Showing posts with label Money Laundering. Show all posts
Showing posts with label Money Laundering. Show all posts

Sunday, September 29, 2019

Swiss to auction 25 super cars seized from E. Guinea leader's son


CHÉSEREX, Switzerland - A collection of luxury cars seized from Equatorial Guinea's vice president Teodorin Obiang Nguema will be auctioned off in Switzerland on Sunday and are estimated to bring in 18.5 million Swiss francs ($18.7 million).

"This is an exceptional sale," Philip Kantor, of British auctioneers Bonhams, told AFP. "It's a private collection of supercars, with very low mileage.

Among the cars, to go under the hammer at a Geneva golf club, are seven Ferraris, three Lamborghinis, five Bentleys, a Maserati and a McLaren. 

The most expensive lots are a Lamborghini Veneno Roadster, valued at between 4.8 million and 5.7 million euros ($5.2-6.2 million) and yellow Ferrari hybrid at 2.4-2.6 million euros.

The cars were all confiscated by Swiss justice after the opening in 2016 of a financial wrongdoing case against Obiang, son and likely heir of Equatorial Guinea's authoritarian President Teodoro Obiang Nguema who has ruled for 40 years.

All will be sold with no reserve price. 

In February Swiss prosecutors said they were dropping charges of financial wrongdoing against Teodorin Obiang Nguema but were confiscating the luxury cars as part of the case.

Under the Swiss penal code, prosecutors can choose to drop charges in this category if defendants offer compensation "and restore a situation that is in conformity with the law." 

Playboy reputation 

Equatorial Guinea has also agreed to give Geneva 1.3 million Swiss francs to cover the costs of the case.

Vice president with responsibility for defense and security, Teodorin Obiang has a reputation for a playboy lifestyle.

In October 2017, a Paris court handed him a three-year suspended jail term after convicting Obiang of siphoning off public money to buy assets in France.

He was accused of spending more than 1,000 times his official annual salary on a six-story mansion in a posh part of the French capital, a fleet of fast cars and artworks, among other assets.

He was also given a suspended fine of 30 million euros.

In September, Brazilian media said that more than $16 million in cash and luxury watches were seized by Brazilian police and customs officers from the luggage of a delegation accompanying Obiang on a private visit.

Brazilian daily O Estado de Sao Paulo quoted a diplomatic source from Equatorial Guinea as saying the money was to pay for medical treatment Obiang was to undergo in Sao Paulo. 

The watches were for the "personal use" of the president's son and were engraved with his initials, the report said.

Obiang is reputedly on a fast track to succeed his father.

Last October, he was promoted from colonel directly to division general, without passing through the normal intermediary rank of brigade general.

The following month, he presided over a cabinet meeting for the first time.

The tiny West African nation is one of the continent's top petroleum producers and has a population of just 1.2 million.

The country is regularly cited by NGOs as one of the most corrupt in the world.

source: news.abs-cbn.com

Wednesday, March 13, 2019

Biggest US college fraud bust nets actors Felicity Huffman, Lori Loughlin


BOSTON - Federal authorities arrested dozens on Tuesday for a $25 million scheme to help wealthy Americans, including actresses Felicity Huffman and Lori Loughlin and some CEOs, cheat their children's way into elite universities, such as Yale and Stanford.

The largest college admissions fraud scam unearthed in US history was run out of a small college preparation company in Newport Beach, California that relied on bribes to sports coaches, phony test takers, and even doctored photos depicting non-athletic applicants as elite competitors to land college slots for the offspring of rich parents, prosecutors said.

"These parents are a catalog of wealth and privilege," Andrew Lelling, the US attorney in Boston, said at a news conference. "For every student admitted through fraud, an honest, genuinely talented student was rejected."

William "Rick" Singer, 58, pleaded guilty on Tuesday to charges related to running the scheme through his Edge College & Career Network, which charged from $100,000 to as much as $2.5 million per child for the services, which were masked as contributions to a scam charity Singer runs.

"I was essentially buying or bribing the coaches for a spot," Singer said as he pleaded guilty to charges including racketeering, money laundering, and obstruction of justice. "And that occurred very frequently."

John Vandemoor, a former Stanford University sailing coach who worked with Singer, also pleaded guilty to racketeering conspiracy.

It was the latest in a series of scandals that have rocked the high-stakes, high-stress world of admissions to top colleges. Prosecutors in Boston in recent years have also charged Chinese nationals with cheating on entrance exams, while the College Board, which administers the SAT tests, was rocked in 2016 by a security breach that exposed hundreds of questions planned for tests.

Some 300 law enforcement agents swept across the country to make arrests in what agents code-named "Operation Varsity Blues." Huffman and Loughlin were due to appear in federal court in Los Angeles later on Tuesday, prosecutors said.

Prosecutors have so far named 33 parents, 13 coaches, and associates of Singer's business.

Other parents charged include Manuel Henriquez, the chief executive of specialty finance lender Hercules Capital; Gordon Caplan, the co-chairman of international law firm Willkie Farr & Gallagher; Bill McGlashan Jr., who heads a buyout investment arm of private equity firm TPG Capital; and Douglas Hodge, the former CEO of the investment management firm Pimco.

Representatives for the companies and for Huffman and Loughlin either declined to comment or did not respond to requests for comment.

The alleged masterminds of scam and parents who paid into it could all face up to 20 years in prison if convicted.

Huffman, a former best actress Oscar nominee who is married to actor William H. Macy, starred in ABC's "Desperate Housewives."

Loughlin, best known for her role in the ABC sitcom "Full House" and the recent Netflix sequel "Fuller House," is married to clothing company founder Mossimo Giannulli, who was also charged in the scheme.

'HELP THE WEALTHIEST'

On a call with a wealthy parent, prosecutors said, Singer summed up his business: "What we do is help the wealthiest families in the US get their kids into school ... my families want a guarantee."

Prosecutors said it was up to the universities what to do with students admitted through cheating.

Yale University and the University of Southern California (USC) said in separate statements that they were cooperating with investigators.

"The Department of Justice believes that Yale has been the victim of a crime perpetrated by its former women's soccer coach," Yale said in a statement.

The coach, Rudolph Meredith, resigned in November after 24 years running the women's soccer team. Meredith, who accepted a $400,000 bribe from Singer, is due to plead guilty, prosecutors said. His lawyer declined to comment.

Prosecutors said the scheme began in 2011 and also helped children get into the University of Texas, Georgetown University, Wake Forest University, and the University of California, Los Angeles (UCLA).

Part of the scheme involved advising parents to lie to test administrators that their child had learning disabilities that allowed them extra exam time.

The parents were then advised to choose one of 2 test centers that Singer's company said it had control over: one in Houston, Texas, and the other in West Hollywood, California.

Test administrators in those centers took bribes of tens of thousands of dollars to allow Singer's clients to cheat, often by arranging to have wrong answers corrected or having another person take the exam. Singer would agree with parents beforehand roughly what score they wanted the child to get.

In many cases, the students were not aware that their parents had arranged for the cheating, prosecutors said, although in other cases they knowingly took part. None of the children were charged on Tuesday.

Singer also helped parents stage photographs of their children playing sports or even Photoshopped children's faces onto images of athletes downloaded from the internet to exaggerate their athletic credentials.

Wake Forest said it had placed head volleyball coach Bill Ferguson on administrative leave after he was among the coaches accused of accepting bribes.

According to the criminal complaint, investigators heard McGlashan of TPG Capital listening to Singer tell him to send along pictures of his son playing sports that he could digitally manipulate to make a fake athletic profile.

