:34:29,980 to get all the timing right. You've got four days. 597 00:34:29,980 --> 00:34:31,590 You can't afford a slip-up. 598 00:34:31,590 --> 00:34:34,376 When the attackers got into the SWIFT terminal 599 00:34:34,376 --> 00:34:38,771 on January 29th of 2016, they paused for about five days 600 00:34:38,771 --> 00:34:41,122 to get their malicious software ready 601 00:34:41,122 --> 00:34:43,211 that allowed them to cover their tracks 602 00:34:43,211 --> 00:34:45,300 when they were on that SWIFT terminal. 603 00:34:45,300 --> 00:34:48,216 They decided to wait until February 4th. 604 00:34:48,216 --> 00:34:49,869 And this is no accident. 605 00:34:53,003 --> 00:34:55,745 They have chosen a long weekend 606 00:34:55,745 --> 00:34:58,617 due to holidays in different parts of the world. 607 00:34:58,617 --> 00:35:01,229 That means, instead of the usual two days 608 00:35:01,229 --> 00:35:02,578 they have to get away with it 609 00:35:02,578 --> 00:35:04,884 before alarms start going off everywhere, 610 00:35:04,884 --> 00:35:07,974 they've got four days. It's brilliant. 611 00:35:09,541 --> 00:35:11,978 February 4th, 2016, was a Thursday. 612 00:35:11,978 --> 00:35:14,677 That's the last day of the working week in Bangladesh. 613 00:35:14,677 --> 00:35:16,983 In Bangladesh, they work from Sunday to Thursday. 614 00:35:16,983 --> 00:35:19,464 So, at some point late in the afternoon, 615 00:35:19,464 --> 00:35:22,728 the SWIFT transaction operator in the Bangladeshi Bank 616 00:35:22,728 --> 00:35:24,730 logs off his terminal. 617 00:35:28,821 --> 00:35:30,519 But three hours later, 618 00:35:30,519 --> 00:35:33,478 the thief logs into that terminal 619 00:35:33,478 --> 00:35:35,872 and starts to impersonate him. 620 00:35:35,872 --> 00:35:38,962 They logged into that SWIFT terminal at 8:36 p.m., 621 00:35:38,962 --> 00:35:41,094 after they believed, or really knew, 622 00:35:41,094 --> 00:35:44,446 that all the bank employees had gone home for the weekend. 623 00:35:44,446 --> 00:35:48,276 And they put forward 35 different wire transactions 624 00:35:48,276 --> 00:35:52,323 from that SWIFT terminal, totalling $951 million, 625 00:35:52,323 --> 00:35:55,674 almost $1 billion, completely unheard of. 626 00:35:58,721 --> 00:36:02,072 Ten hours behind Bangladesh, 627 00:36:02,072 --> 00:36:03,856 New York is waking up. 628 00:36:04,988 --> 00:36:07,295 The first thing that the Fed sees 629 00:36:07,295 --> 00:36:09,340 is 35 requests 630 00:36:09,340 --> 00:36:13,257 for almost the entire holdings of the Bangladeshi Bank. 631 00:36:13,257 --> 00:36:17,566 Usually, it's figures of sort of $300,000, $500,000. 632 00:36:17,566 --> 00:36:19,568 They want almost a billion! 633 00:36:19,568 --> 00:36:23,789 The operator, perhaps unsurprisingly, rejects it, 634 00:36:23,789 --> 00:36:26,531 sends it back to Bangladesh. 635 00:36:26,531 --> 00:36:28,794 But he rejects it not because 636 00:36:28,794 --> 00:36:32,624 this is an absolutely crazy amount of money, 637 00:36:32,624 --> 00:36:36,628 but because the requests are wrongly formatted. 638 00:36:36,628 --> 00:36:39,196 As much research that they had done, 639 00:36:39,196 --> 00:36:41,894 they didn't really understand how to fill out 640 00:36:41,894 --> 00:36:43,374 those SWIFT transfers. 641 00:36:43,374 --> 00:36:45,985 They were missing what's called an intermediate bank. 642 00:36:45,985 --> 00:36:48,205 New York Federal Reserve replied to them, 643 00:36:48,205 --> 00:36:50,512 via the SWIFT system, back to their computer 644 00:36:50,512 --> 00:36:52,731 that they were sitting in front of, virtually, 645 00:36:52,731 --> 00:36:56,518 saying, "Hey, these transactions are missing information." 646 00:36:56,518 --> 00:36:58,563 They think on their feet. 647 00:36:58,563 --> 00:37:02,872 They reformat the requests, send them back... 648 00:37:02,872 --> 00:37:06,049 and hold their breath to see what happens. 649 00:37:06,049 --> 00:37:08,617 They ultimately corrected 34 of them. 650 00:37:08,617 --> 00:37:09,922 They had forgotten one. 651 00:37:09,922 --> 00:37:12,273 The one did have the intermediate bank 652 00:37:12,273 --> 00:37:13,491 went to Deutsche Bank. 653 00:37:13,491 --> 00:37:15,624 That order was for $20 million 654 00:37:15,624 --> 00:37:19,845 to a charity called the Shalika Foundation in Sri Lanka. 655 00:37:19,845 --> 00:37:22,152 But they had made a typo as well, 656 00:37:22,152 --> 00:37:25,460 and they had misspelled "foundation" as "fandation". 657 00:37:25,460 --> 00:37:27,723 And so Deutsche Bank saw that typo 658 00:37:27,723 --> 00:37:29,899 and questioned it and, again, 659 00:37:29,899 --> 00:37:32,336 held that transaction due to that typo. 660 00:37:34,686 --> 00:37:36,906 We use that as the poster child 661 00:37:36,906 --> 00:37:40,126 for why you need to learn how to spell. 662 00:37:40,126 --> 00:37:43,826 Otherwise, you can lose $20 million. 663 00:37:43,826 --> 00:37:47,308 Ultimately, when they return the other 34... 664 00:37:48,613 --> 00:37:50,311 Bingo. 665 00:37:50,311 --> 00:37:52,530 The operator approves them. 666 00:37:52,530 --> 00:37:55,838 Four of them went through. 667 00:37:55,838 --> 00:38:00,538 The green light is given. The heist is on. 668 00:38:00,538 --> 00:38:03,672 Those four went through to those bank accounts 669 00:38:03,672 --> 00:38:06,109 in the Philippines that had been opened 670 00:38:06,109 --> 00:38:07,632 more than six months earlier. 671 00:38:07,632 --> 00:38:10,679 And they were able to transfer out $81 million 672 00:38:10,679 --> 00:38:12,681 to the bank in the Philippines. 673 00:38:34,224 --> 00:38:37,880 Ultimately, they were about to transfer $1 billion 674 00:38:37,880 --> 00:38:39,577 from the Bank of Bangladesh, 675 00:38:39,577 --> 00:38:42,537 but they didn't want anyone to find out. 676 00:38:47,890 --> 00:38:51,502 They began to cover their tracks. 677 00:38:51,502 --> 00:38:53,243 Normally, as a bank employee, 678 00:38:53,243 --> 00:38:55,114 you'll load up the SWIFT software, 679 00:38:55,114 --> 00:38:57,987 you'll see on the screen all the latest transactions, 680 00:38:57,987 --> 00:38:59,641 you can make transactions. 681 00:38:59,641 --> 00:39:04,385 And so the attackers deleted all records of those transactions. 682 00:39:07,126 --> 00:39:08,606 But it's not just digital. 683 00:39:08,606 --> 00:39:13,045 In the world of finance, everything must be a hard copy. 684 00:39:13,045 --> 00:39:16,048 And the attackers knew that as well. 685 00:39:20,618 --> 00:39:23,665 Every SWIFT transaction that takes place 686 00:39:23,665 --> 00:39:29,018 is immediately printed out locally in the Bangladeshi Bank. 687 00:39:29,018 --> 00:39:32,021 So that printer cannot be working 688 00:39:32,021 --> 00:39:34,719 when the heist is going on. 689 00:39:34,719 --> 00:39:37,592 The attackers hijacked all of those print jobs, 690 00:39:37,592 --> 00:39:40,464 replaced all of those print jobs with zeros 691 00:39:40,464 --> 00:39:43,598 so that nothing would come out of the printer. 692 00:39:43,598 --> 00:39:48,559 Now, the other 30 wire transactions sat around. 693 00:39:48,559 --> 00:39:51,910 And, ultimately, the attackers waited, 694 00:39:51,910 --> 00:39:54,304 and they waited... 695 00:39:54,304 --> 00:39:58,917 And they logged out at 3:59 a.m. Bangladesh time. 696 00:39:58,917 --> 00:40:01,485 Potentially, they thought that in New York, 697 00:40:01,485 --> 00:40:03,139 the business day ended at five p.m., 698 00:40:03,139 --> 00:40:04,967 and they weren't gonna hear any more. 699 00:40:04,967 --> 00:40:06,925 The New York Fed had actually stopped 700 00:40:06,925 --> 00:40:08,492 the rest of the transactions, 701 00:40:08,492 --> 00:40:11,974 because the address for the bank in the Philippines 702 00:40:11,974 --> 00:40:15,847 was on Jupiter Street. J-U-P-I-T-E-R. 703 00:40:15,847 --> 00:40:20,896 Right, now this is when the story gets really weird. 704 00:40:20,896 --> 00:40:24,900 In a totally unrelated incident two years earlier, 705 00:40:24,900 --> 00:40:28,512 we have a Greek shipping magnate, Dimitris Cambis, 706 00:40:28,512 --> 00:40:32,081 and he is buying eight tankers. 