By Anna Isaac and Caitlin Ostroff
This article is being republished as part of our daily
reproduction of WSJ.com articles that also appeared in the U.S.
print edition of The Wall Street Journal (January 10, 2020).
A New Year's Eve ransomware attack on foreign-currency exchange
company Travelex has disrupted cash deliveries from its global
network of vaults to major international banks.
Banks in the U.K., including units owned by Barclays PLC, Lloyds
Banking Group PLC, as well as Westpac Banking Corp. in Australia
said Thursday they were unable to take orders from customers in
branches that rely on Travelex to supply cash in foreign
currencies. The banks' online retail foreign-currency exchange
services, which are outsourced to Travelex, were also shut off.
Travelex's internal networks and consumer-facing websites and ap
p have been offline since the attack, after the company shut down
its computer systems to stop a ransomware virus that infiltrated
its networks.
A Travelex spokeswoman confirmed that the outage has limited the
service its wholesale operations provided to other
institutions.
Representatives for Barclays, Lloyds and Westpac all confirmed
the disruptions were because of the Travelex outage.
Travelex, a unit of U.K.-listed payments conglomerate Finablr
PLC, is best known for its global network of retail
foreign-exchange kiosks that target customers passing through
international airports. Those operations have been hobbled by the
attacks, with agents resorting to manual operations, writing
handwritten receipts. Travelex has told customers of its prepaid
currency debit cards, popular with overseas travelers, to access
account information by phone or through alternate websites.
A lesser known, but important, part of Travelex's operations is
its business helping other financial institutions manage their
supply of foreign bank notes.
Underpinning this business is a network of high-security vaults
in 14 countries including the U.S., with a vault in Louisville,
Ky., the U.K., Australia, Japan and China. It uses these vaults to
supply cash notes to wholesale clients including banks, central
banks, travel agencies, hotels and casinos, according to a company
bond prospectus from 2017 and a separate business brochure that
appeared to be posted on a company website in September 2019.
Travelex's central-bank clients have included the Central Bank
of Nigeria, where it was responsible for the distribution of U.S.
dollars in Lagos, according to the bond prospectus. A spokesman for
the Central Bank of Nigeria declined to comment.
The business brochure describes Travelex's work with Malaysia's
central bank, where it has provided foreign currencies and
consulted with it to stop traffickers illegally transporting bank
notes into the country. Bank Negara Malaysia representatives didn't
immediately respond to requests to comment.
In a statement this week, Travelex said that the software virus
is a ransomware known as Sodinokibi, also commonly referred to as
REvil. It said the attack froze access to its data by locking it up
in encrypted form.
Ransomware is a technique used to extort money by infecting
systems and then shutting off access to data and processing
capabilities. Money is demanded by the attackers in exchange for
regaining access or to prevent data breaches. A string of such
attacks have hampered operations at companies and governments in
the past year.
Successful ransomware attacks, in which victims pay money to
release their data, appears to have encouraged more attacks and
demands for bigger ransoms. In June 2019, the city of Riviera Beach
in South Florida paid nearly $600,000 to hackers who paralyzed the
city's computer systems.
Lawrence Abrams, a New York-based security researcher, said he
had contact with the group behind Sodinokibi on Tuesday, which
claims to have hacked Travelex.
Mr. Abrams said the group implied to him that it is in
negotiations with Travelex for it to pay a $3 million ransom and
that the company had until early next week before they released the
data publicly. He said the group told him they have stolen 5
gigabytes of data, including dates of birth, social security
numbers and credit-card numbers, and that it deleted all data
backup.
A Travelex statement issued Tuesday said that there was "no
evidence to date that any data has been exfiltrated" or taken off
the network. "There is no evidence that structured personal
customer data has been encrypted," the company said. Structured
data usually refers to information that can be easily analyzed,
such as data in a spreadsheet or database.
Mr. Abrams said the hacking group might be bluffing to pressure
the company into paying the ransom.
"Ransomware is very public. They want to leverage this fear
factor," he said. He said that the group he communicated with also
declined to provide Mr. Abrams with a screenshot proving their
possession of customer data.
The Travelex spokeswoman declined to comment about whether it is
interacting with the attackers or what ransom demand has been
made.
"There is an ongoing investigation. We have taken advice from a
number of experts," she said. London's Metropolitan Police are
spearheading a criminal investigation. The company has also hired
cybersecurity experts to conduct forensic analysis of the
attack.
Write to Anna Isaac at anna.isaac@wsj.com and Caitlin Ostroff at
caitlin.ostroff@wsj.com
(END) Dow Jones Newswires
January 10, 2020 02:47 ET (07:47 GMT)
Copyright (c) 2020 Dow Jones & Company, Inc.
Westpac Banking (ASX:WBCCD)
Historical Stock Chart
From Nov 2024 to Dec 2024
Westpac Banking (ASX:WBCCD)
Historical Stock Chart
From Dec 2023 to Dec 2024