"The way the world works these days is unbelievable," McGlashan said to Singer, according to court papers.

source: news.abs-cbn.com

Monday, December 17, 2018

Malaysia files criminal charges against Goldman Sachs in 1MDB probe


KUALA LUMPUR, Malaysia -- Malaysia said on Monday it has filed criminal charges against Goldman Sachs and two of the US bank's former employees in connection with a corruption and money laundering probe at state fund 1MDB.

Goldman Sachs has been under scrutiny for its role in helping raise funds through bond offerings for 1Malaysia Development Bhd (1MDB), which is the subject of investigations in at least six countries.

Malaysia's Attorney General Tommy Thomas said criminal charges under the country's securities laws were filed on Monday against Goldman Sachs, its former bankers Tim Leissner and Roger Ng, former 1MDB employee Jasmine Loo and financier Jho Low in connection with the bond offerings.

"The charges arise from the commission and abetment of false or misleading statements by all the accused in order to dishonestly misappropriate $2.7 billion from the proceeds of three bonds issued by the subsidiaries of 1MDB, which were arranged and underwritten by Goldman Sachs," Thomas said in a statement. 

source: news.abs-cbn.com

Sunday, June 3, 2018

Australia's CommBank accepts record penalty in money-laundering case


SYDNEY - Commonwealth Bank of Australia (CBA) agreed to a record penalty of A$700 million ($529.3 million) to settle explosive money laundering charges brought by Australia's financial intelligence agency.

The fine is almost double the amount CBA had set aside to finalize the matter and represents a record penalty for money-laundering and terror finance breaches, the Australian government said on Monday.

Australia's biggest bank breached the relevant laws on 53,750 occasions, according to an agreed statement of facts tendered in court by both parties, where suspicious transactions were repeatedly not reported, and monitoring processes failed.

"The money laundered through the CBA accounts included the proceeds of drug and firearms importation and distribution syndicates – predominantly involving methamphetamine," the court document said.

"Criminal syndicates rely upon money laundering syndicates to import and distribute their drugs."

The proposed settlement will now be presented to Australia's Federal Court for approval, 10 months after the charges were laid.

CBA shares were up 2 percent in early morning trade, in a slightly positive market. Many of the breaches carried maximum penalties of up to A$21 million per contravention, which had left CBA susceptible to being hit by fines running into the billions of dollars.

"While not deliberate, we fully appreciate the seriousness of the mistakes we made," CBA Chief Executive Matt Comyn said in a statement.

"Our agreement today is a clear acknowledgement of our failures and is an important step towards moving the bank forward."

The breaches, many of which CBA blamed on a computer error, triggered a selldown in its share price and a board shake-up, with then-CEO Ian Narev announcing his retirement two weeks later amid a public outcry.

Australia's biggest bank is struggling to rebuild its reputation after a series of scandals revealed flaws in its leadership culture, exposing it to closer regulatory scrutiny, higher compliance costs and potential fines.

Its standing as one of Australia's most venerable companies has been tarnished further by malpractice revealed at an ongoing independent inquiry into the country's financial sector.

CBA had previously booked an A$375 million expense to pay civil penalties and legal fees related to charges in its half year accounts.

The bank said on Monday it would book a A$700 million provision in its fiscal 2018 results, to be released in August.

It has also been ordered to carry an additional $1 billion in reserve capital until it satisfies regulators that it has improved oversight to avoid similar breaches in future.

In a scathing report into how the lender allowed money laundering to flourish, the Australian Prudential Regulatory Authority (APRA) said the lender had a "widespread sense of complacency" and was reactive in dealing with risk.

The bank's "continued financial success dulled the senses of the institution" and exposed it to non-financial risks, said the report released in May.

source: news.abs-cbn.com

Tuesday, June 21, 2016

Bangladesh central bank officials to meet New York Fed over stolen funds


DHAKA - Bangladesh central bank officials will hold a meeting with the New York Federal Reserve next month to try and speed up efforts to recover $81 million stolen by hackers from its account at the Fed, officials in Dhaka said. [$81 million: $81M heist: The money trail]

More than four months after the hackers broke into the computer systems of Bangladesh Bank and transferred money into bank accounts in Philippines using the SWIFT payment network, there is no breakthrough yet in investigations.

Most of the money has disappeared into casinos in the Philippines and remains missing.

While the criminal investigation has made slow progress, Bangladesh Bank has focused on getting back the money, leaning on the New York Fed and the Philippines central bank for help.

Bangladesh Bank deputy governor Mohammad Razee Hassan, who heads its financial intelligence unit, will meet Fed officials in New York on July 15, two officials at the bank in Dhaka said.

Both said the talks follow a meeting in Basel in Switzerland in May where the heads of the Bangladesh central bank, the New York Fed and representatives from SWIFT agreed to help Bangladesh Bank get back its money.

One official involved in the preparations for the meeting said on Tuesday they would also be discussing future arrangements on the central bank's deposits held in New York.

"Its a follow-up meeting for recovery of funds. But there are other things as well. Fed is holding our account. We are their customers, there are things we need to discuss," the official said, speaking on condition of anonymity, citing bank rules.

The official said he was not sure if SWIFT would be part of the meeting. SWIFT had no immediate comment to make.

Bangladesh police investigators have said that SWIFT technicians introduced security loopholes when connecting the messaging network to Bangladesh's first real-time gross settlement (RTGS) system late last year.

SWIFT, a cooperative owned by 3,000 financial institutions, has rejected those allegations and said its messaging platform was not breached in the Bangladesh hack.

source: www.abs-cbnnews.com

Friday, May 20, 2016

Cyber thieves exploit banks' faith in SWIFT transfer network


LONDON/CHICAGO - Shortly after 7 p.m. on January 12, 2015, a message from a secure computer terminal at Banco del Austro (BDA) in Ecuador instructed San Francisco-based Wells Fargo to transfer money to bank accounts in Hong Kong.

Wells Fargo complied. Over 10 days, Wells approved a total of at least 12 transfers of BDA funds requested over the secure SWIFT system.

The SWIFT network - which allows banks to process billions of dollars in transfers each day - is considered the backbone of international banking. In all, Wells Fargo transferred $12 million of BDA's money to accounts across the globe.

Both banks now believe those funds were stolen by unidentified hackers, according to documents in a BDA lawsuit filed against Wells Fargo in New York this year. The two banks declined requests for comment from Reuters.

BDA is suing Wells Fargo on the basis that the U.S. bank should have flagged the transactions as suspicious.

Wells Fargo has countered that security lapses in BDA's own operations caused the Ecuadorean bank's losses. Hackers had secured a BDA employee's SWIFT logon credentials, Wells Fargo said in a February court filing.

SWIFT, an acronym for the Society for Worldwide Interbank Financial Telecommunication, is not a party to the lawsuit.

Neither bank reported the theft to SWIFT, which said it first learned about the cyber attack from a Reuters inquiry.

"We were not aware," SWIFT said in a statement responding to Reuters inquiries. "We need to be informed by customers of such frauds if they relate to our products and services, so that we can inform and support the wider community. We have been in touch with the bank concerned to get more information, and are reminding customers of their obligations to share such information with us."

SWIFT says it requires customer to notify SWIFT of problems that can affect the "confidentiality, integrity, or availability of SWIFT service."

SWIFT, however, has no rule specifically requiring client banks to report hacking thefts. Banks often do not report such attacks out of concern they make the institution appear vulnerable, former SWIFT employees and cyber security experts told Reuters.

