Feeds

Egg hackers were disorganised crime

Multiple loan applications from one IP address. Doh!

  • alert
  • submit to reddit

Security for virtualized datacentres

More details have emerged about the so-called "Great Internet Robbery" at online bank Egg.com.

This was not the Great Hack that everyone thought it was yesterday, just a set of fraudulent applications for loans and bank accounts with free overdrafts.

In fact, the reason these guys got caught is that Egg had software in place capable of tracing fraudulent account activity by checking up on multiple applications from a single IP address.

Much of the news coverage of the event has focussed on the lack of security of banking online, but this is not relevant to this case. This was an old-style fraud committed by people without enough technical knowledge to mask their identities and hide what they were doing from the bank's monitoring software.

In the words of one security expert we spoke to: "That doesn't sound like very organised 'Organised Crime' to me. In fact it seems that they went out of their way to be traceable. The raids took place in three locations: Buckinghamshire, Bedfordshire and Northamptonshire, and it appears they gathered together to make the applications."

Indeed. If these people had thought about what they were doing, multiple applications would have been made from multiple sources, untraceable to one person. It is not as though there is any great shortage of Internet cafes to go to.

If this situation adds to peoples concerns about online banking, it shouldn't. There was, according to Egg, no security breach and no customers' money was stolen. This kind of crime was just as easy to perpetrate in the "real world" until money laundering regulations tightened up on the amount of identification required to open bank account.

Robert Schifreen, a director at Information Security Training, commented: "This will not be the last time this happens, and it is not the big online bank hack everyone has been expecting. That, I fear, is still to come."

The National Criminal Intelligence Service put out a statement three weeks ago pinpointing the real issue. It said: "Suspicious transactions reported by high street banks are frequently generated through observations of staff who serve the customers. This opportunity is eliminated through the operation of the Internet and may therefore result in a decrease in the number of disclosures."

The security of online banking has not, as all the doomsayers proclaim, been shown up again, although it may yet be. ®

Related Stories

Visa and Mastercard turn the screws on online fraudsters
Cops make arrests after Egg attacked

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Special pleading against mass surveillance won't help anyone
Protecting journalists alone won't protect their sources
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Bill Gates, drugs and the internet: Top 10 Larry Ellison quotes
'I certainly never expected to become rich ... this is surreal'
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
EMC, HP blockbuster 'merger' shocker comes a cropper
Stand down, FTC... you can put your feet up for a bit
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.