The hunt for the Carbanak group

September 2019 Editor's Choice, Information Security, News & Events

Tomorrow Unlocked, the online magazine for digital culture created by Kaspersky, has released a new, free four-part documentary that tells the story of the notorious Carbanak APT (advanced persistent threat) group and its $1 billion bank heist. This film launches a new real-cybercrime series named ‘hacker:HUNTER’.

The four episodes (with a total running time of 31 minutes) tell the story of how, as part of an international investigation, four members of the group were arrested in Taiwan and Spain. As part of this crime story, it outlines the history of the Carbanak gang, how they stole the money and why it was so difficult to stop them. The film has brought together experts including different security vendors, as well as regulators, and the media.

The Carbanak gang is an infamous cybercrime group responsible for financial theft on an immense scale. It was the first group to apply to common financial crime the kind of highly sophisticated tools, techniques and processes usually associated with nation-state backed threat actors. It learned from these advanced groups how to stay under the radar while monetising a fortune.

Over time, Carbanak turned into an umbrella for a range of cybercriminal activities all sharing the same purpose of illegal financial gain. In 2018, this active international cooperation led to the arrests of suspected members of the gang.

The newly-released movie is the first in a series of documentaries into major cyber incidents across the globe. Audiences can already look forward to the second in the hacker:HUNTER series, which stages the Wannacry epidemic of 2017 on the screen, followed by further exciting documentaries on the most incredible cybercrimes in history.

“When we initially discovered Carbanak, we were impressed with its sophistication. The way they moved through networks and were finally able to extract money from a financial institution was something we hadn’t seen before. At the same time we also knew we had to stop this threat, which copied its tactics, techniques and procedures from nation-state APT campaigns. We hope that with this documentary we can provide insight on the inner workings of this criminal group and that potential criminals will realise that cybercrime doesn’t pay,” notes Jornt van der Wiel, security expert at Kaspersky.

See the hacker:HUNTER documentary series on TomorrowUnlocked.com ( https://www.tomorrowunlocked.com/guardians/hacker_hunter/)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.