707 00:40:32,081 --> 00:40:35,301 What Dimitris knew, but not many other people, 708 00:40:35,301 --> 00:40:39,915 was that the money for these eight oil tankers 709 00:40:39,915 --> 00:40:41,960 came from Iran, 710 00:40:41,960 --> 00:40:45,703 and Iran was under US sanctions. 711 00:40:45,703 --> 00:40:48,401 Someone in the US caught wind of the fact 712 00:40:48,401 --> 00:40:51,753 that the Iranians were financing Mr Cambis. 713 00:40:51,753 --> 00:40:55,060 His company was put on the sanctions watch list, 714 00:40:55,060 --> 00:40:58,368 and his company was called Jupiter Seaways. 715 00:41:00,718 --> 00:41:02,633 It was just their bad luck 716 00:41:02,633 --> 00:41:05,244 that they designated the money transfers 717 00:41:05,244 --> 00:41:11,381 to go to the Jupiter branch of the Rizal Bank in Manila. 718 00:41:11,381 --> 00:41:15,254 As the transfers were being sent out from the New York Reserve 719 00:41:15,254 --> 00:41:17,039 to the Philippines, 720 00:41:17,039 --> 00:41:20,999 the Jupiter name was caught by the computer system. 721 00:41:20,999 --> 00:41:23,959 It halted these transactions. 722 00:41:23,959 --> 00:41:26,527 The Fed had to take a second look. 723 00:41:26,527 --> 00:41:28,833 They stopped it because they realised, 724 00:41:28,833 --> 00:41:31,227 "Wait, we have somewhere in the order 35 transactions 725 00:41:31,227 --> 00:41:33,272 coming from the Bank of Bangladesh, 726 00:41:33,272 --> 00:41:37,450 adding up to $1 billion? You know, this isn't usual." 727 00:41:37,450 --> 00:41:40,105 So they held them and sent a message back, 728 00:41:40,105 --> 00:41:41,933 asking for confirmation. 729 00:41:44,632 --> 00:41:47,809 Had the attackers waited just one more hour, 730 00:41:47,809 --> 00:41:50,638 they could have replied to them via the SWIFT system, 731 00:41:50,638 --> 00:41:53,249 saying these transactions were not a mistake. 732 00:41:53,249 --> 00:41:55,338 Ultimately, the Bank of Bangladesh 733 00:41:55,338 --> 00:41:57,296 might have lost much, much more. 734 00:41:57,296 --> 00:42:01,387 So far, they managed to get $81 million. 735 00:42:01,387 --> 00:42:05,478 But, boy, did they come close to hitting the jackpot. 736 00:42:05,478 --> 00:42:07,698 Just under $1 billion 737 00:42:07,698 --> 00:42:11,615 was very, very nearly stolen from this bank. 738 00:42:22,104 --> 00:42:25,237 The next day, the bank employees came in, 739 00:42:25,237 --> 00:42:26,630 and the printer wasn't working, 740 00:42:26,630 --> 00:42:28,980 because they installed their malicious code 741 00:42:28,980 --> 00:42:30,765 to prevent that from happening. 742 00:42:30,765 --> 00:42:32,680 Ultimately, those bank employees 743 00:42:32,680 --> 00:42:34,943 didn't get it fixed until February 6, 744 00:42:34,943 --> 00:42:36,597 which would have been a Sunday. 745 00:42:38,294 --> 00:42:41,340 When the printer started, all these messages came out, 746 00:42:41,340 --> 00:42:42,951 messages from the Fed asking, 747 00:42:42,951 --> 00:42:46,084 "What are these 30 transactions? Did you mean to make these?" 748 00:42:46,084 --> 00:42:48,347 That triggered the Bank of Bangladesh 749 00:42:48,347 --> 00:42:51,046 to realise something had gone wrong. 750 00:42:51,046 --> 00:42:53,701 It was very clear that they were in deep, 751 00:42:53,701 --> 00:42:57,400 such that the bank manager... This is the Bank of Bangladesh, 752 00:42:57,400 --> 00:43:00,577 the federal bank, the national bank of the country, 753 00:43:00,577 --> 00:43:04,146 did not notify the leaders, 754 00:43:04,146 --> 00:43:07,279 the government of Bangladesh. He kept it under wraps. 755 00:43:07,279 --> 00:43:10,587 He notified someone he knew who knew about security. 756 00:43:10,587 --> 00:43:12,415 "Get on a plane, get to Bangladesh. 757 00:43:12,415 --> 00:43:14,983 I need you to look at these computer systems." 758 00:43:20,510 --> 00:43:22,991 Initially, the governor and his whole team 759 00:43:22,991 --> 00:43:24,209 were quite perplexed. 760 00:43:24,209 --> 00:43:27,386 They didn't quite know what had happened. 761 00:43:27,386 --> 00:43:30,259 So they thought that some money had been routed 762 00:43:30,259 --> 00:43:33,088 to a wrong account; it would come back. 763 00:43:36,352 --> 00:43:39,964 I get this strange phone call from the governor's office 764 00:43:39,964 --> 00:43:42,750 asking me if I would drop everything 765 00:43:42,750 --> 00:43:45,317 and come to Dhaka, Bangladesh. 766 00:43:49,104 --> 00:43:51,280 So I assembled a team... 767 00:43:52,150 --> 00:43:53,935 and we flew down. 768 00:43:57,939 --> 00:44:02,639 When we arrived there, we met with the Bangladesh Bank team. 769 00:44:02,639 --> 00:44:06,164 And that's when I discovered all the horrifying details 770 00:44:06,164 --> 00:44:08,514 of what had actually happened. 771 00:44:12,431 --> 00:44:15,260 They decide, "Let's look at the CCTV. 772 00:44:15,260 --> 00:44:17,436 What's that going to tell us?" 773 00:44:17,436 --> 00:44:20,352 There were eight hours' worth of tapes 774 00:44:20,352 --> 00:44:23,181 that had to be gone through. 775 00:44:23,181 --> 00:44:26,097 Your gut instinct is, you have a malicious insider. 776 00:44:26,097 --> 00:44:27,751 A physical person had to go in, 777 00:44:27,751 --> 00:44:30,885 log into that machine and try to make these transfers, 778 00:44:30,885 --> 00:44:34,758 because this attack hadn't happened before. 779 00:44:34,758 --> 00:44:37,674 They had a SWIFT room, which was locked. 780 00:44:37,674 --> 00:44:39,981 And typically when the SWIFT operators 781 00:44:39,981 --> 00:44:43,767 needed to do something on SWIFT, they had to go into the room, 782 00:44:43,767 --> 00:44:47,510 sit in that chair and terminal, 783 00:44:47,510 --> 00:44:52,080 and there was only one shadow we could find. 784 00:44:52,080 --> 00:44:54,822 We eventually decided it was the person 785 00:44:54,822 --> 00:44:58,434 sweeping the place after hours. 786 00:45:00,784 --> 00:45:04,353 They were saying, "How could somebody process the transaction 787 00:45:04,353 --> 00:45:06,007 when there was nobody there?" 788 00:45:06,007 --> 00:45:10,620 I mean, even after the payment instructions had been sent, 789 00:45:10,620 --> 00:45:15,451 they had no idea for a very long time what was happening. 790 00:45:15,451 --> 00:45:19,455 They didn't think it was a hack. They had no traces of a hack. 791 00:45:19,455 --> 00:45:22,675 But they watched eight hours of that footage over that weekend 792 00:45:22,675 --> 00:45:25,678 and realised there was no one at that computer. 793 00:45:25,678 --> 00:45:26,984 Nothing. 794 00:45:26,984 --> 00:45:29,291 They had no idea that the Bank of Bangladesh 795 00:45:29,291 --> 00:45:31,902 had been breached by hackers. 796 00:45:31,902 --> 00:45:35,427 Only after we see these things happen over and over again, 797 00:45:35,427 --> 00:45:39,214 we realise that cyber has such capabilities. 798 00:45:44,088 --> 00:45:47,483 Bangladesh was a bit of a bombshell for all of us. 799 00:45:49,354 --> 00:45:52,140 Hackers and most cybercrime, 800 00:45:52,140 --> 00:45:54,098 it's like smash-and-grab crime. 801 00:45:54,098 --> 00:45:56,535 Quickly grab something and monetise it 802 00:45:56,535 --> 00:45:58,146 as swiftly as you can. 803 00:45:58,146 --> 00:46:01,279 You know, storm a bank with shotguns, blow a safe, 804 00:46:01,279 --> 00:46:04,021 fill some bags with cash. 805 00:46:04,021 --> 00:46:06,067 Cybercrime... 806 00:46:06,067 --> 00:46:09,461 It doesn't lend itself well to long conspiracy 807 00:46:09,461 --> 00:46:11,899 and lots of investigation and investment 808 00:46:11,899 --> 00:46:13,639 into understanding your target. 809 00:46:13,639 --> 00:46:15,946 I mean, you couldn't do Bangladesh 810 00:46:15,946 --> 00:46:19,080 unless you really understood the internal workings 811 00:46:19,080 --> 00:46:21,952 of the central bank and all the actors involved. 812 00:46:21,952 --> 00:46:24,650 That's not something that freelance hackers 813 00:46:24,650 --> 00:46:26,870 really are good at. 814 00:46:26,870 --> 00:46:29,960 That requires a level of investment into resources 815 00:46:29,960 --> 00:46:34,138 and frankly intelligence that has to be sustained. 