TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Two major US technology firms 'tricked out of $100M'

197 pointsby RijilVabout 8 years ago

21 comments

tyingqabout 8 years ago
More detail here: <a href="https:&#x2F;&#x2F;www.justice.gov&#x2F;usao-sdny&#x2F;pr&#x2F;lithuanian-man-arrested-theft-over-100-million-fraudulent-email-compromise-scheme" rel="nofollow">https:&#x2F;&#x2F;www.justice.gov&#x2F;usao-sdny&#x2F;pr&#x2F;lithuanian-man-arrested...</a> There&#x27;s a download link for the actual indictment as well.<p>He registered a company with a name very similar to an existing, legitimate computer hardware manufacturer. Then targeted companies that already had a relationship and already regularly paid invoices to the company with the similar name.<p>It mentions the victims were &quot;multinational internet companies&quot;. The indictment goes farther, saying:<p><i>&quot;Victim-1 was a multinational technology company, specializing in Internet-related services and products, with headquarters in the United States&quot;</i><p>and<p><i>&quot;Victim-2 was a multinational corporation providing online social media and networking services, with headquarters in the United States&quot;</i><p>Edit: It mentions that both victims already regularly paid multi-million dollar invoices to the computer hardware company being impersonated. So, if you&#x27;re trying to guess who the victims are, they are large enough that they run on their own purchased hardware, in fairly large quantities.
评论 #13931850 未加载
评论 #13931906 未加载
dopameanabout 8 years ago
I have a friend who&#x27;s father is very, very wealthy. He purchases a lot of art and often actually finalizes the sales by emailing someone who works for him something to the effect of &quot;please transfer X dollars to Y party for Z piece of artwork.&quot; A few years ago someone got access to his gmail account in what appeared to be a mass phishing attack and saw several of these emails in his sent email folder. The intruder was able to have a few million dollars successfully transferred to himself. It was several months before it was noticed and the guy was never caught.<p>My friend&#x27;s father now uses two factor auth and has whoever receives those emails confirm via phone call the next day.
评论 #13935544 未加载
评论 #13935493 未加载
评论 #13934278 未加载
评论 #13934555 未加载
Someone1234about 8 years ago
People would legitimately be surprised to learn how low tech ordering&#x2F;invoicing&#x2F;remittances remain in 2017 even for half billion dollar contracts.<p>There&#x27;s very little automation, even EDI is the exception rather than the rule (particularly for one off orders), most are either still paper, fax, or insecure email.<p>Email remains pretty broken. You&#x27;ll be lucky to get end to end encryption, and once it arrives it is hard to make assurances that the sender really sent it (or even the sender&#x27;s domain).<p>People have tried to fix email but nothing as ambitious as TLS&#x2F;HTTPS has been. And getting people to use a more secure platform built on top of HTTPS is likely a non-starter...<p>So what can be done? I legitimately don&#x27;t know. Even snail mail can be &quot;hacked&quot; via sending a plausible sounding invoice to the right address at the right time.
评论 #13931649 未加载
评论 #13932894 未加载
评论 #13931482 未加载
评论 #13932060 未加载
评论 #13931363 未加载
评论 #13934245 未加载
评论 #13931459 未加载
wycabout 8 years ago
The funny thing is that these incidents are probably what it takes for those <i>particular</i> companies to beef up their security culture. Everyone else will likely keep their heads down: &quot;How asinine of them! This dumb thing could <i>never</i> happen to us.&quot; The truth is that without the right security processes and culture in place, it could really happen to anyone dealing with substantial value and overworked mid-level managers, a form of the principal–agent problem[1].<p>Security incidents have a stark resemblance to emergency room visits. People are so hard to sell on prevention, and they end up paying big for an ER visit.<p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Principal%E2%80%93agent_problem" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Principal%E2%80%93agent_proble...</a>
perlgeekabout 8 years ago
To me, the surprising thing is that they managed to get the bank transferred to the &quot;correct&quot; fraudulent accounts.<p>If you send an existing customer another invoice, but with a changed bank account number, chances are that the money goes to the same bank account as they used previously. Even if you explicitly add a note about the changed account number, chances are still very high that they use the old one.
评论 #13932037 未加载
评论 #13932087 未加载
DanBCabout 8 years ago
The important bit of this for HN is that he got these companies to pay by using their sales order, invoice, payment process, and that process is common to most companies.<p>If you have a small or an open source project you&#x27;re going to struggle to get companies to pay unless you can fit their process.<p>This means that it&#x27;s probably worth while offering a &quot;professional&quot; licence. This grants no extra functionality, but allows the company to put in a sales order, and allows you to deliver something and allows you to issue an invoice.
