Two members of the notorious Carbanak cybergang were sentenced to 8 years in prison, Kazakhstani authorities announced this week.
While they did not reveal the names of the sentenced individuals, the Kazakh authorities did say that they were accused of stealing roughly $4.7 million from two banks in the country between 2016 and 2017, as well as of attempting to steal $18.5 million more.
The stolen funds were transferred to 250 payment cards that were then distributed for cash out at ATMs across Europe, including in Belgium, the Czech Republic, Estonia, France, Germany, the Netherlands, Russia, Spain, and Switzerland.
“The rest of the members of this criminal organization have been identified and are on the international wanted list,” a translation of the sentencing announcement reads.
Tracked as Carbanak, Anunak and Cobalt, the gang evolved its malware and moved to more sophisticated attacks around 2016, employing a custom version of the Cobalt Strike pen testing tool.
[ READ: Historical Breadcrumbs Link Magecart 5 to Carbanak Group ]
Employing spear-phishing emails, the threat actors targeted bank employees with their malware, which provided them with access to a victim institution’s network, including the servers that controlled automated teller machines (ATMs).
Using this unauthorized access, the attackers would instruct ATMs to dispense cash at specific times, when money mules were present to collect the money. The hackers also transferred funds to bank accounts they controlled, and even modified account balances so they could withdraw large amounts of cash.
Working with the Russian and Moldovan mafia, the hackers often laundered the proceeds using Bitcoins. More than100 financial organizations in 40 countries were targeted, with total losses estimated to exceed €1 billion ($1.24 billion).
The mastermind behind the operation, a Ukrainian national referred to as “Denis K,” was arrested in Spain in 2018. Other members of the gang were reportedly Russian and Ukrainian nationals.
Related: Carbanak Source Code Discovered on VirusTotal
Related: “Cobalt” Hackers Use Google App Engine in Recent Attacks

More from Ionut Arghire
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- US, Israel Provide Guidance on Securing Remote Access Software
- Blumira Raises $15 Million for SMB-Tailored XDR Platform
- KeePass Update Patches Vulnerability Exposing Master Password
- Google Workspace Gets Passkey Authentication
Latest News
- Consolidate Vendors and Products for Better Security
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
