September 27, 2016

Top 15 Most Popular Torrent Sites | September 2016

Here are the top 15 Most Popular Torrent Sites as derived from our eBizMBA Rank which is a continually updated average of each website's Alexa Global Traffic Rank, and U.S. Traffic Rank from both Compete and Quantcast."*#*" Denotes an estimate for sites with limited data.
The Pirate Bay 1 | ThePirateBay
287 - eBizMBA Rank | 50,000,000 - Estimated Unique Monthly Visitors | 231 - Compete Rank | 538 - Quantcast Rank | 93 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

KickAss Torrents 2 | KickAssTorrents
312 - eBizMBA Rank | 30,000,000 - Estimated Unique Monthly Visitors | 428 - Compete Rank | *420* - Quantcast Rank | 87 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Torrentz 3 | Torrentz
634 - eBizMBA Rank | 15,000,000 - Estimated Unique Monthly Visitors | 1,340 - Compete Rank | *400* - Quantcast Rank | 163 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Extra Torrent 4 | ExtraTorrent
1,596 - eBizMBA Rank | 6,000,000 - Estimated Unique Monthly Visitors | 2,575 - Compete Rank | *1,900* - Quantcast Rank | 314 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Yiffy Torrents 5 | YifyTorrents
3,707 - eBizMBA Rank | 3,000,000 - Estimated Unique Monthly Visitors | 5,872 - Compete Rank | NA - Quantcast Rank | 1,542 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Bit Snoop 6 | BitSnoop
4,089 - eBizMBA Rank | 2,750,000 - Estimated Unique Monthly Visitors | 6,376 - Compete Rank | *3,500* - Quantcast Rank | 2,390 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Iso Hunt 7 | IsoHunt
4,817 - eBizMBA Rank | 2,650,000 - Estimated Unique Monthly Visitors | 5,565 - Compete Rank | n/a - Quantcast Rank | 2,089 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Summo Torrent 8 | SumoTorrent
5,000 - eBizMBA Rank | 2,500,000 - Estimated Unique Monthly Visitors | *6,000* - Compete Rank | *4,000* - Quantcast Rank | NA - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Torrent Downloads 9 | TorrentDownloads
6,150 - eBizMBA Rank | 2,000,000 - Estimated Unique Monthly Visitors | 7,376 - Compete Rank | *6,000* - Quantcast Rank | 5,073 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

6,385 - eBizMBA Rank | 1,900,000 - Estimated Unique Monthly Visitors | 11,724 - Compete Rank | *NA* - Quantcast Rank | 1,046 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

RarBG 11 | RarBG
6,565 - eBizMBA Rank | 1,750,000 - Estimated Unique Monthly Visitors | 14,387 - Compete Rank | *3,500* - Quantcast Rank | 1,809 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

1337x 12 | 1337x
6,913 - eBizMBA Rank | 1,600,000 - Estimated Unique Monthly Visitors | 11,892 - Compete Rank | *NA* - Quantcast Rank | 1,934 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Torrent Hound 13 | TorrentHound
7,359 - eBizMBA Rank | 1,500,000 - Estimated Unique Monthly Visitors | 8,742 - Compete Rank | *10,000* - Quantcast Rank | 3,334 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

demonoid 14 | Demonoid
8,526- eBizMBA Rank | 1,300,000 - Estimated Unique Monthly Visitors | *NA* - Compete Rank | *NA* - Quantcast Rank | 8,526 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Fenopy 15 | Fenopy
14,025 - eBizMBA Rank | 1,250,000 - Estimated Unique Monthly Visitors | 23,171 - Compete Rank | *6,100* - Quantcast Rank | 12,805 - Alexa Rank | Last Updated: September 1, 2016.
The Most Popular Torrent Sites | eBizMBA

Related eBizMBA Guides

September 22, 2016

Top 5 KickAssTorrents alternative – sites similar to KickAss Torrents

In this post, 5 KickAsstorrents alternative sites or sites similar to KickAsstorrents is discussed with URL links.
KickAssTorrents alternative
In 22th July, 2016 KickAss Torrents was taken down by the Police. We published a post about this incident in details about why kickasstorrent is down in our blog. The owner of the popular site was arrested today in Poland by the US Department of Justice. The official domains like,,,,kastatic, etc. all are seized and taken down. Many torrent users got freaked out hearing the news. KickAss Torrents was one of the most visited torrent tracker websites and it’s sudden shutdown shocked the internet users from around the world. As KickAss Torrents is down and all of it’s official domains are now seized here we will discuss about some of the Kickass torrentsaka KAT alternatives sites.