The Ecuador case illuminates a central problem with preventing such fraudulent transfers: Neither SWIFT nor its client banks have a full picture of the frequency or the details of cyber thefts made through the network, according to more than dozen former SWIFT executives, users and cyber security experts interviewed by Reuters.

The case - details of which have not been previously reported - raises new questions about the oversight of the SWIFT network and its communications with member banks about cyber thefts and risks. The network has faced intense scrutiny since cyber thieves stole $81 million in February from a Bangladesh central bank account at the Federal Reserve Bank of New York.

It's unclear what SWIFT tells its member banks when it does find out about cyber thefts, which are typically first discovered by the bank that has been defrauded. SWIFT spokeswoman Natasha de Terán said that the organization "was transparent with its users" but declined to elaborate. SWIFT declined to answer specific questions about its policies for disclosing breaches.

Reuters was unable to determine the number or frequency of cyber attacks involving the SWIFT system, or how often the banks report them to SWIFT officials.

The lack of disclosure may foster overconfidence in SWIFT network security by banks, which routinely approve transfer requests made through the messaging network without additional verification, former SWIFT employees and cyber security experts said.

The criminals behind such heists are exploiting banks' willingness to approve SWIFT requests at face value, rather than making additional manual or automated checks, said John Doyle, who held a variety of senior roles at SWIFT between 1980 and 2005.

"SWIFT doesn't replace prudent banking practice" he said, noting that banks should verify the authenticity of withdrawal or transfer requests, as they would for money transfers outside the SWIFT system.

SWIFT commits to checking the codes on messages sent into its system, to ensure the message has originated from a client's terminal, and to send it to the intended recipient quickly and securely, former SWIFT executives and cyber security experts said. But once cyber-thieves obtain legitimate codes and credentials, they said, SWIFT has no way of knowing they are not the true account holders.

The Bank for International Settlements, a trade body for central banks, said in a November report that increased information sharing on cyber attacks is crucial to helping financial institutions manage the risk.

"The more they share the better," said Leo Taddeo, chief security officer at Cryptzone and a former special agent in charge with the FBI's cyber crime division in New York.

SYSTEMIC RISK

SWIFT, a cooperative owned and governed by representatives of the banks it serves, was founded in 1973 and operates a secure messaging network that has been considered reliable for four decades. But recent attacks involving the Belgium-based cooperative have underscored how the network's central role in global finance also presents systemic risk.

SWIFT is not regulated, but a group of ten central banks from developed nations, led by the National Bank of Belgium, oversee the organization. Among its stated guidelines is a requirement to provide clients with enough information to enable them "to manage adequately the risks related to their use of SWIFT."

However, some former SWIFT employees said that the cooperative struggles to keep banks informed on risks of cyber fraud because of a lack of cooperation from the banks themselves. SWIFT's 25-member board of directors is filled with representatives of larger banks.

"The banks are not going to tell us too much," said Doyle, the former SWIFT executive. "They wouldn't like to destabilize confidence in their institution."

Banks also fear notifying SWIFT or law enforcement of security breaches because that could lead to regulatory investigations that highlight failures of risk management or compliance that could embarrass top managers, said Hugh Cumberland, a former SWIFT marketing executive who is now a senior associate with cyber security firm Post-Quantum.

Cases of unauthorized money transfers rarely become public, in part because disagreements are usually settled bilaterally or through arbitration, which is typically private, said Salvatore Scanio, a lawyer at Washington, D.C.-based Ludwig & Robinson. Scanio said he consulted on a dispute involving millions of dollars of stolen funds and the sending of fraudulent SWIFT messages similar to the BDA attack. He declined to name the parties or provide other details.

Theoretically, SWIFT could require its customers, mainly banks, to inform it of any attacks - given that no bank could risk the threat of exclusion from the network, said Lieven Lambrecht, the head of human resources at SWIFT for a year-and-a-half through May 2015.

But such a rule would require the agreement of its board, which is mainly made up of senior executives from the back office divisions of the largest western banks, who would be unlikely to approve such a policy, Lambrecht said.

FIGHT OVER LIABILITY

This week, Vietnam's Tien Phong Bank said its SWIFT account, too, was used in an attempted hack last year. That effort failed, but it is another sign that cyber-criminals are increasingly targeting the messaging network.

In the Ecuadorean case, Wells Fargo denies any liability for the fraudulent transfers from BDA accounts. Wells Fargo said in court records that it did not verify the authenticity of the BDA transfer requests because they came through SWIFT, which Wells called "among the most widely used and secure" systems for money transfers.

BDA is seeking recovery of the money, plus interest. Wells Fargo is attempting to have the case thrown out.

New York-based Citibank also transferred $1.8 million in response to fraudulent requests made through BDA's SWIFT terminal, according to the BDA lawsuit against Wells Fargo.

Citibank repaid the $1.8 million to BDA, according to a BDA court filing in April. Citibank did not respond to a request for comment.

For its part, Wells Fargo refunded to BDA $958,700 out of the $1,486,230 it transferred to an account in the name of a Jose Mariano Castillo at Wells Fargo in Los Angeles, according to the lawsuit. Reuters could not locate Castillo or verify his existence.

ANATOMY OF A CYBER HEIST


The BDA-Wells Fargo case is unusual in that one bank took its correspondent bank to court, thus making the details public, said Scanio, the Washington attorney. BDA acknowledged in a January court filing that it took more than a week after the first fraudulent transfer request for BDA to discover the missing money.

After obtaining a BDA employee's SWIFT logon, the thieves then fished out previously canceled or rejected payment requests that remained in BDA's SWIFT outbox.

They then altered the amounts and destinations on the transfer requests and reissued them, both banks said in filings.

While Wells Fargo has claimed in court filings that failures of security at BDA are to blame for the breach, BDA has alleged that Wells could easily have spotted and rejected the unusual transfers. BDA noted that the payment requests were made outside of its normal business hours and involved unusually large amounts.

The BDA theft and others underscore the need for banks on both sides of such transactions - often for massive sums - to rely less on SWIFT for security and strengthen their own verification protocols, Cumberland said.

"This image of the SWIFT network and the surrounding ecosystem being secure and impenetrable has encouraged complacency," he said. (Additional reporting by Jim Finkle in Boston and Alexandra Valencia in Quito; Editing by David Greising and Brian Thevenot)

source: www.abs-cbnnews.com

Friday, May 6, 2016

White House to crack down on shell companies in US


WASHINGTON, United States - The United States announced measures Thursday to crack down on the use of shell companies inside this country that can be used for tax evasion and money laundering.

The White House said it would close loopholes that allow foreigners to open anonymous US-incorporated companies, and advance legislation requiring banks, brokers and other financial institutions to know and keep records on who actually owns accounts.

New laws will also be proposed requiring companies themselves to know and report their true owners.

The move comes amid a rising tide of government support around the world for fighting tax evasion and other financial crimes that is enabled by the lack of transparency in the banking system.

It also follows shortly after the embarrassing Panama Papers leak of thousands of documents from a Panama law firm showed just how common it is for wealthy people and criminals to hide and move money through anonymous shell companies and little-regulated tax havens.

Powerful officials, including the leaders of Russia, Iceland, Britain and Argentina, were linked by the Panama Papers to offshore tax havens.

The White House said in a statement that the new steps add to international efforts at greater transparency in the global financial system, "so that criminals and tax cheats cannot hide their activities using anonymous shell companies and other legal entities."

"These efforts are critical to preventing criminals from using the global financial system to launder proceeds from corruption or other illegal activities, finance criminal activity or even terrorism, evade international sanctions regimes, or evade taxes."

The Panama Papers, the White House added, "underscore the importance of the efforts the United States has taken domestically, and the efforts we have undertaken with our international partners, to address these shared challenges."

