This is how hackers entered banks to steal account data –

This is how hackers entered banks to steal account data –
Rita Cavallaro

October 28, 2024

The group of spy hackers had advanced tools to break into bank accounts directly. And to prepare a dossier, commissioned to the Equilize company by Matteo and Fabio Arpe, they had snuck into the Bpm system of Alessandria. The current accounts of Fulvia Bergamaschi, the new partner of the Arpe father, who recently died, are in the sights of Milan’s spies. At the center of the espionage, there would be family disagreements related to inheritance. To satisfy customers, the group of hackers had developed a well-organized plan: to access remotely, through the super computer installed in the offices of the dossier center in via Pattali, the archives of the Bpm bank of Alessandria, where the deceased’s partner he had the accounts.

This is how hackers entered banks to steal account data –

The person who conducted the operation to exfiltrate financial information on 18 November 2022 was Nunzio Calamucci, who was not at the headquarters that day. Connected via videoconference, the spy had guided the former policeman Carmine Gallo and another affiliate in the illegal intrusion, to carry out the correct procedures and penetrate the database of the current account registry system, in order to steal all the data of the Bergamaschi’s banking relationships. This is how hackers breached the bank’s security protocols. An illegal system that “the gang” allegedly carried out on various occasions. According to the investigators, the group, which carried out thousands of illicit intrusions into the major databases thanks to unfaithful state servants, had even managed to “pierce” the SDI, the police system in which the precedents are contained. The hackers even had a mole in the prosecutor’s office. The circumstance emerges from a conversation between Gallo and Calamucci about the people to be involved in the archive indexing work. The two talk about a certain Checco, who works for a “forensic analysis” company to which the prosecutor’s office turns, perhaps that of Milan.

Hacker investigation, dossier on La Russa and her children. Amazed and disgusted: the reaction

Calamucci says: «Checco is the one who does things for the Prosecutor’s Office, when he finds something he sends it to me… they send me all the documents… if someone gives a quote… I’ll just tell you… Ponzi do you know him?”. The hackers, in fact, had also managed to steal documents from Miriam Ponzi, daughter and heir of the famous private investigator Tom Ponzi. «If Ponzi makes a quote, I even have the word with the price that comes out on that quote…», Calamucci explains to Gallo. «I recover documentation, this makes me prejudicial, negative acts, protests, judicial press articles and cars… I don’t know why it costs them 380 euros plus VAT… we catch everything on the internet tum tum tum», he guarantees , «so when someone says bullshit no… did you make an invoice? I’ll tell you that you made the invoice… my parents always monitor this.”

#hackers #entered #banks #steal #account #data #Tempo

**Interview with Cybersecurity Expert Dr. Marco Rossi on the‌ Recent Spy Hacker Incident**

**Editor:** Today, we’re joined by Dr. Marco Rossi, a prominent cybersecurity expert, to‍ discuss the alarming recent case of a ​group of hackers infiltrating banking⁣ systems for⁣ espionage‌ and financial gain. Thank you for joining ⁣us, Dr. Rossi.

**Dr.⁢ Rossi:** Thank you for having me.

**Editor:** The report indicates that this group had advanced tools to‍ break into bank accounts. Can you shed ​light on the capabilities these hackers might have had?

**Dr. Rossi:** Certainly. These hackers likely ‌employed sophisticated techniques such‌ as phishing, social engineering, or exploiting zero-day vulnerabilities. They may have also used remote ‍access tools⁤ to ⁢facilitate breaches, enabling‌ them to infiltrate systems without ⁢immediate detection.

**Editor:** The incident revolves ‌around inheritance disputes, particularly involving the accounts of Fulvia Bergamaschi, connected to the recently deceased Matteo Arpe. How common ⁤is it for hackers to get ⁤involved‌ in familial conflicts?

**Dr. Rossi:** Unfortunately, it is⁣ becoming more common. Financial disputes often attract illicit‍ activities, including ‍hacking. Cybercriminals see an opportunity ⁤in personal ‍conflicts and leverage‌ them for financial gain. Inheritance​ disputes can be particularly lucrative targets.

**Editor:** It’s alarming that the hackers had inside help, including a mole in the prosecutor’s office. What risks does this present to our legal and financial systems?

**Dr. ⁤Rossi:** ‌That’s a serious breach of trust‍ and security. Insider threats can be extremely damaging, as they can ‍provide hackers​ with privileged information ‍or access. This raises critical concerns about the ‍effectiveness of‍ our security‌ protocols and the integrity of data handling within sensitive ‍institutions.

**Editor:** The operation involved a former policeman and misappropriated resources ⁤from state systems. What measures‌ can be taken ‌to prevent such occurrences in⁤ the future?

**Dr. ⁤Rossi:** ⁢Organizations need to implement stricter access controls, ‍regular audits, and robust training programs to ensure employees ⁢understand the risks of insider threats. Additionally, cybersecurity frameworks⁤ should be updated to stay one step ahead of attackers, employing machine learning and AI tools to identify anomalies in real time.

**Editor:** what should individuals do to protect themselves‌ in ​light⁤ of such incidents?

**Dr. ‌Rossi:** Individuals should stay vigilant. Regularly update passwords, monitor banking activity for anomalies, and be cautious of unsolicited communications. Utilizing two-factor authentication ⁤wherever possible can​ add an extra layer of protection against unauthorized access.

**Editor:** Thank you,⁤ Dr. Rossi, for ⁣your insights into⁤ this concerning situation. ⁢We appreciate your time.

**Dr. Rossi:** Thank you for ⁤having ‍me. Stay safe‌ online!

They not only compromise sensitive information but also undermine the integrity of our institutions. If criminals can infiltrate law enforcement or financial systems, they can manipulate outcomes, cover tracks, and further exploit vulnerabilities. This raises significant concerns about the overall security of our systems and the need for strengthened internal controls and better vetting of personnel.

**Editor:** The methods used by this group seem highly organized. What steps can banks take to better protect themselves from such coordinated attacks?

**Dr. Rossi:** Banks must adopt a multi-layered security approach. This includes regular vulnerability assessments and penetration testing to identify weaknesses. Continuous training for employees on recognizing phishing attempts and other social engineering tactics is critical. Additionally, implementing stronger authentication methods, such as two-factor authentication, can help safeguard accounts. Security protocols should also be reviewed and updated regularly to address new threats as they emerge.

**Editor:** what can individuals do to protect their personal information amidst such alarming incidents?

**Dr. Rossi:** Individuals should be vigilant about monitoring their financial accounts for any unusual activity. They should also use strong, unique passwords for different accounts and change them regularly. It’s advisable to avoid sharing too much personal information on social media and to be cautious about clicking on links in unsolicited emails. Investing in identity theft protection services can also add an extra layer of security.

**Editor:** Thank you, Dr. Rossi, for sharing your insights on this troubling situation. It’s clear that both individuals and institutions have a lot of work to do in strengthening our defenses against cybercrime.

**Dr. Rossi:** Thank you for having me. It’s crucial we remain proactive in the face of evolving cyber threats.

Leave a Replay