To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Operation High Roller

From Wikipedia, the free encyclopedia

Operation High Roller was a series of fraud in the banking system in different parts of the world that used cyber-collection agents in order to collect PC and smart-phone information to electronically raid bank accounts.[1] It was dissected in 2012 by McAfee and Guardian Analytics.[2] A total of roughly $78 million was siphoned out of bank accounts due to this attack.[3] The attackers were operating from servers in Russia, Albania and China to carry out electronic fund transfers.[4]

YouTube Encyclopedic

  • 1/2
    Views:
    2 212 305
    1 697
  • The Human-Powered, Giant Theme Park Playground: Ai Pioppi
  • Cannabis growing instructions at outdoor conditions, roller harrow operation

Transcription

TOM: Ready? PAUL: Yeah. TOM: Pedal. [CREAKING] PAUL: Back. TOM: Yep. I am in the foothills of the Dolomite Mountains, about an hour north of Venice, in Italy. And this is a place called Ai Pioppi, The Poplars. 40 years ago, a man called Bruno opened a restaurant and then, he learned to weld, and he thought, okay, I'll make some small bits of playground equipment for the kids who come to my restaurant. Well, it's now 40 years later, and Bruno's welding looks like this. This is the terrifying Wheel of Death? Bicycle of Death? -- I'm not sure how to translate it -- at Ai Pioppi. Like all the rides at this bizarre, kinetic, playground, theme pa--aahh!--rk -- it is entirely human-powered. Everything here has no more energy that what people put into it, in this case by pedalling. There are all sorts of bizarre contraptions, and -- Augh! Go on! [BOTH YELL] Here we go! Pedal! Pedal! [LOUD YELLING] Go on! Go on! Yes! [MORE YELLING] It is astonishing. It exists only in -- come on! Keep pedalling! That is... oh boy, that's my phone! That's my phone. That's my phone. All right, let's -- oh, here we go again. Break there? PAUL: I'm done. TOM: So, um, I might have broken my phone. Good news! I didn't break my phone. Bad news: I did break my face. About five minutes after filming that. Entirely my fault, not theirs. I ran on a bit of metal that I shouldn't have done. Tripped, fell face first, next thing I know a lovely Italian doctor is putting seven stitches into my cheek. Obviously there's an acceptable level of risk when you go and do something like this. If you're not willing to take that risk, then don't go, but -- I do recommend you do. It is wonderful, everyone there was wonderful, they provided first aid as well. But if you go: please, don't get reckless. Don't do what I did. Don't think you're invincible just 'cos you've done a couple of somersaults on a bike. Follow the safety warnings, be really careful, and I'll see you around. And if there's no video next week, it is because I'm having seven stitches removed from my face!

Specifications

This cyber attack is described to have the following features:[5]

  • Bypassed Chip and PIN authentication.
  • Required no human participation.
  • Instruction came from cloud-based servers (rather than the hacker's PC) to further hide the identity of the attacker.
  • Included elements of "insider levels of understanding".
  • Banks in Europe, the United States and Colombia were targeted.
  • Impacted several classes of financial institution such as credit unions, large global banks, regional banks, and high-net-worth individuals.

While some sources have suggested it to be an extension of man-in-the-browser attack[6] Operation High Roller is reported to have harnessed a more extensive level of automation distinguishing it from the traditional methods.[7]

See also

References

  1. ^ Rachael King (June 26, 2012). "Operation high roller targets corporate bank accounts". Wall Street Journal.
  2. ^ "Operation high roller auto-targets bank funds". CNET News.
  3. ^ "How exactly do cyber criminals steal $78 million?". Time magazine (online) Business and Money. July 3, 2012.
  4. ^ Danielle Walker (October 29, 2012). ""High roller" fraud campaign persists, origin revealed". SC Magazine. Archived from the original on 2012-11-01.
  5. ^ Michael Rundle (June 26, 2012). "Operation high roller". Huffington Post.
  6. ^ ""High roller" hacker attack is stealing hundreds of millions from the rich". DailyTech. June 26, 2012. Archived from the original on 2012-06-30.
  7. ^ "'Operation high roller' stole from the rich to give to unknown auto-mule crims in the cloud". The Register. June 27, 2012.

External links

This page was last edited on 11 December 2021, at 06:19
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.