816 00:46:34,138 --> 00:46:38,055 To organise something of that complexity 817 00:46:38,055 --> 00:46:40,884 and for it not to be noticed 818 00:46:40,884 --> 00:46:43,582 by the intelligence agencies of the state 819 00:46:43,582 --> 00:46:46,063 where that is being planned 820 00:46:46,063 --> 00:46:50,328 would be very, very difficult indeed. 821 00:46:50,328 --> 00:46:53,462 These hackers went in and looked at the zeros and ones 822 00:46:53,462 --> 00:46:55,768 in the software and reverse engineered it, 823 00:46:55,768 --> 00:46:58,423 turned it back into understandable code. 824 00:46:58,423 --> 00:47:00,948 That's not something that happens overnight. 825 00:47:00,948 --> 00:47:02,427 It was pretty clear 826 00:47:02,427 --> 00:47:04,908 that this isn't just normal criminals. 827 00:47:04,908 --> 00:47:07,171 This has to be something bigger. 828 00:47:10,087 --> 00:47:14,004 Once attackers have gained access to their target network, 829 00:47:14,004 --> 00:47:16,050 they want to stay undetected. 830 00:47:18,530 --> 00:47:21,011 And we've seen many interesting examples 831 00:47:21,011 --> 00:47:23,057 of how exactly this is done. 832 00:47:26,321 --> 00:47:27,844 What exactly happened 833 00:47:27,844 --> 00:47:30,238 at the Natanz nuclear facility last week? 834 00:47:30,238 --> 00:47:32,849 It's a question people in Iran around the world 835 00:47:32,849 --> 00:47:35,504 have been asking since a fire was reported 836 00:47:35,504 --> 00:47:38,899 at Iran's main uranium enrichment facility on Thursday. 837 00:47:38,899 --> 00:47:41,945 We're used to Trojans and viruses on the internet, 838 00:47:41,945 --> 00:47:43,381 but this is the first worm 839 00:47:43,381 --> 00:47:46,950 designed to damage the physical world. 840 00:47:46,950 --> 00:47:51,085 In 2010, attackers created a piece of malicious software 841 00:47:51,085 --> 00:47:55,393 that was designed to infiltrate Iran's nuclear programme, 842 00:47:55,393 --> 00:47:57,047 to get into their centrifuges, 843 00:47:57,047 --> 00:47:59,093 in particular, get onto computers 844 00:47:59,093 --> 00:48:00,964 that controlled their centrifuges. 845 00:48:00,964 --> 00:48:04,185 Iran says it will retaliate against any country 846 00:48:04,185 --> 00:48:06,927 that conducts cyber-attacks on its nuclear sites. 847 00:48:06,927 --> 00:48:09,581 The intention was to spin the centrifuges 848 00:48:09,581 --> 00:48:12,193 of Iran's nuclear capabilities out of control, 849 00:48:12,193 --> 00:48:14,195 make the centrifuges explode 850 00:48:14,195 --> 00:48:15,457 and push them ten years back 851 00:48:15,457 --> 00:48:17,415 in the uranium enrichment programme. 852 00:48:17,415 --> 00:48:18,764 As a piece of malware, 853 00:48:18,764 --> 00:48:21,811 it was 40 times larger than any piece of malware 854 00:48:21,811 --> 00:48:24,379 that had ever been encountered before. 855 00:48:24,379 --> 00:48:28,557 It would have taken the most advanced, 856 00:48:28,557 --> 00:48:31,038 brilliant computer engineers 857 00:48:31,038 --> 00:48:34,128 years and years of human working hours 858 00:48:34,128 --> 00:48:35,999 to produce this. 859 00:48:35,999 --> 00:48:38,132 Why was it so big? 860 00:48:38,132 --> 00:48:42,353 Because it needed to cover itself up. 861 00:48:44,877 --> 00:48:47,837 The attackers were actually recording 862 00:48:47,837 --> 00:48:52,363 the network traffic, the normal network traffic, 863 00:48:52,363 --> 00:48:55,105 and then playing it back to the sensors 864 00:48:55,105 --> 00:48:58,891 when they started modifying the operations of the centrifuges 865 00:48:58,891 --> 00:49:00,763 they were trying to break. 866 00:49:04,506 --> 00:49:06,943 This is the equivalent of, in the real world, 867 00:49:06,943 --> 00:49:09,946 recording the CCTV footage from a security camera 868 00:49:09,946 --> 00:49:12,209 and then playing it back to the camera 869 00:49:12,209 --> 00:49:14,168 when you're doing something bad. 870 00:49:14,168 --> 00:49:16,344 That's what Stuxnet was doing. 871 00:49:16,344 --> 00:49:18,085 And in the Bangladesh heist, 872 00:49:18,085 --> 00:49:20,261 they were doing something similar. 873 00:49:20,261 --> 00:49:22,915 Once they made their transactions, 874 00:49:22,915 --> 00:49:26,354 they wanted to make sure no one realised they had happened. 875 00:49:26,354 --> 00:49:29,096 They were actually falsifying the information 876 00:49:29,096 --> 00:49:30,619 about transactions. 877 00:49:30,619 --> 00:49:33,448 The recording of the transactions were being done 878 00:49:33,448 --> 00:49:35,015 both in electronic format, 879 00:49:35,015 --> 00:49:38,583 but also falsifying the data being sent to the printers, 880 00:49:38,583 --> 00:49:41,064 which actually looked like everything was fine. 881 00:49:41,064 --> 00:49:44,285 So you find out how you're being tracked, 882 00:49:44,285 --> 00:49:47,027 and then you try to cover your tracks. 883 00:49:47,027 --> 00:49:48,289 Stuxnet did that. 884 00:49:48,289 --> 00:49:50,813 The Bangladeshi heist did it as well. 885 00:49:53,250 --> 00:49:56,993 Once that money arrived in the Philippines, 886 00:49:56,993 --> 00:50:00,562 they needed to change that money into cold, hard cash. 887 00:50:00,562 --> 00:50:02,955 Right now, it's still in digital ones and zeros, 888 00:50:02,955 --> 00:50:05,480 just a transaction that said the money has moved 889 00:50:05,480 --> 00:50:06,872 from the Bank of Bangladesh 890 00:50:06,872 --> 00:50:10,137 to these accounts at RCBC. Four accounts. 891 00:50:10,137 --> 00:50:13,575 The thieves had to get it out of the Philippines, 892 00:50:13,575 --> 00:50:15,664 make it disappear. 893 00:50:15,664 --> 00:50:18,493 So how were they going to do that? 894 00:50:18,493 --> 00:50:20,886 There is one industry in the Philippines 895 00:50:20,886 --> 00:50:23,280 where there is absolutely no oversight, 896 00:50:23,280 --> 00:50:27,284 where it's a cash-only business. There are no records, no names. 897 00:50:27,284 --> 00:50:29,156 That is the casino industry. 898 00:50:41,168 --> 00:50:43,300 When we talk about laundering funds, 899 00:50:43,300 --> 00:50:45,998 we're talking about taking dirty, illicit funds, 900 00:50:45,998 --> 00:50:49,524 running them through a legal business 901 00:50:49,524 --> 00:50:52,092 so that if I came to you and said, 902 00:50:52,092 --> 00:50:55,443 "Hey, where'd you get that $81 million?", 903 00:50:55,443 --> 00:51:00,361 you could have a paper trail to show that you won it back. 904 00:51:00,361 --> 00:51:03,146 The hard part is not stealing the money. 905 00:51:03,146 --> 00:51:06,671 The hard part is moving the money into a form you can use 906 00:51:06,671 --> 00:51:08,195 without getting caught. 907 00:51:10,284 --> 00:51:15,245 And one method we've seen for quite a while is gambling. 908 00:51:15,245 --> 00:51:17,117 It was very clear that, 909 00:51:17,117 --> 00:51:20,294 if, at all, there was a place for you to do that, 910 00:51:20,294 --> 00:51:22,209 it would have been the Philippines, 911 00:51:22,209 --> 00:51:25,081 because the casinos are not regulated at all. 912 00:51:27,214 --> 00:51:30,347 It's like a lot of high-flying gamblers 913 00:51:30,347 --> 00:51:33,350 who'd kind of fly to Manila, 914 00:51:33,350 --> 00:51:37,093 crowd these numerous casinos in Manila, 915 00:51:37,093 --> 00:51:38,442 lots of money coming in. 916 00:51:38,442 --> 00:51:41,358 People don't question that kind of money. 917 00:51:41,358 --> 00:51:42,838 I mean, you know... 918 00:51:42,838 --> 00:51:44,796 "Well, as long as it's coming to us, 919 00:51:44,796 --> 00:51:47,930 we don't bother too much about where it is coming from." 920 00:51:49,366 --> 00:51:52,326 The thieves knew if they could get that money 921 00:51:52,326 --> 00:51:55,590 into the casinos, it would essentially be lost. 922 00:51:56,852 --> 00:51:58,158 What happened was, 923 00:51:58,158 --> 00:52:00,464 the manager from the Philippines bank, 924 00:52:00,464 --> 00:52:03,424 she was the one who'd opened those four accounts 925 00:52:03,424 --> 00:52:05,600 using fraudulent IDs. 926 00:52:05,600 --> 00:52:09,995 She got the money withdrawn from the bank in the Philippines. 