The Crime Scene
The Timeline
Weak Spots & Threats
Fixing the Problem
Security Awareness & Prevention
100

Who were the criminals in this case?

The cleaning crew!

100

What year did the attack on Mitsui Bank happen?

2004-2005

100

What was the biggest mistake the bank made that let this happen?

They didn’t properly check the cleaning crew or secure their computers.

100

What does MFA stand for?

Multi-Factor Authentication

100

This cyber attack happens when a hacker pretends to be someone trustworthy to trick you into giving away personal information, and passwords, or clicking a dangerous link. It often comes through emails, text messages, or fake websites. What is this called?

Phishing

200

What device did the criminals use to steal data?

Keylogger

200

How many criminals were arrested?

Eight people were arrested.

200

Why didn’t IT managers worry about USB devices?

They thought it wasn’t a big deal and didn’t take action!

200

What does SIEM stand for?

Security Information and Event Management

200

What type of attack involves secretly installing software to record a user’s keystrokes?

Keylogger Attack

300

Where did the criminals try to transfer stolen money?

A member of the group tried to send £23 million ($29 million) to their personal account.

300

When was the first warning about the attack?

In October 2004, Mitsui Bank noticed something strange and told the police.

300

This happens when an unauthorized person sneaks into a restricted area by following someone who has proper access. It often happens when an employee holds the door open for someone without checking if they should be there. What is this called?

What is Tailgating?

300

What is Zero Trust Architecture?

No one is trusted automatically

300

This type of training helps employees recognize, prevent, and respond to security risks caused by people inside the organization whether it's intentional or accidental. It covers topics like detecting suspicious behavior, reporting security concerns, and following company policies. What is this called?

Insider Threat Awareness Training

400

Why did the criminals erase the CCTV footage?

To cover their tracks so no one would see what they were doing!

400

What was the total amount of money they wanted to steal?

£220 million (about $278 million)

400

What’s an example of a physical security failure in this case?

The keyloggers were still attached to computers when investigators arrived!

400

What’s a simple way to stop insider threats?

Security training

400

What is the main reason why financial institutions are prime targets for cybercriminals?

Potential for High Financial Gain

500

Did the criminals succeed in stealing any money?

Nope! The attack was caught before they could take anything.

500

In what country was one of the criminals caught trying to transfer money?

Israel

500

Why didn’t the bank detect this attack sooner?

Lack of monitoring and awareness of insider threats.

500

What security principle means only giving access to people who truly need it?

Need-to-Know Principle

500

You receive an email from your "boss" asking you to buy gift cards and send the codes ASAP. The email looks a little strange, and you weren’t expecting this request. What should you do? A. Buy the gift cards quickly to avoid trouble B. Reply and ask for more details C. Double-check the email address and contact your boss through a different method D. Click the links in the email to see if they look real

C. Double-check the email address and contact your boss through a different method!