{"id":3596,"date":"2014-06-26T10:00:12","date_gmt":"2014-06-26T14:00:12","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3596"},"modified":"2020-02-26T18:58:46","modified_gmt":"2020-02-26T14:58:46","slug":"luuuk","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/luuuk\/3596\/","title":{"rendered":"How Much Money Do Cybercriminals Earn?"},"content":{"rendered":"<p>When you read about <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792316\/Kaspersky_Security_Bulletin_2013_Malware_Evolution\" target=\"_blank\" rel=\"noopener nofollow\">hundreds of thousands of viruses<\/a> that appear each day, you may wonder, who puts so much effort in development of this malware and why. The answer is simple \u2015 they are criminals and they do it because it is very, very profitable. Our researchers have discovered an Internet server being used for controlling the attack targeted at users of a large European bank. \u00a0Log files from this server show that in just one week criminals stole more than 500,000 Euros from a bank\u2019s clients and transferred these funds to accounts, controlled by thieves.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111400\/earn.min_-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5260\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/06\/05111400\/earn.min_-1.png\" alt=\"earn.min\" width=\"640\" height=\"480\"><\/a><\/p>\n<blockquote class=\"twitter-pullquote\"><p>500,000 Euros were stolen in one week from clients of just one bank using a Trojan.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FjS5A&amp;text=500%2C000+Euros+were+stolen+in+one+week+from+clients+of+just+one+bank+using+a+Trojan.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In the 20th century, a robbery of this scale would have required some cars, firearms, and a handful of very brave people, because this \u201cbusiness\u201d is very risky. In the 21st century, the robbery involved a <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/banking-trojan\/\" target=\"_blank\" rel=\"noopener nofollow\">banking Trojan<\/a>, some servers to spread it and control a Trojan when it altered peoples\u2019 money transfers, plus a bunch of not so brave people called \u201cmules\u201d or \u201cdrops\u201d, who actually received the stolen funds into their accounts and cashed out.<\/p>\n<div class=\"pullquote\">Criminals don\u2019t target a bank itself, they hack a bank\u2019s clients individually by installing a Trojan on their computers. They may use phishing and exploits to do that.<\/div>\n<p>Controlling \u201cmules\u201d is actually the trickiest part of the operation, that\u2019s why modern robberies are still conducted by organized criminal gangs. This specific heist, which we called <a href=\"http:\/\/www.securelist.com\/en\/blog\/8230\/Use_the_force_Luuuk\" target=\"_blank\" rel=\"noopener nofollow\">Luuuk<\/a>, involved some clever tricks to control money mules. You can dig deeper in the dedicated <a href=\"http:\/\/www.securelist.com\/en\/blog\/8230\/Use_the_force_Luuuk\" target=\"_blank\" rel=\"noopener nofollow\">Securelist blogpost<\/a>.<\/p>\n<p>It is worth noting, that <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> and <a href=\"https:\/\/www.kaspersky.com\/pure\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky PURE<\/a> include the technology called <a href=\"https:\/\/www.kaspersky.com\/blog\/money-online-threats-and-electronic-payment-protection\/\" target=\"_blank\" rel=\"noopener nofollow\">Safe Money<\/a> that combines multiple protection measures to counteract most banking Trojans and prevent the aforementioned kind of theft from end users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab\u2019s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime. <\/p>\n","protected":false},"author":32,"featured_media":3597,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[456,691,575,78,693,36,694,692],"class_list":{"0":"post-3596","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-banking-trojan","9":"tag-banks","10":"tag-great","11":"tag-hackers","12":"tag-luuuk","13":"tag-malware-2","14":"tag-money-mule","15":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/luuuk\/3596\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/luuuk\/3692\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/luuuk\/4052\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/luuuk\/4289\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/luuuk\/3717\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/luuuk\/4124\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/luuuk\/4489\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/luuuk\/5259\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/luuuk\/3470\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/luuuk\/4060\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/luuuk\/4489\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/luuuk\/5259\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/luuuk\/5259\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/banking-trojan\/","name":"banking trojan"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3596"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3596\/revisions"}],"predecessor-version":[{"id":15827,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3596\/revisions\/15827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3597"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}