927 00:52:11,606 --> 00:52:12,998 From there, it started to go 928 00:52:12,998 --> 00:52:14,609 through something called Philrem. 929 00:52:14,609 --> 00:52:18,047 It's a bit like a Western Union in the Philippines, 930 00:52:18,047 --> 00:52:20,223 transferred into pesos. 931 00:52:20,223 --> 00:52:22,530 I don't know if you've ever used 932 00:52:22,530 --> 00:52:24,053 Philippine pesos before, 933 00:52:24,053 --> 00:52:28,100 but that's one hell of a lot of pesos, $22 million. 934 00:52:28,100 --> 00:52:33,497 In fact, it's over one million banknotes. 935 00:52:33,497 --> 00:52:35,673 They actually had to request that cash 936 00:52:35,673 --> 00:52:39,024 to come from a sister branch location, 937 00:52:39,024 --> 00:52:40,896 that arrived in boxes. 938 00:52:40,896 --> 00:52:44,465 The bank manager was seen by one of the other bank employees 939 00:52:44,465 --> 00:52:47,642 collecting those boxes and literally going outside 940 00:52:47,642 --> 00:52:49,905 and loading them up into a Lexus. 941 00:52:51,036 --> 00:52:53,387 And that money was driven away. 942 00:52:59,828 --> 00:53:03,745 So, we're talking stacks of bills carried in vans 943 00:53:03,745 --> 00:53:07,270 to the Solaire Casino right by the airport. 944 00:53:07,270 --> 00:53:10,491 It allows the Chinese gamblers to come off the plane. 945 00:53:10,491 --> 00:53:13,363 Five minutes, they're on the floor playing baccarat. 946 00:53:16,453 --> 00:53:20,022 The money goes to this place. It's wheeled in wheelbarrows 947 00:53:20,022 --> 00:53:24,156 across the casino floor up to this guarded escalator. 948 00:53:35,298 --> 00:53:38,258 There's so much physical cash involved, 949 00:53:38,258 --> 00:53:41,348 they've enlisted their own crew of gamblers 950 00:53:41,348 --> 00:53:44,873 to launder the stolen funds. 951 00:53:44,873 --> 00:53:47,136 And they just played baccarat, 952 00:53:47,136 --> 00:53:49,660 all day long. 953 00:53:49,660 --> 00:53:51,183 They had individuals, 954 00:53:51,183 --> 00:53:54,274 mostly appeared to be Chinese nationals that they had, 955 00:53:54,274 --> 00:53:57,581 I assume, hired to take those funds and launder them. 956 00:53:57,581 --> 00:54:01,542 You change that cash into casino chips, 957 00:54:01,542 --> 00:54:03,195 play a few games, 958 00:54:03,195 --> 00:54:04,980 cash in the chips. 959 00:54:04,980 --> 00:54:10,638 And when you get that cash back, that is then laundered. 960 00:54:10,638 --> 00:54:13,162 And this wouldn't have been unusual. 961 00:54:13,162 --> 00:54:15,556 This was the Chinese lunar week. 962 00:54:15,556 --> 00:54:18,341 That would've been very common for individuals, 963 00:54:18,341 --> 00:54:20,604 high rollers, to come into the Philippines 964 00:54:20,604 --> 00:54:22,911 and play at the casinos during that time. 965 00:54:22,911 --> 00:54:26,654 Spending $22 million in a casino over a weekend, 966 00:54:26,654 --> 00:54:28,612 let's face it, could be fun. 967 00:54:32,921 --> 00:54:36,751 Doing this story and trying to figure out 968 00:54:36,751 --> 00:54:40,450 where in history to sort of place this thing. 969 00:54:40,450 --> 00:54:43,366 Was this the biggest heist of all time? 970 00:54:43,366 --> 00:54:47,370 No, but it certainly looked to be the biggest cyber heist 971 00:54:47,370 --> 00:54:50,286 of a bank in history. 972 00:54:50,286 --> 00:54:54,421 And over the next few days, I just remember 973 00:54:54,421 --> 00:54:58,468 calling up my sources at Symantec 974 00:54:58,468 --> 00:55:01,036 and a couple other cybersecurity firms 975 00:55:01,036 --> 00:55:04,300 and getting in touch with a guy named Eric Chien. 976 00:55:06,128 --> 00:55:09,174 We have all kinds of sensors sitting on networks 977 00:55:09,174 --> 00:55:10,828 and computers all over the world. 978 00:55:10,828 --> 00:55:14,179 Any time some sort of cyber criminal, some attacker, 979 00:55:14,179 --> 00:55:18,096 is trying to breach a computer, they're leaving traces behind. 980 00:55:19,620 --> 00:55:23,580 Every attack has a signature. 981 00:55:23,580 --> 00:55:25,147 If you look at it long enough, 982 00:55:25,147 --> 00:55:27,497 if you study it, if you work it long enough, 983 00:55:27,497 --> 00:55:29,760 you can understand the way they do things. 984 00:55:29,760 --> 00:55:31,327 The way they state something, 985 00:55:31,327 --> 00:55:34,504 the way they code a particular way, 986 00:55:34,504 --> 00:55:39,944 the methodology of the attack, the step-by-step approaches. 987 00:55:39,944 --> 00:55:42,947 It might be considered like Sherlock Holmesian 988 00:55:42,947 --> 00:55:44,427 to come up with this idea. 989 00:55:44,427 --> 00:55:46,821 "Because he walks with a gait this way, 990 00:55:46,821 --> 00:55:48,997 and he does this..." But it is true. 991 00:55:48,997 --> 00:55:53,305 We see those signatures. We see those patterns. 992 00:55:54,263 --> 00:55:56,047 What we discovered was, 993 00:55:56,047 --> 00:55:59,486 by looking at the artefacts that these attackers had used, 994 00:55:59,486 --> 00:56:01,923 the malicious binaries they had used, 995 00:56:01,923 --> 00:56:03,228 the code inside of it, 996 00:56:03,228 --> 00:56:05,796 as well as the email accounts that they used 997 00:56:05,796 --> 00:56:07,972 to send the initial spear-phishing messages, 998 00:56:07,972 --> 00:56:12,542 we were able to map this back to an attacker back in 2014. 999 00:56:15,458 --> 00:56:18,548 Sony Pictures is mainly housed in Culver City. 1000 00:56:18,548 --> 00:56:20,550 And in 2014, 1001 00:56:20,550 --> 00:56:24,641 Sony Pictures went down, which was unheard of. 1002 00:56:24,641 --> 00:56:26,121 On that day in November, 1003 00:56:26,121 --> 00:56:28,602 people would have come in, tried to swipe their badge 1004 00:56:28,602 --> 00:56:30,821 and not even be able to get into the office. 1005 00:56:30,821 --> 00:56:32,823 They get into the building finally 1006 00:56:32,823 --> 00:56:36,000 and then they discover that nothing else is working either. 1007 00:56:36,000 --> 00:56:40,048 Printers aren't working, computers aren't working. 1008 00:56:40,048 --> 00:56:43,268 People who had laptops connected to the network 1009 00:56:43,268 --> 00:56:45,009 would have immediately seen 1010 00:56:45,009 --> 00:56:47,969 skulls and crossbones show up on their screens, 1011 00:56:47,969 --> 00:56:51,059 scrolling with scary Halloween-type music 1012 00:56:51,059 --> 00:56:52,539 playing in the background. 1013 00:56:52,539 --> 00:56:55,759 And it said, "Hacked by the GOP." 1014 00:56:55,759 --> 00:56:59,023 Guardians of the Peace. 1015 00:56:59,023 --> 00:57:02,070 A mysterious crew of hackers, 1016 00:57:02,070 --> 00:57:06,030 also known as the Lazarus Group. 1017 00:57:06,030 --> 00:57:08,163 We'd call them the Lazarus Group. 1018 00:57:08,163 --> 00:57:09,294 They've been responsible 1019 00:57:09,294 --> 00:57:11,166 for many, many attacks over the years. 1020 00:57:11,166 --> 00:57:13,385 You know, political statements 1021 00:57:13,385 --> 00:57:15,997 and bringing down some websites in South Korea 1022 00:57:15,997 --> 00:57:20,349 and also the White House in the United States and the Pentagon. 1023 00:57:20,349 --> 00:57:23,918 Now, at this point, the penny has dropped. 1024 00:57:23,918 --> 00:57:26,050 Sony has been hacked. 1025 00:57:26,050 --> 00:57:28,705 The hack attack has had a devastating effect 1026 00:57:28,705 --> 00:57:31,534 on the entertainment company, with an avalanche of leaks 1027 00:57:31,534 --> 00:57:34,232 revealing personal information of employees 1028 00:57:34,232 --> 00:57:37,540 and salacious email exchanges of A-list celebrities. 1029 00:57:37,540 --> 00:57:40,543 They ultimately compromised Sony Pictures Network, 1030 00:57:40,543 --> 00:57:43,894 got inside and wiped 10,000 computers. 1031 00:57:43,894 --> 00:57:45,635 On top of that, they actually stole 1032 00:57:45,635 --> 00:57:48,725 all kinds of documents and emails from Sony Pictures. 1033 00:57:48,725 --> 00:57:50,858 The hack on Sony Pictures 1034 00:57:50,858 --> 00:57:53,425 is rocking Hollywood's very foundation; 1035 00:57:53,425 --> 00:57:56,080 the industry, warts and all, exposed. 1036 00:57:56,080 --> 00:57:59,301 Initially, we had no link between the SWIFT attack 1037 00:57:59,301 --> 00:58:01,999 and the Sony Pictures attack. 