City supe slaps bank for account compromise
$378,000 Ukraine transfer
A supervisor for the town of Poughkeepsie, New York lashed out at a local bank after someone siphoned $378,000 out of municipal coffers and transferred it to Ukraine.
Supervisor Patricia Myers, who waited more than three weeks to disclose details of the heist, didn't question whether any of the responsibility rested with officials who administered the town's banking account. Instead, she blamed TD Bank officials for not immediately reporting the transfers, according to reports here and here in The Poughkeepsie Journal.
"We find it unacceptable that movement, or attempted movement, of money from a town account to an account in Eastern Europe did not immediately raise a red flag with a bank, was not questioned by anyone at the bank, but was simply processed," Myers said in a statement read before the Town Board of Supervisors meeting Wednesday.
The $378,000 was withdrawn in four transfers on January 11 and 12 that wiped out the account, which the town used to pay bills. The theft was discovered on January 13 by the town's comptroller. Of the stolen loot, $95,000 has since been recovered. The town is working to recover the remainder.
Over the past few years, attacks on the online bank accounts of municipalities and small businesses have reached epidemic proportions. The FBI said recently it has investigated more than 200 cases of online bank theft, mostly in 2008 and 2009, in which cybercooks successfully made off with $40m, the paper reported. In all, more than $100m was targeted.
Last month, a small school district in the western part of New York state reported having more than $3m stolen from its online account before recovering all but $497,200 of that amount.
The crimes are generally carried out by organized criminal gangs, mostly located in Eastern Europe and usually succeed by tricking people with access to the account into installing password sniffers and other malware on their machines.
Myers said town officials have changed all account numbers and removed computers that had access to the accounts. She didn't say whether malware was found on them. ®
"in which cybercooks successfully made off with $40m"
Did they 'beat' a hasty retreat or maybe "whisked" the loot away. Everyone gets a slice of the pie, but you can't have your cake and eat it...
oh very well. Please yourself!
6 of 1
and half a dozen of the other....?
The city should have better controls on downloading or receiving links to Megan Fox piccies, and work ethics in place to stop the drones from accepting them, but the banks should also have locks in place to stop money in government afforded accounts being transferred to accounts outside the jurisdiction of the recipient body.
Seriously, how hard can it be for banks to instigate something that says, if this body receives federeal funding, or, a person who, has never transfered money to countries outside the US, has a transfer to another country, that said transfer is stopped until someone in authority physically, in person, authorises it.
The buck stops with the bank, they are the final gateway for fraud, and are failing everyone
true, post-key logger install it would make no difference what browser they were using. And if they manually ran an app the browser wouldn't matter then either. But ie tends to be the most exploited and slow to be patched (compared to ff, chrome, etc.) so i still recommend against ie.
as for the os... No. In linux files are saved non-executable, the "download and run this app" attack will not work, since the type of user who would fall for this will not know how to chmod +x or use the gui to do that. Plus the practical matter that theres virtually no exploits in the wild for anything but windows.