The Panama Papers release focused attention on the fact that a number of US states permit the creation of companies and trusts where the identities of the beneficial owners are unknown, and that foreigners have been using them to bring possibly tainted money into the United States.

The White House also said it would press Congress to pass legislation that would reciprocate the US requirement that banks in foreign countries provide the US Treasury information on any American-owned accounts.

That would then require US banks to provide information to foreign countries on their nationals with US accounts.

source: www.abs-cbnnews.com

Wednesday, May 4, 2016

Bangladesh Bank officials say to meet NY Fed, SWIFT; seek to recover stolen money


DHAKA - Bangladesh's central bank chief will meet the head of the Federal Reserve Bank of New York and a senior executive from global financial messaging service SWIFT next week to seek the recovery of about $81 million stolen by hackers, officials in Dhaka said.

Two Bangladesh Bank officials said the bank believed both the New York Fed and SWIFT bore some responsibility for the February cyber heist. The officials spoke on condition of anonymity since they were not authorized to brief the media.

The bank's governor Fazle Kabir, New York Fed President William Dudley and a SWIFT representative will meet in Basel, Switzerland around May 10, they and another person briefed by the central bank said. It was not immediately clear who would represent SWIFT.

Spokeswomen for SWIFT and the New York Fed declined comment.

Hackers tried to steal nearly $1 billion from Bangladesh Bank's settlement account at the New York Fed in early February by sending fraudulent transfer orders through SWIFT.

Of the 35 transfer orders sent, 30 were blocked. Four transfers to a Philippine bank for a total of $81 million went through while a $20 million transfer to a Sri Lankan company was reversed because the hackers mis-spelled the name of the firm.

"There is a responsibility the New York Fed has to accept," said one of the Bangladesh Bank officials. "If you stopped 30 transactions, why did you not stop the others?

"SWIFT also bears responsibility," the official said. "It's supposed to be a closed system. Now you have seen they have disclosed that there have been attacks previously on its software."

Last week, SWIFT acknowledged that the Bangladesh Bank attack was not an isolated incident but one of several recent criminal schemes that aimed to take advantage of the global messaging platform used by about 11,000 financial institutions.

The other Bangladesh Bank official said lawyers would be present at the meeting. Ajmalul Hussain, a Dhaka-based lawyer hired by the central bank to help it retrieve the funds, could not be reached for comment. His office said he was out of the country.

It was not immediately known if Bangladesh Bank had retained any U.S. or European law firm to help recover the money.

However the bank said in an internal report in March it was considering "preparing the ground to make a legitimate claim for the loss of funds" against the New York Fed "through a legal process."

Both central bank officials said Kabir, the governor, would be accompanied by an official from the accounts and budgeting department on the trip to Basel and would seek the recovery of the stolen funds.

Basel is the headquarters of the Bank for International Settlements, a group of major central banks.

The stolen $81 million was sent to a bank in the Philippines and quickly passed on to casinos and casino agents. Most of it remains missing. However, one junket operator has returned about $10 million to authorities in Manila and promised to hand over another $5 million.

One of the Bangladesh Bank officials expressed confidence that there would be a resolution to the dispute soon, though he didn't provide any evidence for the optimism.

source: www.abs-cbnnews.com

Monday, April 25, 2016

Bangladesh Bank hackers compromised SWIFT software


The attackers who stole $81 million from the Bangladesh central bank probably hacked into software from the SWIFT financial platform that is at the heart of the global financial system, said security researchers at British defense contractor BAE Systems.

SWIFT, a cooperative owned by 3,000 financial institutions, confirmed to Reuters that it was aware of malware targeting its client software. Its spokeswoman Natasha Deteran said SWIFT would release on Monday a software update to thwart the malware, along with a special warning for financial institutions to scrutinize their security procedures.

The new developments now coming to light in the unprecedented cyber-heist suggest that an essential lynchpin of the global financial system could be more vulnerable than previously understood to hacking attacks, due to the vulnerabilities that enabled attackers to modify SWIFT's client software.

Deteran told Reuters on Sunday that it was issuing the software update "to assist customers in enhancing their security and to spot inconsistencies in their local database records."

The software update and warning from Brussels-based SWIFT, or the Society for Worldwide Interbank Financial Telecommunication, come after researchers at BAE, which has a large cyber-security business, told Reuters they believe they discovered malware that the Bangladesh Bank attackers used to manipulate SWIFT client software known as Alliance Access.

BAE said it planned to go public on Monday with a blog post about its findings concerning the malware, which the thieves used to cover their tracks and delay discovery of the heist.

The cyber criminals tried to make fraudulent transfers totaling $951 million from the Bangladesh central bank's account at the Federal Reserve Bank of New York in February.

Most of the payments were blocked, but $81 million was routed to accounts in the Philippines and diverted to casinos there. Most of those funds remain missing.



Investigators probing the heist had previously said the still-unidentified hackers had broken into Bangladesh Bank computers and taken control of credentials that were used to log into the SWIFT system. But the BAE research shows that the SWIFT software on the bank computers was probably compromised in order to erase records of illicit transfers.

Deteran reiterated on Sunday that "the malware has no impact on SWIFT's network or core messaging services."

The SWIFT messaging platform is used by 11,000 banks and other institutions around the world, though only some use the Alliance Access software, Deteran said.

SWIFT may release additional updates as it learns more about the attack in Bangladesh and other potential threats, Deteran said.

SWIFT is also reiterating a warning to banks that they should review internal security.

"While we keep all our interface products under continual review and recommend that other vendors do the same, the key defense against such attack scenarios is that users implement appropriate security measures in their local environments to safeguard their systems," Deteran said.

Adrian Nish, BAE's head of threat intelligence, said he had never seen such an elaborate scheme from criminal hackers.

"I can't think of a case where we have seen a criminal go to the level of effort to customize it for the environment they were operating in," he said. "I guess it was the realization that the potential payoff made that effort worthwhile."

A Bangladesh Bank spokesman declined comment on BAE's findings.

A senior official with the Bangladesh Police's Criminal Investigation Department said that investigators had not found the specific malware described by BAE, but that forensics experts had not finished their probe.

Bangladesh police investigators said last week that the bank's computer security measures were seriously deficient, lacking even basic precautions like firewalls and relying on used, $10 switches in its local networks.

Still, police investigators told Reuters in an interview that both the bank and SWIFT should take the blame for the problems.

"It was their responsibility to point it out but we haven't found any evidence that they advised before the heist," said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police's criminal investigation department, referring to SWIFT.

THWARTING FUTURE ATTACKS

The BAE alert to be published on Monday includes some technical indicators that the firm said it hopes banks could use to thwart similar attacks. Those indicators include the IP address of a server in Egypt the attackers used to monitor use of the SWIFT system by Bangladesh Bank staff.

The malware, named evtdiag.exe, was designed to hide the hacker's tracks by changing information on a SWIFT database at Bangladesh Bank that tracks information about transfer requests, according to BAE.

BAE said that evtdiag.exe was likely part of a broader attack toolkit that was installed after the attackers obtained administrator credentials.

It is still not clear exactly how the hackers ordered the money transfers.

Nish said that BAE found evtdiag.exe on a malware repository and had not directly analyzed the infected servers. Such repositories collect millions of new samples a day from researchers, businesses, government agencies and members of the public who upload files to see if they are recognized as malicious and help thwart future attacks.

Nish said he was highly confident the malware was used in the attack because it was compiled close to the date of the heist, contained detailed information about the bank's operations and was uploaded from Bangladesh.