1038 00:58:01,999 --> 00:58:04,524 But when we were looking at the malware, 1039 00:58:04,524 --> 00:58:06,438 we found an interesting detail. 1040 00:58:06,438 --> 00:58:09,616 There was a component called an indexing manager, 1041 00:58:09,616 --> 00:58:13,054 which was saving the logs during the SWIFT attack 1042 00:58:13,054 --> 00:58:15,535 into an encrypted file. 1043 00:58:15,535 --> 00:58:18,581 The file was encrypted with a really long key, 1044 00:58:18,581 --> 00:58:22,106 and when we just googled for the key, 1045 00:58:22,106 --> 00:58:25,327 we found that the same key, exactly, 1046 00:58:25,327 --> 00:58:30,637 was used 18 months earlier in the Sony Pictures attack. 1047 00:58:31,812 --> 00:58:34,162 This was the moment we realised 1048 00:58:34,162 --> 00:58:36,120 the Bangladeshi SWIFT attack 1049 00:58:36,120 --> 00:58:39,776 was probably perpetrated by the Lazarus Group. 1050 00:58:40,734 --> 00:58:42,344 So, who is Lazarus? 1051 00:58:42,344 --> 00:58:43,824 Well, from what we know, 1052 00:58:43,824 --> 00:58:46,783 they're a trans-global criminal organisation 1053 00:58:46,783 --> 00:58:51,614 that's been trained at a nation-state level. 1054 00:58:51,614 --> 00:58:55,487 The nation states really started coming in on a criminal side... 1055 00:58:57,098 --> 00:58:59,274 when sanctions started. 1056 00:58:59,274 --> 00:59:02,320 When we start limiting the capability of a nation 1057 00:59:02,320 --> 00:59:05,454 to get cash, and we up the methodology 1058 00:59:05,454 --> 00:59:08,022 to monitor the way they're getting cash, 1059 00:59:08,022 --> 00:59:11,068 they turn to different approaches. 1060 00:59:11,068 --> 00:59:13,941 So if you're a country that's under sanction 1061 00:59:13,941 --> 00:59:17,205 and your ability to get funds has been compromised, 1062 00:59:17,205 --> 00:59:20,164 you may be motivated to go to the Lazarus Group 1063 00:59:20,164 --> 00:59:23,472 to fix your problem. 1064 00:59:23,472 --> 00:59:25,692 It's like a job for them. It is a job for them. 1065 00:59:25,692 --> 00:59:27,737 They get recruited. It's a nine-to-five job. 1066 00:59:27,737 --> 00:59:31,001 They come in, and each of them has their specialties. 1067 00:59:31,001 --> 00:59:32,394 They have managers, 1068 00:59:32,394 --> 00:59:35,266 they have targets that they're told to go after. 1069 00:59:35,266 --> 00:59:37,399 When you talk about nation states, 1070 00:59:37,399 --> 00:59:39,662 obviously, for your average nation state, 1071 00:59:39,662 --> 00:59:42,970 most cyber offensive campaigns are under the military. 1072 00:59:42,970 --> 00:59:45,755 It's very similar to how a military organisation 1073 00:59:45,755 --> 00:59:49,063 would be organised for their cyber offensive campaigns. 1074 00:59:49,063 --> 00:59:51,500 There is a hotel, for example, in China 1075 00:59:51,500 --> 00:59:53,633 where they've taken over multiple floors 1076 00:59:53,633 --> 00:59:55,678 where they essentially have dormitories. 1077 00:59:55,678 --> 00:59:59,116 They go to sleep in that hotel, they eat in that hotel, 1078 00:59:59,116 --> 01:00:01,466 and they don't come out of that hotel. 1079 01:00:01,466 --> 01:00:04,121 They just move from one room to another, 1080 01:00:04,121 --> 01:00:05,906 hack all day and night. 1081 01:00:08,082 --> 01:00:10,693 And the Lazarus Group is thought to be made up 1082 01:00:10,693 --> 01:00:13,435 of these state-trained hackers. 1083 01:00:18,788 --> 01:00:21,269 What's amazing about cyber, 1084 01:00:21,269 --> 01:00:23,837 when you talk about nation states, 1085 01:00:23,837 --> 01:00:27,362 is the cost to entry is extremely low. 1086 01:00:27,362 --> 01:00:29,756 We have nation states who have been 1087 01:00:29,756 --> 01:00:33,237 trying to create nuclear missiles, 1088 01:00:33,237 --> 01:00:35,109 tried to create a nuclear programme. 1089 01:00:35,109 --> 01:00:37,024 Places like Iran, for example. 1090 01:00:37,024 --> 01:00:41,550 The dollars it costs to do so, it's extraordinary. 1091 01:00:41,550 --> 01:00:44,727 But if you want to build a cyber offensive campaign, 1092 01:00:44,727 --> 01:00:47,034 you get two, three, four, five guys 1093 01:00:47,034 --> 01:00:50,515 and potentially threaten to disable the power grid 1094 01:00:50,515 --> 01:00:52,082 in some country. 1095 01:00:52,082 --> 01:00:54,519 When you talk about trying to rob a bank 1096 01:00:54,519 --> 01:00:57,218 or produce illicit drugs and sell them, 1097 01:00:57,218 --> 01:00:59,873 the amount of people required on the ground, 1098 01:00:59,873 --> 01:01:01,309 the amount of connections, 1099 01:01:01,309 --> 01:01:03,485 and for the dollars that you would receive, 1100 01:01:03,485 --> 01:01:04,965 is nothing compared to, 1101 01:01:04,965 --> 01:01:07,489 "Let's get three guys, break into a bank 1102 01:01:07,489 --> 01:01:10,710 and potentially transfer $1 billion." 1103 01:01:16,106 --> 01:01:20,545 Back in the VIP room of the Solaire Casino in Manila, 1104 01:01:20,545 --> 01:01:24,985 the money-laundering operation is in full flight. 1105 01:01:26,726 --> 01:01:29,772 They just spend hours upon hours gambling away, 1106 01:01:29,772 --> 01:01:31,339 collecting chips. 1107 01:01:31,339 --> 01:01:33,776 They transfer those chips back into cold, hard currency. 1108 01:01:33,776 --> 01:01:36,736 You put a hundred gamblers into the VIP lounge 1109 01:01:36,736 --> 01:01:40,827 playing cash, so maybe the house has a one or two percent margin. 1110 01:01:40,827 --> 01:01:43,786 But all the rest is untraceable money that they walk out with. 1111 01:01:43,786 --> 01:01:46,049 What's interesting about these individuals, 1112 01:01:46,049 --> 01:01:47,747 they weren't interested in winning. 1113 01:01:47,747 --> 01:01:50,227 They were just interested in playing. 1114 01:01:50,227 --> 01:01:51,663 If you lose the money, 1115 01:01:51,663 --> 01:01:53,448 the money doesn't go to the casino, 1116 01:01:53,448 --> 01:01:54,971 it goes to the other players. 1117 01:01:54,971 --> 01:01:58,453 So you can play the table where the other players are, 1118 01:01:58,453 --> 01:01:59,889 your partners. 1119 01:01:59,889 --> 01:02:02,239 Then you can lose the dirty money on purpose, 1120 01:02:02,239 --> 01:02:04,067 moving the money to your partners. 1121 01:02:04,067 --> 01:02:05,721 Now it's cashed out. 1122 01:02:05,721 --> 01:02:09,116 Now it looks like it came from a great win in a poker tournament 1123 01:02:09,116 --> 01:02:11,683 instead of being stolen from somewhere. 1124 01:02:11,683 --> 01:02:14,556 So, casinos are a good way of laundering money. 1125 01:02:14,556 --> 01:02:17,385 Real-world criminals have done that for decades. 1126 01:02:17,385 --> 01:02:20,649 Online criminals are doing it today. 1127 01:02:20,649 --> 01:02:23,783 They played for a whole week, that whole lunar week, 1128 01:02:23,783 --> 01:02:25,741 every day, like workers, 1129 01:02:25,741 --> 01:02:28,352 nine to five, essentially, in that casino. 1130 01:02:33,401 --> 01:02:36,404 Finally, the Chinese New Year celebrations 1131 01:02:36,404 --> 01:02:37,927 have come to an end. 1132 01:02:37,927 --> 01:02:42,323 The staff at the RCBC bank in Manila are back at work. 1133 01:02:44,412 --> 01:02:47,371 Now, the Bangladesh Bank is still desperately trying 1134 01:02:47,371 --> 01:02:49,460 to put a stop on any further withdrawals 1135 01:02:49,460 --> 01:02:52,202 from those accounts in the Bank of the Philippines. 1136 01:02:52,202 --> 01:02:54,552 They've lost $22 million already, 1137 01:02:54,552 --> 01:02:58,861 but there's still $59 million left that they can save. 1138 01:02:58,861 --> 01:03:01,908 They're firing message after message to Manila, 1139 01:03:01,908 --> 01:03:04,780 "Hold all transactions." 1140 01:03:04,780 --> 01:03:07,130 In the Philippines, they got those messages. 1141 01:03:07,130 --> 01:03:08,610 They got those messages 1142 01:03:08,610 --> 01:03:10,873 as part of many other transaction messages they got 1143 01:03:10,873 --> 01:03:12,744 that were sitting in a printer queue 1144 01:03:12,744 --> 01:03:14,094 at the bottom of the stack, 1145 01:03:14,094 --> 01:03:16,400 and ultimately, they never saw those messages. 