KUALA LUMPUR 30 Sept. - Polis hari ini melancarkan Ops Albatross bagi mengesan suspek yang disyaki terlibat dalam kes menggodam mesin pengeluaran wang automatik (ATM) di tiga buah negeri dan ibu n sejak kelmarin hingga mengakibatkan kerugian yang dianggarkan hampir RM3 juta.
Pengarah Jabatan Siasatan Jenayah Komersial (JSJK) Bukit Aman, Datuk Seri Mortadza Nazarene berkata, pihaknya turut mengedarkan beberapa keping gambar suspek yang dirakamkan oleh kamera litar tertutup (CCTV) di bank-bank terlibat.
''Polis komited untuk membanteras jenayah ini sehingga ke akar umbi bagi mengekalkan keyakinan rakyat terhadap institusi kewangan tempatan.
"Sehubungan itu, polis meminta kerjasama orang ramai untuk tampil ke hadapan bagi membantu siasatan polis," katanya dalam kenyataan hari ini.
Akhbar hari ini melaporkan Affin Bank Berhad serta Affin Islamic Bank Berhad (Affin Bank), Bank Islam (M) Berhad dan dua lagi bank mengalami kerugian yang dianggarkan hampir RM3 juta setelah satu sindiket yang didalangi warga Amerika Latin menggodam ATM bank-bank terlibat di beberapa buah negeri.
Mortadza seterusnya berkata, siasatan awal menunjukkan beberapa lelaki dipercayai warga asing telah membuka panel bahagian atas ATM menggunakan 'common key' sebelum memasukkan cakera padat (CD) yang mengandungi malware dikenali sebagai 'ulssm.exe' ke dalam unit pemprosesan komputer (CPU) mesin berkenaan.
"Selepas mengeluarkan CD, panel akan ditutup semula dan ahli sindiket akan mengeluarkan kesemua wang di dalam ATM tersebut menggunakan panel kekunci dengan memasukkan kod tertentu yang diterima melalui panggilan telefon dari rakan sejenayah.
"Slot kad ATM akan disumbat dengan objek seperti kad SIM, kertas atau puntung rokok bagi menyekat akses pengeluaran wang dilakukan oleh pengguna lain," ujarnya.
Artikel Penuh: http://www.utusan.com.my/utusan/Jenayah/20141001/je_02/Polis-lancar-Ops-Albatross-buru-suspek-godam-ATM#ixzz3Erkcr0no
© Utusan Melayu (M) Bhd
SELASA, 30 SEPTEMBER 2014 @ 6:11 PM
Polis siar rakaman imej suspek sindiket godam ATM
KUALA LUMPUR: Polis Diraja Malaysia (PDRM) hari ini menyiarkan rakaman imej beberapa individu dipercayai warga asing yang terbabit dalam sindiket penggodam mesin juruwang automatik (ATM) membabitkan kerugian lebih RM3 juta selepas menggodam 17 mesin ATM di Selangor, Melaka dan Johor, sejak Jumaat lalu.
Rakaman imej berkenaan diambil daripada sistem rakaman kamera litar tertutup (CCTV) di lokasi mesin ATM yang digodam itu.
"Siasatan awal menunjukkan bahawa terdapat beberapa lelaki yang dipercayai warga asing, telah membuka panel bahagian atas ATM dengan menggunakan 'common key', kemudian satu cakera padat (CD) dimasukkan ke dalam CD-ROM yang terdapat di dalam mesin berkenaan untuk menyuntik Malware yang dikenali sebagai "ulssm.exe"."Selepas mengeluarkan CD, panel akan ditutup semula dan ahli sindiket akan mengeluarkan kesemua wang di dalam ATM tersebut menggunakan panel kekunci dengan memasukkan kod tertentu yang diterima melalui panggilan telefon dari rakan sejenayah. Slot kad ATM akan disumbat dengan objek berupa kad sim, kertas ataupun punting rokok bagi menyekat akses pengeluaran wang oleh pengguna lain," demikian menurut kenyataan Jabatan Siasatan Jenayah Komersial (JSJK) PDRM yang dikeluarkan di akaun Facebook rasmi badan itu, hari ini.
http://www.bharian.com.my/node/8829
Latino gang strikes at another ATM
BY ATIQA HAZELLAHAND HARIZ MOHD - 1 OCTOBER 2014 @ 8:16 AM
KUALA LUMPUR: AS police upped their ante in tracking down those behind the theft of more than RM3 million from automated teller machines (ATM), they discovered almost simultaneously yesterday that the gang behind the spree had struck again.
This time, they grabbed more than RM90,000.
The latest hit, the 17th case in a span of four days, was reported about 2pm, just when Bukit Aman federal police headquarters renamed their operation to track down the syndicate from “Op Godam” to “Op Albatross”.
The latest case, which brings the amount of losses suffered by banks to more than RM3 million, came amid revelations by Symantec Corporation, an anti-virus software maker, that it had in May issued a global alert warning to corporations about the dangers posed by the ATM Trojan virus, allegedly the same one the robbers banked on for their gain.
Triggered by a series of ATM thefts reported worldwide, the anti-virus software maker issued a global warning last May on the notorious computer virus known as “ulssm.exe”.
It is understood that banks in Malaysia were red-flagged on this ATM malware around the same time.
Symantec, in its website, said “ulssm.exe”, also known as a “Backdoor.Padpin” is a type of Trojan virus that targeted ATMs.
Police believe that the same syndicate, a Latin American gang, was behind all the cases.
They have since Saturday hit ATMs in Petaling Jaya, Serdang, Kajang, Shah Alam, Klang, Johor and Malacca. The one they hacked into yesterday was in Jalan Imbi here.
According to a source, the gang targeted NCR 5877 model ATMs which runs on software considered to be outdated.
“This model lacks security features compared with newer ones.
“The gang struck only NCR 5877 model ATMs of the because of the absence of an alarm system on its upper panel.
“These type of ATMS were also targeted because they use the Windows XP or Windows 7 operating system, which have not been updated for more than 12 years,” he said.
Symantec had cautioned how the virus would self-destruct if it failed to gain control of the ATM’s keypad and cash dispenser, avoiding raising alarms.
The virus could also temporarily disable local networks to avoid triggering the bank’s alarm system, which could happen when attempts for unlawful withdrawals were made.
The suspects, aged between 20 and 30 and between 175cm and 180cm in height, took no more than 20 minutes to empty out cash from the machines.
In Malacca, Deputy Home Minister Datuk Seri Dr Wan Junaidi Tuanku Jaafar said banks had been advised to replace ATMs that were susceptible to hacking with those that were more virus-resilient.
He allayed public concern, saying that the country’s cyber-security system remained safe and protected as the modus operandi used by the syndicate was via remote.
Tiada ulasan:
Catat Ulasan
Nota: Hanya ahli blog ini sahaja yang boleh mencatat ulasan.