While that malware was specifically written to attack Bangladesh Bank, "the general tools, techniques and procedures used in the attack may allow the gang to strike again," according to a draft of the warning that BAE shared with Reuters.

The malware was designed to make a slight change to code of the Access Alliance software installed at Bangladesh Bank, giving attackers the ability to modify a database that logged the bank's activity over the SWIFT network, Nish said.

Once it had established a foothold, the malware could delete records of outgoing transfer requests altogether from the database and also intercept incoming messages confirming transfers ordered by the hackers, Nish said.

It was able to then manipulate account balances on logs to prevent the heist from being discovered until after the funds had been laundered.

It also manipulated a printer that produced hard copies of transfer requests so that the bank would not identify the attack through those printouts, he said.

source: www.abs-cbnnews.com

Friday, April 22, 2016

Bangladesh Bank exposed to hackers by cheap switches, no firewall: police


DHAKA -- Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world's biggest cyber heists said.

The shortcomings made it easier for hackers to break into the Bangladesh Bank system earlier this year and attempt to siphon off nearly $1 billion using the bank's SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police's criminal investigation department.

"It could be difficult to hack if there was a firewall," Alam said in an interview.

The lack of sophisticated switches, which can cost several hundred dollars or more, also means it is difficult for investigators to figure out what the hackers did and where they might have been based, he added.

Experts in bank security said that the findings described by Alam were disturbing.

"You are talking about an organization that has access to billions of dollars and they are not taking even the most basic security precautions," said Jeff Wichman, a consultant with cyber firm Optiv.

Tom Kellermann, a former member of the World Bank security team, said that the security shortcomings described by Alam were "egregious," and that he believed there were "a handful" of central banks in developing countries that were equally insecure.

Kellermann, now chief executive of investment firm Strategic Cyber Ventures LLC, said that some banks fail to adequately protect their networks because they focus security budgets on physically defending their facilities.

POLICE BLAME BANK, SWIFT

Cyber criminals broke into Bangladesh Bank's system and in early February tried to make fraudulent transfers totalling $951 million from its account at the Federal Reserve Bank of New York.

Most of the payments were blocked, but $81 million was routed to accounts in the Philippines and diverted to casinos there. Most of those funds remain missing.

The police believe that both the bank and SWIFT should take the blame for the oversight, Alam said in an interview.

"It was their responsibility to point it out but we haven't found any evidence that they advised before the heist," he said, referring to SWIFT.

A spokeswoman for Brussels-based SWIFT declined comment.

SWIFT has previously said the attack was related to an internal operational issue at Bangladesh Bank and that SWIFT's core messaging services were not compromised.

A spokesman for Bangladesh Bank said SWIFT officials advised the bank to upgrade the switches only when their system engineers from Malaysia visited after the heist.

"There might have been a deficiency in the system in the SWIFT room," said the spokesman, Subhankar Saha, confirming that the switch was old and needed to be upgraded.

"Two (SWIFT) engineers came and visited the bank after the heist and suggested to upgrade the system," Saha said.

GLOBAL WHODUNIT

The heist's masterminds have yet to be identified.

Bangladesh police said earlier this week they had identified 20 foreigners involved in the heist but they appear to be people who received some of the payments, rather than those who initially stole the money.

Bangladesh Bank has about 5,000 computers used by officials in different departments, Alam said.

The SWIFT room is roughly 12 feet by 8 feet, a window-less office located on the eight floor of the bank's annex building in Dhaka. There are four servers and four monitors in the room.

All transactions from the previous day are automatically printed on a printer in the room.

The SWIFT facility should have been walled off from the rest of the network. That could have been done if the bank had used the more expensive, "managed" switches, which allow engineers to create separate networks, said Alam, whose institute includes a cyber-crime division.

Moreover, considering the importance of the room, the bank should have deployed staff to monitor activity round the clock, including weekends and holidays, he said.

source: www.abs-cbnnews.com

Tuesday, April 19, 2016

Conflicting statements muddle $81-million dirty money trail


Conflicting statements during a Senate hearing on Tuesday failed to shed light on how $81 million that was stolen from Bangladesh's central bank ended up in Philippine casinos.

The hearing opened under a cloud of suspicion after a lawyer denied authenticating the sworn statement of Mark Palmares, a courier of foreign exchange broker Philrem, who detailed how he delivered a portion of the money to Solaire casino.

Philrem owners Michael Bautista and Salud Bautista, Rizal Commercial Banking Corp (RCBC) branch manager Maia Deguito and casino junket operator Kim Wong later gave contradicting accounts to senators.

Unidentified hackers breached the Bangladesh central bank's account with the Federal Reserve in February and wired $81 million to RCBC. The money passed through Philrem before ending up in several casinos.

Senator Bam Aquino asked the Bautista couple, Deguito and Wong if they were willing to open their phone call logs to verify their testimonies. All four agreed.

Wong alleged that he received instructions by phone from Michael Bautista, asking him to pick up money from his house.

"Nagkausap kami sa phone at sabi niya may ganitong pera, at kunin na daw sa bahay," said Wong.

Bautista, however, said he never spoke to Wong on the phone.

Salud Bautista, on the other hand, claimed it was Deguito who instructed her to transfer money to Wong. Deguito denied the allegation.

"Wala akong instructions about cash deliveries, I would like to believe na derecho na sila [Wong and Philrem] nag-uusap. Ang instruction lang sa akin was to credit everything to Philrem," she said.

Of the $81 million, $62 million was converted into pesos and transferred to casinos while the remaining $18 million was delivered to another casino agent, Weikang Xu, whose whereabouts are unknown, according to Salud Bautista.

Bangladeshi authorities said Monday they were investigating 12 Filipinos for alleged involvement in the heist.

The daring caper exposed loopholes in Philippine anti-money laundering and banking laws that make the country a dirty money destination.

Casinos are exempt from scrutiny by the Anti-Money Laundering Council under present laws.

Also during the hearing, Deguito said admitted she lied to RCBC in her reply to a memorandum asking her to explain the questionable deposits.

Degutio said it was Wong, not a certain Jessie Christopher Lagrosas as she had told RCBC, who asked her to transfer the stolen money to the account of businessman William Go.

"During that time that I answered the show cause I wasn't ready to reveal the personalities behind those referred accounts," said.

When asked by Senator Serge Osmeña III if she lied in her response to the RCBC show cause order, Deguito said, "If you will consider that lying, yes, I would acknowledge."

RCBC has filed criminal charges against Deguito and former RCBC Jupiter branch staff Angela Torres for allegedly opening the accounts that received the money under fictitious names.

source: www.abs-cbnnews.com

Tuesday, April 12, 2016

RCBC chief to take steps to return Bangladesh funds


MANILA - Rizal Commercial Banking Corporation (RCBC) Lorenzo Tan on Tuesday promised to urge the bank's board members to return part of the $81 million stolen from Bangladesh if they are found liable in laundering the fund.

At a hearing led by the Senate Blue Ribbon Committtee, Tan first admitted that RCBC's market value has fallen after four local banks in their Jupiter branch received the stolen money last February 5.

Senator Ralph Recto suggested that RCBC's market position could be improved if it pledges to return some $50 million out of the total funds.

"Assuming that the RCBC gives this to the Bank of Bangladesh, your P5 billion profit minus P2.2 billion ($50 million), kita pa rin kayo ng P3 billion," Recto said.

"Maybe your market price will improve to what it used to be and you would gain from that anyway. Maybe your stock price will hit whatever value and you make the protocol corrections."

In reply, Tan conceded that, "Our business is an actuarial business... We either lose money on bad loans, bad trades or operational losses like this one."

