London cyber criminals face jail for Natwest fraud
A Police Central e-Crime Unit operation leads to a £600,000 internet fraud gang facing jail.
London-based cyber criminals face jail after siphoning off 600,000 from bank customers with a trojan virus.
According to a report in the West Sussex County Times, the criminals infected computers with a trojan that waited until a user logged onto an account and then slithered its way into online cash transfer procedures.
Shown a page with a faked Natwest logo and a message that it was an additional security measure, victims would be persuaded to type in passwords, PIN numbers and telephone numbers.
The virus would allow users to continue normally, but was secretly creating new payee details to siphon the cash into mule accounts, and then to Eastern Europe.
According to the report, 138 customers were affected with 600,000 transferred. Natwest managed to recoup 140,000 after the scam was uncovered.
A 24-year-old Uzbekistan national and three co-defendants pleaded to conspiracy to defraud and money laundering. They will be sentenced in November.
This was the first successful operation for the Police Central e-crime Unit, which was involved in investigating the banking fraud and making the original arrests.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It is working as part of a Virtual Task Force, comprised of partners across the financial services industry that share intelligence connected to criminal activity.
-
Software developer salaries are surging in the UK as AI skills gaps drives demandNews Stack Overflow says positive growth in developer salaries shows the community is thriving
-
Darktrace bolsters expansion plans with double C-suite appointmentNews Industry veteran Samun Raju joins the security vendor as CFO, while former KnowBe4 executive Hein Hellemons becomes CRO
-
UK police fails ethical tests with "unlawful" facial recognition deploymentsNews A University of Cambridge team audited UK police use of the tech and found frequent ethical and legal shortcomings
-
CronRat Magecart malware uses 31st February date to remain undetectedNews The malware allows for server-side payment skimming that bypasses browser security
-
Mekotio trojan continues to spread despite its operators’ arrestsNews Hackers have used it in 100 more attacks since arrests
-
“Trojan Source” hides flaws in source code from humansNews Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
-
What is Emotet?In-depth A deep dive into one of the most infamous and prolific strains of malware
-
Fake AnyDesk Google ads deliver malwareNews Malware pushed through Google search results
-
Hackers use open source Microsoft dev platform to deliver trojansNews Microsoft's Build Engine is being used to deploy Remcos password-stealing malware
-
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark webNews The source code for the authenticator-breaking malware is available for free on underground forums