Hackers pretending to screen a Chilean ATM network staffer for a new job instead slipped malware onto his work computer, leading to a broader attack.
The fake job interview was part of a phishing attack meant to compromise Redbanc, Chile's ATM network, in December.
The phishing incident and subsequent cyberattack were exposed by Chilean Senator Felipe Harboe in a Jan. 8 tweet demanding the network disclose the security breach to the public, along with the magnitude, risk and control measures of the attack.
Redbanc confirmed the breach days later reporting it had taken the appropriate security measures to safeguard the network against the cyberattack. Redbanc operates the interbank network that connects all of the ATMs from the various banks operating in Chile.
A Redbanc IT employee responded to a developer position posted on LinkedIn, reports a local Chilean technology news website TrendTIC. Once the employee responded to the job position, he was contacted by hackers believed to be known as the Lazarus Group which has ties to the North Korean dictatorship.
Taxis drive down a street in the financial district of Santiago, Chile, on Wednesday, Dec. 3, 2014. Chilean unemployment unexpectedly fell in the three months through October, the first month of a quarter that Finance Minister Alberto Arenas forecasts will see a "small and moderate reactivation" in the economy. Photographer: Ronald Patrick/Bloomberg
Ronald Patrick/Bloomberg
The hackers conducted a Skype interview in Spanish with the employee to gain his trust in believing the position was legitimate. Once the trust had been gained, the employee was asked to install the ApplicationPDF.exe program on his computer, with the excuse of generating his online application form in a PDF format.
Further software code analysis by Vitali Kremez, director of research at Flashpoint (a business risk intelligence firm), revealed the intrusion involved PowerRatankba, a malware toolkit that is also tied to Lazarus. This intrusion is the latest known example of Lazarus-affiliated tools being deployed against Latin American financial institutions, according to Flashpoint.
While phishing prevention is often designed to prevent hackers from spoofing bank websites to fool consumers into providing individual details, hackers will often set their sights on bigger targets, such as individuals who have access to an entire network. In the case of Redbanc, the intended target was the entire Chilean ATM network and possibly the entire Chilean banking system.
North Korea has become a major sources of attacks. The North Korean cyberattack organization APT38 has reportedly has stolen more than $1.1 billion since 2014 from global financial institutions targeting a banks access to the Swift messaging network. APT38 notably began its attacks with the $81 million malware-based heist of the Bangladesh Bank in 2016 through its account at the Federal Reserve Bank of New York.
The Arkansas-based company spent nearly four years on the M&A sidelines, grappling with asset quality issues and litigation tied to its 2022 acquisition of Texas-based Happy State Bank. Now it's signed a letter of intent to buy an unnamed bank.
The company cited efforts to improve profitability behind its decision, with Popular joining a line of other banks in ending mortgage operations in 2025.
Zelle's parent Early Warning Services said Friday it was planning to take its peer-to-peer payments network international through a new stablecoin initiative. It says the details will come later.
Nicolet Bankshares has agreed to buy MidWestOne Financial in an $864 million, all-stock deal. The acquisition will move the Wisconsin-based buyer into Iowa and the Twin Cities, while also allowing it to vault past a key regulatory threshold.