He added that on the average, RCBS provisions P1 billion to P2 billion every year on losses from bad transactions like those involving the Bangladesh funds.

Given this, he promised: "If we're found liable, I would recommed to the board to set aside a certain amount of money."

- ABS-CBN News Channel, 12 April 2015

source: www.abs-cbnnews.com

Tuesday, April 5, 2016

Senate digs deeper into $81-M laundering heist


MANILA - Sacked bank manager Maia-Santos Deguito, junket operator Kim Wong and representatives of PhilRem Services Corp. - all key personalities tagged in an $81-million laundering heist - are expected to face off at a Senate hearing Tuesday.

Speaking to radio dzMM, Senate President Pro-Tempore Ralph Recto said this will be the first time that the three parties will all be present during the Senate investigation on how stolen funds from the Bangladesh Bank reached Philippine banks and casinos.

"Maganda itong pagdinig na ito dahil maghaharap-harap sila mamaya," Recto predicted.

The three parties earlier presented conflicting accounts of their alleged involvement in one of the world's biggest cyber heist.

At the third Senate hearing last Tuesday, Wong said that Deguito and foreign nationals Gao Shuhua and Ding Zhize were responsible for bringing in the "dirty money" into the Philippines.



He also claimed that Deguito alone approved the documents for the RCBC dollar accounts opened in May 2015, which received the stolen funds from the Bangladesh Bank in February 2016.

Wong added that he only referred one foreigner - Gao - to Deguito, contrary to her earlier claim that she met the owners of the four dollar accounts at Solaire casino through Wong's referral.

The junket operator also said that Deguito delivered at least P20 million in cash to him at the Solaire hotel on February 5. Another P80 million, he said, was delivered to him by Philrem's Concon Bautista on the same day.

This runs counter to the statement of former RCBC Jupiter-Makati branch senior customer relationship officer Angela Torres who said that the P20 million was loaded into the car of another businessman, William Go.

Philrem president Salud Bautista also opposed Wong, saying that the money was received by Weikang Xu, who has been described as a "registered" junket agent in the gaming business.


 The Bautistas also denied Wong's claim that they still hold an estimated $17 million from the illegal funds.

In the interview, Recto said the Senate will trace the real connections of the names tagged in the scandal.

"We want to dig deeper. Ano ba iyung relationship? Kasi lahat sila magkaka-kilala, kung tutuusin natin," he said.

The Senate has invited Bureau of Internal Revenue (BIR) Commissioner Kim Henares to today's hearing to shed light on the tax compliance of the involved parties.

Recto added that the hearing will also attempt once again to trace the remainder of the stolen funds that could be returned to Bangladesh.

The fourth hearing will also tackle the scam's toll on overseas Filipino workers (OFWs) as Philippine banks face tighter scrutiny from their foreign counterparts.

 Watch the livestream of the hearing at: www.livestream.com/anctelevision.

source: www.abs-cbnnews.com

Tuesday, March 29, 2016

Kim Wong tags 2 foreigners in $81-M heist


MANILA - Casino junket operator Kim Wong on Tuesday washed his hands of the $81-million laundering heist and instead blamed dismissed Rizal Commercial Banking Corp. (RCBC) branch manager Maia Santos-Deguito and two foreigners.

Speaking before the Senate, Wong said one of the two foreigners was a junket operator and a "high-roller" in the casino industry.

“Dalawang foreigners ang nagpasok ng $81 million. Isa sa kanila ay matagal ng labas-pasok sa Pilipinas at kilalang junket agent at isang high roller,” he said.

Wong said he had prepared for the Senate a sealed envelope containing copies of the passports of the two foreigners.

Senators prodded him to open the envelope and disclose the names of the two foreigners. Wong later identified the two as Gao Shuhua from Beijing and Ding Zhize from Macau, China.

Wong said Gao had been his "junket agent" since 2007. He also said Gao once lost P450 million during a week of gambling in Solaire.

He also claimed that Deguito alone approved the documents for the RCBC dollar accounts opened in May 2015, which received the stolen funds from the Bangladesh Bank in February 2016.

Wong added that he only referred one foreigner - Gao - to Deguito, contrary to her earlier claim that she met the owners of the four dollar accounts at Solaire casino through Wong's referral.

Wong said he met Deguito and Gao at his office in Solaire in 2015 to open the dollar account.

During their meeting, Wong claimed that Deguito suggested a corporate account and that she needed the names of 5 people to open the account. He also claimed that Deguito asked for $2,500 to open the accounts, which Gao approved.

DAY OF HEIST

In his testimony, Wong claimed that he received a message from Gao on February 4, 2016 about his plan to invest in the Philippines.

He said Gao wanted to close his souring casino business in Macau and invest instead in casino junkets in Manila.

The next day, Wong said he received instructions from Gao and Ding that they would be getting a huge amount of money in the dollar accounts in Deguito's branch. When Wong initially checked with Deguito, however, the money had not come in.

Deguito then called several times to say that several dollar deposits - $6 million, $25 million, $30 million and $20 million - had come in.

This jibes with the account of Sen. Teofisto Guingona III that a total of 35 payment instructions came out allowing the transfer of funds from the Bangladesh Bank account in the New York Federal Reserve. Only five payment instructions, however, were allowed before the transactions were stopped.

$850-M could have entered RCBC: Senate

Wong said of the $81 million stolen funds, an estimated $63 million went to Solaire while an estimated $17 million went to Philrem.

Wong said at least 80 million pesos in cash were then delivered by Philrem's Concon Bautista and another 20 million pesos in cash by Deguito on the same day, February 5.

Philrem president Salud Bautista, however, said she personally delivered 80 million pesos, and not 90 million pesos, to Solaire. She said the money was received by Weikang Xu, who has been described as a "registered" junket agent in the gaming business.

WONG PICKED UP MONEY AT BAUTISTA'S HOUSE

During the hearing, Wong showed a photo of Deguito's car being serviced by the valet at Solaire at 7:57 p.m. on February 5.

He also showed a photo of the 100 million pesos being deposited at Solaire at 8:07 p.m. Wong said he took the photo himself.

After the transaction, Wong claimed he had dinner with Deguito and Concon Bautista at a Korean restaurant inside Solaire.

He said he also picked up a total of 300 million pesos and $5 million in cash from Bautista's house on February 9, February 10, and February 14.

The 300 million pesos went to a junket agent in Solaire, Wong said.

He said Gao and Ding wanted the $5 million to themselves, which he said was not part of the deal.

"Ang gentlemen's agreement, walang kukuning cash. Wala sa rules eh. So kaya natira ang $4.63 million dahil nag-aaway na kami. Ang kinuha nila $370,000. Nagagalit na ako kasi wala sa usapan na kukuha ng cash. Kasi itong negosyo namin usapan lang eh, tiwala lang. Sabi ko, 'Niloloko niyo na ako,'" he said.

Wong claimed the $4.63 million was still in safekeeping at Solaire and that he is willing to return the money to the Bangladesh Bank.

source: www.abs-cbnnews.com

Sunday, March 27, 2016

Bangladesh asks NY Fed, PH to help retrieve stolen money


DHAKA -- The new governor of Bangladesh's central bank has sent formal letters to the New York Fed, as well as central bank and money laundering chiefs in the Philippines, asking them to help recover its stolen $81 million, a senior central bank official said on Sunday.

The news came as Finance Minister Abul Maal Abdul Muhith said the government was waiting to hear the recommendations of an investigation committee to decide whether the central bank should file a suit against the Fed after one of the biggest cyber heists in history.