1146 01:03:16,400 --> 01:03:20,840 At this point, the fence gets in touch with the manager 1147 01:03:20,840 --> 01:03:22,842 of the bank in Jupiter Street. 1148 01:03:22,842 --> 01:03:26,715 "Can you please authorise the transfer of $59 million?" 1149 01:03:26,715 --> 01:03:29,892 She authorises that $59 million. 1150 01:03:29,892 --> 01:03:34,157 It goes straight to the Solaire Casino. 1151 01:03:34,157 --> 01:03:36,072 More money laundering. 1152 01:03:37,944 --> 01:03:39,467 Five hours later, 1153 01:03:39,467 --> 01:03:44,080 after increasingly urgent calls from the Bangladesh Bank, 1154 01:03:44,080 --> 01:03:50,043 the manager finally puts a block on all of the accounts. 1155 01:03:50,043 --> 01:03:52,872 But, really, it's too late. 1156 01:03:52,872 --> 01:03:54,874 The money's gone. 1157 01:03:59,182 --> 01:04:02,316 It's incredible when you think what the Lazarus Group 1158 01:04:02,316 --> 01:04:05,928 was able to pull off with just some ones and zeros. 1159 01:04:05,928 --> 01:04:07,799 They guide their bespoke malware 1160 01:04:07,799 --> 01:04:10,063 into the computer network of a bank, 1161 01:04:10,063 --> 01:04:11,760 and then a year later, 1162 01:04:11,760 --> 01:04:15,068 they're literally washing $100 million 1163 01:04:15,068 --> 01:04:17,374 through a casino in the Philippines. 1164 01:04:17,374 --> 01:04:19,899 It's astonishing. 1165 01:04:19,899 --> 01:04:22,379 But what's really, really scary 1166 01:04:22,379 --> 01:04:25,730 is what happened just a year later. 1167 01:04:27,471 --> 01:04:29,604 Now back to the major cyber-attack, 1168 01:04:29,604 --> 01:04:34,130 the ransomware crippling 200,000 computers in 150 countries. 1169 01:04:34,130 --> 01:04:37,742 The thousands of targets all received this ominous message 1170 01:04:37,742 --> 01:04:39,788 in English on their screens: 1171 01:04:49,319 --> 01:04:54,194 Everyone was basically locked up with this malware 1172 01:04:54,194 --> 01:04:58,372 that we discovered had been launched by the same attackers 1173 01:04:58,372 --> 01:05:01,201 as the Central Bank of Bangladesh. 1174 01:05:01,201 --> 01:05:03,420 So they design this malware, 1175 01:05:03,420 --> 01:05:06,032 and then they lose control of it entirely. 1176 01:05:06,032 --> 01:05:08,164 And that caused chaos. 1177 01:05:08,164 --> 01:05:11,428 Ambulances were diverted to other hospitals. 1178 01:05:11,428 --> 01:05:14,866 Patients were turned away, their operations cancelled. 1179 01:05:14,866 --> 01:05:17,739 You know, the first sign that something 1180 01:05:17,739 --> 01:05:22,004 was seriously wrong was when hospitals in the United Kingdom 1181 01:05:22,004 --> 01:05:24,572 started telling patients, "Don't come." 1182 01:05:24,572 --> 01:05:28,576 That their systems had been locked up with ransomware. 1183 01:05:28,576 --> 01:05:33,668 It's unclear if it was accidentally released too early, 1184 01:05:33,668 --> 01:05:35,061 it appears so, 1185 01:05:35,061 --> 01:05:37,933 or if it was designed not to work 1186 01:05:37,933 --> 01:05:41,284 and just begin wiping computers, because it didn't matter. 1187 01:05:41,284 --> 01:05:44,200 Even if you paid them, you would not get the decryption key. 1188 01:05:44,200 --> 01:05:46,028 They didn't have the decryption key. 1189 01:05:46,028 --> 01:05:48,161 They couldn't decrypt your files anymore. 1190 01:05:48,161 --> 01:05:50,859 Japan, Turkey and the Philippines 1191 01:05:50,859 --> 01:05:54,776 were also affected. In the US, FedEx was hit. 1192 01:05:54,776 --> 01:05:59,737 That virulent virus spiralled out of control. 1193 01:05:59,737 --> 01:06:04,090 In Germany, it attacked the network of the Deutsche Bahn, 1194 01:06:04,090 --> 01:06:05,482 German Railway. 1195 01:06:05,482 --> 01:06:09,443 In Spain, WannaCry hit Telefonica, 1196 01:06:09,443 --> 01:06:12,402 the biggest telecommunications company. 1197 01:06:12,402 --> 01:06:16,580 It hit the banking systems, and ATMs didn't work. 1198 01:06:16,580 --> 01:06:21,890 This thing was hitting companies in something like 150 countries. 1199 01:06:21,890 --> 01:06:23,631 Other targets in the US 1200 01:06:23,631 --> 01:06:26,068 include Merck Pharmaceutical in New Jersey. 1201 01:06:26,068 --> 01:06:28,853 Even the company that makes Oreo cookies may have been hit. 1202 01:06:28,853 --> 01:06:32,988 So, you had the health service, you had transport, 1203 01:06:32,988 --> 01:06:36,513 you had communications, you had the finance system, 1204 01:06:36,513 --> 01:06:37,949 and you had governance 1205 01:06:37,949 --> 01:06:42,867 all with one tiny piece of crappy malware, WannaCry. 1206 01:06:42,867 --> 01:06:44,173 In other attacks, 1207 01:06:44,173 --> 01:06:46,045 they have to send you a spear-phishing email, 1208 01:06:46,045 --> 01:06:48,090 trick you into double-clicking on an attachment. 1209 01:06:48,090 --> 01:06:50,223 In this case, your computer just had to be on, 1210 01:06:50,223 --> 01:06:51,528 connected to the internet, 1211 01:06:51,528 --> 01:06:54,096 and it would have got infected by WannaCry. 1212 01:06:54,096 --> 01:06:57,317 It succeeded because the crappy malware 1213 01:06:57,317 --> 01:07:00,450 was being infiltrated into the systems 1214 01:07:00,450 --> 01:07:03,236 on the back of a much more powerful tool 1215 01:07:03,236 --> 01:07:04,846 called EternalBlue, 1216 01:07:04,846 --> 01:07:08,502 which had been developed by the National Security Agency 1217 01:07:08,502 --> 01:07:10,460 in the United States. 1218 01:07:10,460 --> 01:07:12,680 The thing the NSA never wanted to talk about 1219 01:07:12,680 --> 01:07:15,683 was the fact that it was travelling on a digital missile 1220 01:07:15,683 --> 01:07:19,469 that had been built at its own intelligence agency. 1221 01:07:19,469 --> 01:07:22,603 They repurposed something created by the US government, 1222 01:07:22,603 --> 01:07:24,213 leaked by the Russian government, 1223 01:07:24,213 --> 01:07:26,868 put it into their ransomware that allowed it to spread 1224 01:07:26,868 --> 01:07:30,785 all over the world, any computer on at that time. 1225 01:07:30,785 --> 01:07:34,049 So one crappy piece of malware 1226 01:07:34,049 --> 01:07:36,921 can hit every single aspect 1227 01:07:36,921 --> 01:07:39,185 of the critical national infrastructure 1228 01:07:39,185 --> 01:07:43,014 within the space of about ten days 1229 01:07:43,014 --> 01:07:44,929 in different countries. 1230 01:07:57,551 --> 01:08:00,771 Eventually, there's a court case after about a month. 1231 01:08:00,771 --> 01:08:03,644 There's a court case in Manila. 1232 01:08:03,644 --> 01:08:06,951 Ultimately, the bank manager didn't want anyone to find out. 1233 01:08:06,951 --> 01:08:08,431 But when he finally got in touch 1234 01:08:08,431 --> 01:08:10,868 with the Bank of the Philippines, they said, 1235 01:08:10,868 --> 01:08:12,870 "If you need this money returned, 1236 01:08:12,870 --> 01:08:15,743 you need to get a court order." So he files a court order, 1237 01:08:15,743 --> 01:08:18,049 but court orders are public in the Philippines, 1238 01:08:18,049 --> 01:08:19,616 like in many other countries. 1239 01:08:19,616 --> 01:08:22,619 A reporter spots it and realised that this has happened, 1240 01:08:22,619 --> 01:08:25,144 publishes it in a newspaper, and it all comes out. 1241 01:08:25,144 --> 01:08:28,059 The $81 million money-laundering scandal 1242 01:08:28,059 --> 01:08:31,715 is now considered one of the biggest bank heists in Asia. 1243 01:08:31,715 --> 01:08:33,848 But how exactly did thieves steal 1244 01:08:33,848 --> 01:08:36,024 such a huge amount of money? 1245 01:08:36,024 --> 01:08:37,504 Not just known in the Philippines 1246 01:08:37,504 --> 01:08:38,722 and the Bank of Bangladesh, 1247 01:08:38,722 --> 01:08:40,420 when the Bangladesh government finds out 1248 01:08:40,420 --> 01:08:42,944 the bank manager has been doing this behind the scenes, 1249 01:08:42,944 --> 01:08:44,380 but the whole world finds out. 1250 01:08:44,380 --> 01:08:46,817 And ultimately, the Bangladesh Bank 1251 01:08:46,817 --> 01:08:48,906 needs to get assistance from the FBI. 1252 01:08:48,906 --> 01:08:52,214 The New York Fed is involved. The United States is involved. 