dborehamabout 8 years ago
Even more surprising when I consider my own experience getting large technology corporations to pay my companies money they legitimately owe us!
SteveNutsabout 8 years ago
This happened to Ubiquiti a while back<p><a href="https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2015&#x2F;08&#x2F;tech-firm-ubiquiti-suffers-46m-cyberheist&#x2F;" rel="nofollow">https:&#x2F;&#x2F;krebsonsecurity.com&#x2F;2015&#x2F;08&#x2F;tech-firm-ubiquiti-suffe...</a>
评论 #13931982 未加载
leonroyabout 8 years ago
Ironic we nearly went under a few times during the early days because our customers (tier 1 telecoms and financial firms) would drag their heels for months and months over invoices many magnitudes less than this.<p>Makes me wonder what&#x27;s up with the process at these firms - wish we knew enough to say whether they&#x27;re the exception or the rule.
评论 #13933120 未加载
settsuabout 8 years ago
There is quite a bit that could be mined from this story, but just as a start:<p>1) The most zealous and persistent phishing awareness campaigns&#x2F;training I&#x27;ve encountered has been at large corporations. I can imagine a series of articles, if not an entire career, that is based on exploring the psychology of employees in varying organization sizes being influenced by their perceptions of the stake they feel they hold in the performance of the organization (i.e., their &quot;ownership&quot;) and how much their actions, positive and negative, might bear notable influence.<p>Not confident I made my point clear, but the idea being I&#x27;m going to think differently about jumping up and down on a cruise ship vs. a row boat...<p>2) Putting aside the questionable application of it in this specific case, &quot;cybercriminal&quot; is an outmoded term that I believe actually undermines the mundane and routine nature of these crimes. Regardless of magnitude, it imbues the perpetrator and their activities with some 90s-era aura of mystery and preternatural skill—an exceptional event executed by exceptional individuals under exceptional circumstances.
6stringmercabout 8 years ago
This aligns well with my 2017 Nicholl Fellowship screenplay entry called &quot;Do Unto Others&quot; where in Act III the protagonists use their insider knowledge of International Banking and Wire Transfers to clean out the hidden stash of illicit monies hidden by disgraced Enron executives[1].<p>To me, plausibility is important in fictional works that reach for meaning or defined structure, at least where possible. I mean, I love <i>Hackers</i> but of course groan at scenes inside &quot;The Gibson&quot; and whatnot. This guy actually made it work - I&#x27;m impressed.<p>[1] <a href="https:&#x2F;&#x2F;www.scriptrevolution.com&#x2F;scripts&#x2F;do-unto-others" rel="nofollow">https:&#x2F;&#x2F;www.scriptrevolution.com&#x2F;scripts&#x2F;do-unto-others</a>
wyldfireabout 8 years ago
I saw speculation on Twitter that it was Google or Apple and Facebook. But to me, it seems like it could be any of dozens of companies based on &quot;Internet-related services and products&quot; and &quot;multinational ... online social media&#x2F;networking&quot;.<p>See also: affidavit [1]<p>[1] <a href="https:&#x2F;&#x2F;www.scribd.com&#x2F;document&#x2F;342639731&#x2F;Rimasauskas-Affidavit" rel="nofollow">https:&#x2F;&#x2F;www.scribd.com&#x2F;document&#x2F;342639731&#x2F;Rimasauskas-Affida...</a>
评论 #13931516 未加载
ccvannormanabout 8 years ago
Stories like this are what give African Princes hope that someday they will find their Princess.
评论 #13931686 未加载
kiryklabout 8 years ago
I would think a simple 2nd factor check, by phone to the actual vendor would have prevented this. For such large amounts the time involved would be worth it
评论 #13931510 未加载
评论 #13931418 未加载
评论 #13931788 未加载
评论 #13931380 未加载
tlrobinsonabout 8 years ago
Similar scams have targeted (medium-large, funded) startups as well.<p>Typically the attacker starts by phishing an employee, then uses information discovered through that to trick someone else in the company to initiate a wire.
owlyabout 8 years ago
Security is only as good as the weakest link, employees who do not question legitimacy and authority.
mixedbitabout 8 years ago
Sounds like a story for another &quot;Catch Me If You Can&quot; kind of movie.
dangerboysteveabout 8 years ago
I imagine these types of crimes are very much helped by mining data from Linked in and Facebook.
elchiefabout 8 years ago
How do you steal $100M and <i>not</i> get away with it? He had access to the money for years
评论 #13933991 未加载
ryan-cabout 8 years ago
Anyone have a better guess than &quot;Foxconn&quot; as to who this guy was impersonating?
bvincabout 8 years ago
Why didn&#x27;t he wire it to a Swiss or Cayman Islands bank account?
评论 #13931495 未加载