Unknown hackers breached the computer systems of Bangladesh Bank in early February and attempted to steal $951 million from its account at the Federal Reserve Bank of New York, which it uses for international settlements.

Some attempted transfers were blocked, but $81 million was transferred to accounts in the Philippines belonging to casino operators.

The central bank official told Reuters that Fazle Kabir, who became governor a week ago, had asked the NY Fed chief and the heads of the Philippines central bank and money laundering agency to assist Bangladesh in retrieving the funds.

Kabir asked the Fed to investigate if there had been any lapses or whether it had any involvement in the heist, the official said.

Kabir sent separate letters to the ambassador of Bangladesh at the U.N. headquarters, and its permanent representative, urging them to pursue the NY Fed.

The previous central bank governor, Atiur Rahman, resigned earlier this month after details emerged in the Philippines that $30 million of the money was delivered in cash to a casino junket operator in Manila, while the rest went to two casinos.

"In his letters the new governor sought all kind of help from them to retrieve the stolen money as we are following multiple efforts for the sake of the country," the official said.

Last week Bangladesh also formally sought assistance from the U.S. Federal Bureau of Investigation to track down the cyber crooks.

Bangladesh has appointed law firms to weigh its options vis-à-vis the NY Fed.

"We will wait till the recommendations of the government- formed investigation committee," Finance Minister Abul Maal Abdul Muhith told Reuters on Sunday, referring to a three-member committee headed by Mohammad Farash Uddin, a former central bank governor.

"We will act as per its recommendations."

Earlier this month Muhith said Dhaka might resort to suing the Fed to recover the money: "The Fed must take responsibility," he said.

source: www.abs-cbnnews.com

Wednesday, March 23, 2016

RCBC apologizes for staff's role in $81-M heist


MANILA - Rizal Commercial Banking Corporation (RCBC) has issued an apology to the public after its employees were linked to the $81-million money laundering heist.

In an advertisement printed on selected broadsheets on Wednesday, the bank said it will cooperate with the investigations of the Senate and the Anti-Money Laundering Council (AMLC).
    
“RCBC offers its sincerest apologies for the involvement of its personnel in the money laundering scheme now subject of Senate Blue Ribbon and AMLC investigations. Within legal bounds, RCBC will cooperate with these and any subsequent government proceedings,” the bank said.

It added that it is conducting its own inquiry to identify and address any weaknesses in its controls and operations, and it will take appropriate actions against any bank officer or staff found guilty of negligence.

“RCBC recognizes the evils wrought by money laundering and will do its utmost in the fight against it,” RCBC said.

On Tuesday, the bank said it had fired the manager of its Jupiter branch, Maia Deguito, and her assistant, Angela Torres, over their alleged involvement in the money laundering scam.

It added that it will file charges against Deguito and Torres next week.

Deguito's camp earlier accused RCBC of covering up the role of some of its officials in the scandal.

Her legal counsel, Atty. Ferdinand Topacio, said RCBC is pinning her client as a "scapegoat" in the transfer of stolen money from a Bangladesh central bank account into four RCBC accounts.

source: www.abs-cbnnews.com

Thursday, March 17, 2016

Faulty printer implicated in $81-M bank heist


DHAKA, Bangladesh - A printer fault at Bangladesh's central bank meant that overseas queries about suspicious transactions went unanswered, according to a report seen by AFP Wednesday on the $81 million cyber heist that sent shockwaves through the banking world.

The report, filed to police on Tuesday, recounts the events leading to the discovery of the dramatic theft from an overseas account of Bangladesh Bank.

It says that because of a printer and software problem, it took the Bangladesh central bank nearly four days to ask banks across the globe to halt payments to the hackers.

They tried to steal around $1 billion and got away with $81 million from the impoverished country's coffers.

How a hacker's typo helped stop a billion dollar bank heist

Central bank governor Atiur Rahman and two of the deputy governors have lost their jobs over the scandal, which has hugely embarrassed the government and raised alarm over the security of the country's foreign exchange reserves of over $27 billion.

On Wednesday the government, which has said it was kept in the dark about the losses for weeks, also removed its most senior banking official M. Aslam Alam from his position.

The hackers managed to transfer $81 million on February 5 -- a Friday, when Bangladesh Bank is closed -- from its account with the Federal Reserve Bank of New York, transferring the cash electronically to accounts in the Philippines.

In the report seen by AFP, the bank's joint director Zubair bin Huda said engineers were unable to fix the printers until February 6, a day after the New York bank sent queries about four separate transactions.

"Since such glitches happened before, we thought it was a common problem just like any other day," Huda said in the report.

Bangladesh Bank tried to contact New York on February 6 by email, fax and phone to ask that the transactions be suspended when it realized that the SWIFT interbank messaging system which it normally used was not working properly, Huda said.

"We realized that the SWIFT system being ineffective was an important issue, and therefore we sent an email to Federal Reserve Bank of New York at 1:30pm on February 6 to halt all types of payment processing," he said.

But they were unable to get through as the US bank was closed for the weekend.

It was not until Monday afternoon that the central bank's main server was again working properly and officials were able to send the formal requests to stop the payments to six banks across the globe.

But by that time $81 million had been transferred from Bangladesh Bank's New York account to a bank in the Philippines.

PHILIPPINES ACCOUNT

The money was later transferred to an account belonging to ethnic Chinese businessman William So Go, a Philippine Senate committee heard this week.

The money was then transferred to Philippine casinos, Julia Bacay-Abad from the Philippines' anti-money laundering council told the hearing on Tuesday.

Go's lawyer said the businessman's signatures for his now-frozen RCBC account, which were used to transfer the money, had been forged.

'Money trail in laundering scam ends with casinos'

Casino junket operator got $30-M in cash

Another transfer of $20 million was halted by a bank in Sri Lanka at Bangladesh Bank's request.

As details of the scandal emerged last week, Bangladesh Finance Minister A.M.A. Muhith threatened to sue the New York Fed.

The US-based bank said in a statement on its website that the payment instructions "were fully authenticated by the SWIFT messaging system in accordance with standard authentication protocols".

LACK OF TRANSPARENCY

Meanwhile, the $81 million heist has also put a spotlight on the Philippines' strict bank secrecy law. Finance Secretary Cesar Purisima earlier said the Philippines along with Lebanon are some of the only countries in the world left with a bank secrecy law.

Even Switzeland, which is known for its strict banking system, has been open to relax the law.

PH one of few countries with bank secrecy law

According to a law enacted in 1955, all bank deposits in the Philippines are absolutely confidential and may not be examined "except upon written permission of the depositor, or in cases of impeachment, or upon order of a competent court in cases of bribery or dereliction of duty of public officials, or in cases where the money deposited or invested is the subject matter of the litigation."

Last year, Internal Revenue Commissioner Kim Henares said the government is preparing a draft bill that would lift or ease the bank secrecy law to strengthen government's tax collection efforts. Congress, however, thumbed it down.

Makati Business Club chairman Ramon del Rosario said he found it "uncomfortable" that the bank secrecy law was invoked during the Senate investigation on the $81 million heist.

Senator Sergio Osmena III said the international financial community has already taken notice of loopholes in Philippine laws.

"As far as I am concerned, sunlight is the best medicine. Transparency in a democratic setting is the best safeguard against corruption and against bad public officials," he said.