1253 01:08:52,214 --> 01:08:54,347 This becomes a whole worldwide issue 1254 01:08:54,347 --> 01:08:57,263 and begins to ripple across the financial industry 1255 01:08:57,263 --> 01:08:58,786 that this was even possible. 1256 01:08:58,786 --> 01:09:00,570 Experts believe that hackers 1257 01:09:00,570 --> 01:09:04,226 were able to break into the New York Federal Reserve's 1258 01:09:04,226 --> 01:09:06,446 special account for Bangladesh, 1259 01:09:06,446 --> 01:09:09,797 getting away with $81 million. 1260 01:09:09,797 --> 01:09:13,279 Now, Bangladesh's Central Bank governor, Atiur Rahman, 1261 01:09:13,279 --> 01:09:16,978 has resigned after hackers stole tens of millions of dollars 1262 01:09:16,978 --> 01:09:19,241 from the nation's foreign reserves. 1263 01:09:19,241 --> 01:09:23,202 The bank was criticised for its handling of the breach... 1264 01:09:23,202 --> 01:09:26,205 The governor was an excellent central banker. 1265 01:09:26,205 --> 01:09:27,945 I have a lot of respect for him. 1266 01:09:27,945 --> 01:09:32,341 He was deemed one of the top bankers by the Asia MoneyWeek. 1267 01:09:32,341 --> 01:09:34,169 And poor fellow, that time, 1268 01:09:34,169 --> 01:09:36,780 he was faced with this sort of scenario 1269 01:09:36,780 --> 01:09:39,870 which he honestly didn't understand. 1270 01:09:39,870 --> 01:09:42,830 He had really pushed the financial system 1271 01:09:42,830 --> 01:09:45,572 in Bangladesh into the 21st century. 1272 01:09:45,572 --> 01:09:48,618 He had to essentially fall on his sword and resign 1273 01:09:48,618 --> 01:09:51,447 in disgrace, and his career was ruined. 1274 01:09:51,447 --> 01:09:54,233 Many others at the bank had to resign as well. 1275 01:09:54,233 --> 01:09:57,801 An emotional Maia Deguito, the manager of the RCBC branch 1276 01:09:57,801 --> 01:10:01,196 in Jupiter Street in Makati, insists she is innocent 1277 01:10:01,196 --> 01:10:02,806 in the face of accusations 1278 01:10:02,806 --> 01:10:05,679 she is involved in the money-laundering scheme. 1279 01:10:05,679 --> 01:10:08,290 So far, only the branch manager 1280 01:10:08,290 --> 01:10:11,511 has been charged by the Anti-Money Laundering Council. 1281 01:10:11,511 --> 01:10:14,427 One of the great injustices of this whole scandal 1282 01:10:14,427 --> 01:10:17,386 is that the only person who got convicted of anything 1283 01:10:17,386 --> 01:10:18,996 was Maia Deguito, 1284 01:10:18,996 --> 01:10:22,739 and she was just the mid-level branch manager of the RCBC, 1285 01:10:22,739 --> 01:10:26,917 the bank in the Philippines that received the actual funds. 1286 01:10:26,917 --> 01:10:28,223 Typical, isn't it? 1287 01:10:28,223 --> 01:10:31,008 A crime that was conceived and carried out 1288 01:10:31,008 --> 01:10:32,445 by a whole bunch of men, 1289 01:10:32,445 --> 01:10:35,578 and the only person who gets done for it is a woman 1290 01:10:35,578 --> 01:10:38,581 who probably wasn't that guilty in the first place. 1291 01:10:38,581 --> 01:10:41,845 But she received a sentence of 56 years in jail 1292 01:10:41,845 --> 01:10:45,022 and a fine of $109 million, 1293 01:10:45,022 --> 01:10:49,549 which is significantly more than the thieves actually stole. 1294 01:10:51,028 --> 01:10:52,334 To my mind, 1295 01:10:52,334 --> 01:10:54,467 there's no question that she was a scapegoat. 1296 01:10:54,467 --> 01:10:58,340 I mean, the currency traders who turned that $81 million 1297 01:10:58,340 --> 01:11:01,343 into pesos got off scot-free. 1298 01:11:01,343 --> 01:11:03,780 There are a couple of Chinese operators 1299 01:11:03,780 --> 01:11:06,609 who brought these gamblers in from China. 1300 01:11:06,609 --> 01:11:10,439 We know that they received tens of millions of dollars in cash. 1301 01:11:10,439 --> 01:11:15,357 They vanished back to Macau. No trace of them was ever found. 1302 01:11:15,357 --> 01:11:17,794 We can't say for sure, but certainly it looks like 1303 01:11:17,794 --> 01:11:20,841 people at the Rizal Bank headquarters 1304 01:11:20,841 --> 01:11:23,931 buried these requests to stop these transactions. 1305 01:11:23,931 --> 01:11:27,282 But nobody else at the Rizal Bank was ever accused. 1306 01:11:27,282 --> 01:11:31,242 Oddly enough, in this giant scheme that involved 1307 01:11:31,242 --> 01:11:35,029 a half a dozen countries, nearly $1 billion, 1308 01:11:35,029 --> 01:11:40,251 only one bank employee in a small branch in Manila 1309 01:11:40,251 --> 01:11:42,689 was ever convicted of doing anything wrong. 1310 01:11:42,689 --> 01:11:46,083 It's incredible. Total impunity. 1311 01:11:52,438 --> 01:11:54,831 I think the most important lesson 1312 01:11:54,831 --> 01:11:57,921 of the Bangladesh Bank 1313 01:11:57,921 --> 01:11:59,923 is a lesson of scale. 1314 01:11:59,923 --> 01:12:01,925 The internet is a fantastic thing. 1315 01:12:01,925 --> 01:12:04,363 It's made our world much, much smaller. 1316 01:12:04,363 --> 01:12:07,104 You can do all sorts of things. It's fantastic. 1317 01:12:07,104 --> 01:12:08,976 But that interconnectivity, 1318 01:12:08,976 --> 01:12:11,848 where everything is linked to everything else, 1319 01:12:11,848 --> 01:12:15,461 means that if you get bad actors in that system, 1320 01:12:15,461 --> 01:12:17,288 then the damage 1321 01:12:17,288 --> 01:12:22,119 is infinitely more immense than it was before. 1322 01:12:23,730 --> 01:12:26,036 When I started this job two decades ago, 1323 01:12:26,036 --> 01:12:29,126 you had to explain to people, what is a virus? 1324 01:12:29,126 --> 01:12:31,085 What is a cyber-attack? 1325 01:12:31,085 --> 01:12:33,435 Today, we don't talk about 1326 01:12:33,435 --> 01:12:36,482 making sure this file doesn't get deleted any more. 1327 01:12:36,482 --> 01:12:40,616 We literally talk about making sure the supply chain is up, 1328 01:12:40,616 --> 01:12:42,662 food can reach people's tables. 1329 01:12:42,662 --> 01:12:45,708 Our job is not just to protect people's computers. 1330 01:12:45,708 --> 01:12:49,103 Our job is to ensure society is up and running. 1331 01:12:49,103 --> 01:12:52,106 Everything that we use now, 1332 01:12:52,106 --> 01:12:54,021 water, electricity, 1333 01:12:54,021 --> 01:12:56,980 the financial system, the comms system, 1334 01:12:56,980 --> 01:12:58,591 depends on the integrity 1335 01:12:58,591 --> 01:13:03,726 of unbelievably complex networked computer systems. 1336 01:13:03,726 --> 01:13:08,035 And our dependence is becoming such 1337 01:13:08,035 --> 01:13:10,429 that, should anything go wrong, 1338 01:13:10,429 --> 01:13:13,214 be it a technical hitch or be it a hack, 1339 01:13:13,214 --> 01:13:17,174 it can actually lead to our lives grinding to a halt 1340 01:13:17,174 --> 01:13:19,568 in a very short space of time. 1341 01:13:20,526 --> 01:13:22,179 We're sort of in a state 1342 01:13:22,179 --> 01:13:24,660 where we're increasing our vulnerability 1343 01:13:24,660 --> 01:13:27,402 and our attack surface every single day. 1344 01:13:27,402 --> 01:13:29,839 And instead of pausing 1345 01:13:29,839 --> 01:13:32,842 and thinking about how to lock up our power grid, 1346 01:13:32,842 --> 01:13:37,891 really, where our energy has been focused is on escalation. 1347 01:13:37,891 --> 01:13:41,416 Countries like the United States, China and Russia 1348 01:13:41,416 --> 01:13:44,593 have already arrogated the right to themselves 1349 01:13:44,593 --> 01:13:47,378 to attack with full force, 1350 01:13:47,378 --> 01:13:50,077 whether cyber or conventional weapons, 1351 01:13:50,077 --> 01:13:51,948 against anyone who brings down 1352 01:13:51,948 --> 01:13:56,562 a serious piece of critical national infrastructure. 1353 01:13:56,562 --> 01:14:01,523 We've had Stuxnet blowing up the Natanz centrifuge plant. 1354 01:14:01,523 --> 01:14:05,005 We've had ransomware attacks, which hit the Eastern Seaboard. 1355 01:14:05,005 --> 01:14:07,050 There was no gas to the Eastern Seaboard 1356 01:14:07,050 --> 01:14:09,662 for a whole week in the United States. 1357 01:14:09,662 --> 01:14:11,794 We had Russia against the Ukraine, 1358 01:14:11,794 --> 01:14:14,580 shutting out the power in the middle of winter. 