“Despite all the warnings from the FATF (Financial Action Task Force), we still don’t have the political will to plug those loopholes. I hope that this will teach us a lesson because the international financial community has just taken notice of how big our loopholes are and it’s become an international incident because [81 million] dollars was hacked from the account of Bangladesh Central Bank and laundered through the Philippine financial system." With Agence France-Presse

Osmena: Political will needed to plug laundering loopholes

source: www.abs-cbnnews.com

Monday, March 14, 2016

Key figure in money-laundering case can't attend Senate probe


MANILA - Kam Sin Wong, also known as Kim Wong, will not be able to attend the Senate hearing on the $81-million money laundering case involving Rizal Commercial Banking Corporation (RCBC), his lawyer said Monday.

In a letter sent to the Senate Blue Ribbon Committee, Victor Fernandez, Wong's counsel, said the latter is currently out of the country for medical treatment.

Fernandez said Wong left the country March 4, 2016, supposedly before the "instant controversy" broke out.

(The Philippine Daily Inquirer first reported about an alleged $100-million money-laundering on February 29, 2016, and it was reported on March 3 that the the Anti-Money Laundering Council (AMLC) had frozen the suspected accounts used in the transaction. Wong left the following day. -- Ed's note.)

He likewise asked the Senate to keep his client's medical records private, assuring them that Wong will cooperate once he is done with his medical treatment.

In an exclusive interview with ABS-CBN News, RCBC Jupiter branch manager Maia Santos Deguito said Wong, who owns one of six bank accounts allegedly used in moving millions of dollars stolen by unknown hackers from the Bank of Bangladesh and laundered in casinos in Parañaque City, is a friend of RCBC president and CEO Lorenzo Tan.

Deguito said Kim Wong referred to her four persons who opened on May 2015 the other bank accounts linked to the scam: Michael Francisco Cruz, Jessie Christopher Lagrosas, Alfred Santos Vergara and Enrico Teodoro Vasquez.

Manager tags RCBC president's 'friend' in laundering scandal

Tan and Deguito are expected to attend the hearing of the Senate blue ribbon committee and the congressional oversight committee about the controversy on Tuesday afternoon.

source: www.abs-cbnnews.com

Bangladesh bank says hackers tried to steal $951 million


DHAKA - Bangladesh's central bank confirmed on Sunday that cyber criminals tried to withdraw $951 million from its U.S. bank account, as the country's finance minister said he first got to know of one of the biggest bank heists in history through the media.

Unknown hackers breached the computer systems of Bangladesh Bank, and transferred $81 million from its account at the Federal Reserve Bank of New York to casinos in the Philippines between Feb. 4 and Feb. 5.

Finance Minister Abul Maal Abdul Muhith said the central bank did not inform him about the heist, and that he learned of it only a month later when news first appeared in the media.

"I am very much unhappy about the handling of the issue," he told reporters in his office in Dhaka.

He said he planned to meet Prime Minister Sheikh Hasina on Sunday and decide what action to take against central bank officials.

The cyber heist and its global scale has left Bangladesh officials scrambling to find answers and recover the money that was lost.

The incident has also left other banks and businesses around the world eager to learn more, so they can review their own networks for signs that they are vulnerable to similar attacks or might already have been breached.

Bangladesh Bank said in a Facebook post that hackers made 35 separate requests to withdraw money from its Fed account, totalling $951 million, confirming earlier reports.

Officials have said the account, used for international settlements, had billions of dollars.

Bangladesh officials expect that it would be difficult to recover the money that has already gone out of the banking channels.

Officials have said that the money that made its way to the Philippines was further diverted to casinos and then possibly on to Hong Kong.

After a meeting with the investigators and central bank officials on Sunday, Mohammad Aslam Alam, the secretary of the banking division of the ministry of finance, said recovery could take months.

But he added that the Philippines had managed to freeze $68,000, which Dhaka should be able to recover.

The Bangladesh Nationalist Party (BNP), the largest opposition party, demanded the resignation of the central bank governor and the finance minister.

source: www.abs-cbnnews.com

Thursday, March 10, 2016

How a hacker's typo helped stop a billion dollar bank heist


DHAKA - A spelling mistake in an online bank transfer instruction helped prevent a nearly $1 billion heist last month involving the Bangladesh central bank and the New York Fed, banking officials said.

Unknown hackers still managed to get away with about $80 million, one of the largest known bank thefts in history.

The hackers breached Bangladesh Bank's systems last month and stole its credentials for payment transfers, two senior Bangladesh Bank officials said.

They then bombarded the Federal Reserve Bank of New York with nearly three dozen requests to move money from the Bangladesh bank's account there to entities in the Philippines and Sri Lanka, the officials said.

Four requests to transfer a total of about $81 million to the Philippines went through, but a fifth, for $20 million, to a Sri Lankan non-profit organisation got held up because the hackers misspelled the name of the NGO.

The full name of the non-profit could not be learned. But one of the officials said the hackers misspelled "foundation" in the NGO's name as "fandation", prompting a routing bank, Deutsche Bank, to seek clarification from the Bangladesh central bank, which stopped the transaction.

Deutsche Bank declined to comment.

At the same time, the unusually high number of payment instructions and the transfer requests to private entities - as opposed to other banks - made the Fed suspicious, which also alerted the Bangladeshis, the officials said.

The details of how the hacking came to light and was stopped before it did more damage have not been previously reported.

Bangladesh Bank has billions of dollars in a current account with the Fed, which it uses for international settlements.

The transactions that got stopped totalled between $850 million and $870 million, one of the officials said.

Last year, Russian computer security company Kaspersky Lab said a multinational gang of cyber criminals had stolen as much as $1 billion from as many as 100 financial institutions around the world in about two years.

Iraqi dictator Saddam Hussein's son Qusay took $1 billion from Iraq's central bank on the orders of his father on the day before coalition forces began bombing the country in 2003, American and Iraqi officials have said. In 2007, guards at the Dar Es Salaam bank in Baghdad made off with $282 million.

MONEY RECOVERED

Bangladesh Bank has said it has recovered part of the money that was stolen, and is working with anti-money laundering authorities in the Philippines to try to recover the rest of the funds.

The recovered funds refer to the Sri Lanka transfer, which got stopped, one of the officials said.

The dizzying, global reach of the heist underscores the growing threat of cyber crime and how hackers can find weak links in even the most secure computer networks to steal money and wreak havoc.

More than a month after the attack, Bangladeshi officials are scrambling to trace the money, shore up security and identify weaknesses in their systems. They said there is little hope of ever catching the hackers, and it could take months before the money is recovered, if at all.

Security experts said the perpetrators had deep knowledge of the Bangladeshi institution's internal workings, likely gained by spying on bank workers.

The Bangladesh government, meanwhile, is blaming the Fed for not stopping the transactions earlier.

Finance Minister Abul Maal Abdul Muhith told reporters on Tuesday that the country may resort to suing the Fed to recover the money.

"The Fed must take responsibility," the minister said.

The New York Fed has said that its systems were not breached and that it has been working with the Bangladesh central bank since the incident occurred.

The hacking of Bangladesh Bank happened sometime between Feb. 4 and Feb. 5, over the Bangladeshi weekend, which falls on a Friday, the officials said. The bank's offices were shut for the holiday.

Initially, the central bank was not sure if their system had been breached, but then cyber security experts, brought from the outside to investigate, found hacker "footprints" that suggested their system had been compromised, the officials said.

These experts could also tell that the attack originated from outside Bangladesh, they said. The bank is still looking into how they got into the system and an internal investigation is also continuing, they said.

The bank suspects money sent to the Philippines was further diverted to casinos there, the officials said.

The Philippine Amusement and Gaming Corp, which oversees the gaming industry there, said it has launched an investigation. The country's anti-money laundering authority is also working on the case.

source: www.abs-cbnnews.com