1359 01:14:14,580 --> 01:14:17,496 We're talking about people losing their lives. 1360 01:14:17,496 --> 01:14:19,062 We've also had cyber-attacks 1361 01:14:19,062 --> 01:14:21,456 that potentially affected US elections. 1362 01:14:21,456 --> 01:14:23,806 We had the healthcare in the UK brought down, 1363 01:14:23,806 --> 01:14:25,982 dialysis machines no longer working. 1364 01:14:25,982 --> 01:14:29,464 This is an extremely fragile situation, 1365 01:14:29,464 --> 01:14:33,642 much more fragile than the period of dรฉtente, 1366 01:14:33,642 --> 01:14:37,298 because so many more countries have these weapons. 1367 01:14:37,298 --> 01:14:41,432 Malware is much more difficult to control than nuclear weapons. 1368 01:14:41,432 --> 01:14:44,914 People always warn me of the cyber Pearl Harbor 1369 01:14:44,914 --> 01:14:47,134 or the cyber 9/11, 1370 01:14:47,134 --> 01:14:49,789 but it's almost worse than that. 1371 01:14:49,789 --> 01:14:53,662 Every day, there are thousands of cyber-attacks, 1372 01:14:53,662 --> 01:14:58,275 and we're just getting more and more and more inured to them. 1373 01:14:59,059 --> 01:15:00,930 It's like a plague. 1374 01:15:00,930 --> 01:15:05,195 I think we'll see much more hostile cyber activity, 1375 01:15:05,195 --> 01:15:07,894 much more cyber bank robberies, 1376 01:15:07,894 --> 01:15:10,026 much more cyber espionage. 1377 01:15:10,026 --> 01:15:13,073 We'll see much more cyber war. 1378 01:15:13,073 --> 01:15:15,858 In many ways, I think we've seen nothing yet. 1379 01:15:15,858 --> 01:15:19,296 As attacks increase in their sophistication 1380 01:15:19,296 --> 01:15:21,429 and their range, 1381 01:15:21,429 --> 01:15:25,389 then the impact can be ever greater. 1382 01:15:25,389 --> 01:15:29,916 There is a cyber-attack on critical national infrastructure 1383 01:15:29,916 --> 01:15:31,787 coming to a place near you 1384 01:15:31,787 --> 01:15:35,312 within the next five to ten years. 1385 01:15:35,312 --> 01:15:38,751 If it's done well, and if it's really malicious, 1386 01:15:38,751 --> 01:15:41,275 that could be catastrophic. 1387 01:15:43,059 --> 01:15:47,629 What's amazing about the Bank of Bangladesh heist is... 1388 01:15:47,629 --> 01:15:51,328 they almost walked away with $1 billion. 1389 01:15:54,114 --> 01:15:56,246 The mistakes that they made 1390 01:15:56,246 --> 01:16:00,033 that led to them only walking with $81 million 1391 01:16:00,033 --> 01:16:02,905 were literally a typo in a name 1392 01:16:02,905 --> 01:16:05,125 and potentially not being patient enough, 1393 01:16:05,125 --> 01:16:06,605 waiting just one more hour. 1394 01:16:06,605 --> 01:16:09,956 We could be telling a completely different story. 1395 01:16:09,956 --> 01:16:11,871 Presumably, these guys 1396 01:16:11,871 --> 01:16:15,352 kept perhaps 95 percent of that cash. 1397 01:16:15,352 --> 01:16:16,571 You could walk out 1398 01:16:16,571 --> 01:16:18,442 with 95 percent of what you came in with, 1399 01:16:18,442 --> 01:16:21,881 have nobody trace that money, no record of it whatsoever, 1400 01:16:21,881 --> 01:16:26,276 and get on a plane with it, and you're home free. 1401 01:16:26,276 --> 01:16:30,803 Even if you had invested a year's work, 1402 01:16:30,803 --> 01:16:35,503 that you had recruited a really decent set of hackers, 1403 01:16:35,503 --> 01:16:39,942 that you had corrupted bank officials, 1404 01:16:39,942 --> 01:16:43,990 you'll be looking at a profit of about $75 million. 1405 01:16:43,990 --> 01:16:47,080 For a year's work, not a bad pay-off. 1406 01:16:49,169 --> 01:16:53,042 The Bank of Bangladesh heist showed them what was possible. 1407 01:16:54,435 --> 01:16:56,785 They proved that they could do it. 1408 01:17:01,660 --> 01:17:03,705 After that attack, it didn't stop. 1409 01:17:03,705 --> 01:17:07,883 We saw continued attacks on various banks across Asia, 1410 01:17:07,883 --> 01:17:10,494 I think in the Philippines again. 1411 01:17:10,494 --> 01:17:14,716 And also, they started hacking the cryptocurrency exchanges, 1412 01:17:14,716 --> 01:17:18,589 where people store their Bitcoin and Monero digital currency, 1413 01:17:18,589 --> 01:17:21,767 which has proved to be incredibly lucrative for them. 1414 01:17:23,769 --> 01:17:25,727 In 2017, Lazarus was thought 1415 01:17:25,727 --> 01:17:27,381 to have successfully attacked 1416 01:17:27,381 --> 01:17:32,038 at least five Asian cryptocurrency exchanges. 1417 01:17:32,038 --> 01:17:37,870 That's a total of $571 million that was lost. 1418 01:17:37,870 --> 01:17:41,177 Cryptocurrency exchanges just have the bare minimum 1419 01:17:41,177 --> 01:17:43,702 of security, we're learning now. 1420 01:17:43,702 --> 01:17:46,966 In 2020, as the global pandemic spiralled, 1421 01:17:46,966 --> 01:17:50,186 AstraZeneca, makers of one of the key vaccines, 1422 01:17:50,186 --> 01:17:53,581 was hit by an attack, extorting the company 1423 01:17:53,581 --> 01:17:56,889 and stealing sensitive information for profit. 1424 01:17:58,107 --> 01:18:00,675 The sums involved are astronomical, 1425 01:18:00,675 --> 01:18:03,983 and Lazarus is still very much at large. 1426 01:18:06,289 --> 01:18:11,817 They have been designated by the United States an APT; 1427 01:18:11,817 --> 01:18:13,906 that's an advanced persistent threat. 1428 01:18:13,906 --> 01:18:16,735 Now, the fundamental criteria 1429 01:18:16,735 --> 01:18:20,521 is that they represent a threat 1430 01:18:20,521 --> 01:18:24,655 to US national security and national infrastructure. 1431 01:18:24,655 --> 01:18:28,529 So, just by dint of it being called an APT 1432 01:18:28,529 --> 01:18:33,447 means that the Lazarus Group is serious stuff. 1433 01:18:33,447 --> 01:18:35,666 Marvel fans, think HYDRA. 1434 01:18:35,666 --> 01:18:38,844 James Bond films, think of SPECTRE. 1435 01:18:38,844 --> 01:18:40,280 It's something like that. 1436 01:18:43,805 --> 01:18:47,678 Now, it's tempting to think this comparison is absurd, 1437 01:18:47,678 --> 01:18:51,117 but this is the scale that Lazarus operates on. 1438 01:18:51,117 --> 01:18:54,337 Arguably, they're the most potent cyber criminals 1439 01:18:54,337 --> 01:18:56,470 in business today. 1440 01:18:56,470 --> 01:19:00,343 So the nation state's involvement in cybercrime 1441 01:19:00,343 --> 01:19:02,998 means that cybercrime has actually morphed 1442 01:19:02,998 --> 01:19:05,696 into cyber warfare. 1443 01:19:05,696 --> 01:19:08,656 You can have zero trust in these systems. 1444 01:19:08,656 --> 01:19:12,138 You need to assume that everything has been broken, 1445 01:19:12,138 --> 01:19:14,053 everything is being listened to, 1446 01:19:14,053 --> 01:19:17,317 that everything can be captured, and operate accordingly. 1447 01:19:19,623 --> 01:19:22,496 If a small group can plan something 1448 01:19:22,496 --> 01:19:25,542 and get away with $81 million, 1449 01:19:25,542 --> 01:19:27,980 which involved the Fed in New York, 1450 01:19:27,980 --> 01:19:29,808 SWIFT in Brussels, 1451 01:19:29,808 --> 01:19:32,593 the Bangladeshi Bank in Dhaka, 1452 01:19:32,593 --> 01:19:36,075 and then all the peripherals in Manila, 1453 01:19:36,075 --> 01:19:40,470 just think about what one of the really professional operations 1454 01:19:40,470 --> 01:19:42,603 in China, Russia, 1455 01:19:42,603 --> 01:19:44,561 the NSA, GCHQ, 1456 01:19:44,561 --> 01:19:48,914 just think what havoc they could wreak. 1457 01:19:48,914 --> 01:19:52,656 And every year, the hacks get bigger, the damage greater, 1458 01:19:52,656 --> 01:19:54,745 the implications graver. 1459 01:19:56,182 --> 01:20:00,490 Armies literally have hackers hammering at the gates. 1460 01:20:00,490 --> 01:20:02,753 And it just takes a simple breach, 1461 01:20:02,753 --> 01:20:05,626 one person, one weak link, 1462 01:20:05,626 --> 01:20:08,281 and those armies will storm the defences 1463 01:20:08,281 --> 01:20:12,894 and bring down a network that our way of life depends on. 1464 01:20:12,894 --> 01:20:15,636 It happened in Bangladesh in 2016. 1465 01:20:15,636 --> 01:20:21,076 And believe you me, it's going to happen again very soon. 1466 01:21:15,000 --> 01:21:17,959 Iyuno 118262

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.