KickAssTorrents alternative 1:

This site is a complete rip-off of the original KickAssTorrents site. The site design and functionality is the same as the official KickAss Torrents site. We are not sure if this site was resurrected by the official KAT team or not. But the site is running before the crackdown so this could be one of the many clone sites of KickAssTorrents. So if you are facing problem as the official KickAss Torrents site is down you can use this site for now. We checked this site and found that the site resembles the original site and it’s torrent files are also working. The search functionality is also working now. is the best KickAss Torrents alternative site. This Kick Ass torrents alternative / mirror site is created by an entity which is running the mirror site for a long time. This kickass torrent mirror site is managed by IsoHunt so it’s regularly updated.

warningWarning! Your ISP can track your Torrent Activity!

Use Anonymouse VPN for torrenting

Hide your IP address with VPN and protect your privacy!
Click here for more details

KickAssTorrents alternative 2:

kickasstorrents alternative 2
kickAssTorrentsAS is also a great alternative to the original kickass torrents site. Actually the site design and functionality is completely same as the original site. It’s working though. But don’t give your credit card info if this site asks for it. Just be cautious because this also not being operated by the Official KickAssTorrents TEAM so be sure you are using update antivirus software while visiting these sites and also use VPN. KickAssTorrentsAS website functionality is completely same as the official site. You can use the torrent files without any problem. All torrent links are working. We know that this site is using the old database dump which was released by KickAssTorrents Team years ago when ThePirateBay was down.

KickAssTorrents alternative 3:

kickasstorrents alternative

Extratorrent is also another popular torrent site. A de facto replacement of KickAss Torrents original site. You can use Extratorrent as KickAssTorrents is down right now. This site also the home of official ETTV and ETRG releases. Extratorrent’s traffic is now so high because of the shutdown of the KickAssTorrents site. The torrent files are categorized and the search function enables you to search for your desired torrent files. This site is the most popular with 30,000,000 Unique Monthly Visitors from around the world.

KickAssTorrents alternative 4:

kickasstorrents alternative4

TorrentDownloads is also a great KickAss Torrents alternative site. It has minimal site design with awesome features of KickAssTorrents. This site has Alexa rank of 5000+ and receives 2,000,000 unique monthly visitors. You can download torrent files with Magnet link or by downloading .torrent files.
All torrent links are working as for now. The server is fast and working.

KickAssTorrents alternative 5:

kickasstorrents alternative 1337x

1337x is another KickAss Torrents Alternative site which has similar torrent download features. The site receives decent traffic although most of the site moderators and admins has abandoned the ship. Time will tell if 1337x can maintain it’s popularity or not.

More KickAssTorrents Mirror Websites

Some readers posted about these KickAssTorrents Mirror websites. We will give the list of it below (will be updated again). A fair warning if you are using these mirror site is that don’t EVER download “.torrent” files from these clone site. The safest solution is the Magnet links. You should only use Magnet links till we confirm the official version of the KickAssTorrents site. We still don’t know which domain is now officially maintained by the KAT team.
Updated list: 18/09/2016

Protect Your Online Privacy & Security Using VPN

The incident of KickAssTorrents is a great lesson for all the Torrent Downloaders. The strict copyright laws in most of the countries make the torrent lover uncomfortable. Remember those notices the ISP gave you ? ISP and Copyright trolls are working together to hunt down torrent users. So the best practice will be to protect your online identity and download torrent files as well.
So we recommend VPN for torrenting. VPN hides your actual IP address with their server IP and encrypts your online traffic. Thus your ISP, Govt. or Network Admin will never find out what you are doing online. These VPN software creates a secure tunnel between your Computer or Mobile and the visited site. So if you are downloading torrent files using any KickAssTorrents alternative site your online activity will be protected by the VPN software.
The common mistake of torrent user is using FREE VPN for torrenting or using TOR broswer. Free VPNs usually hate torrenting because running a VPN service requires money and costly server. So Free VPN will ban you if you download torrent files using their service sooner or later. You can find some cheap torrent vpn here.
We Recommend : IVACY VPN for torrenting
[ For our readers IVACY Torrent VPN is giving 86% discount now only @ 1.66$ per month with Torrent optimized servers and 256-bit encryption for complete privacy. You will get 7 Day Money Back Guarantee! 😀]

Conclusion of KickAss Torrents Alternative

So these were some of the working KickAssTorrents alternative site that you can use and they are quite similar site to the official kickass torrents site. Let us know which site you think as the best KickAssTorrents Alternative in the comment section.

You may like : Top 50 most popular torrent sites updated sept. 2016


July 15, 2016

What Is the Best Way to Stream Music for Free on Android?

Despite how you might personally feel about downloading vs. streaming music, it’s abundantly clear that streaming is the way of the future. Just look at how many popular services there are: Spotify, Pandora, SoundCloud, and even YouTube is now officially embracing the goodness of music streaming.
But a lot of these services are Web-centric, and as far as their Android counterparts are concerned, it’s very hit-or-miss. A couple of them are spectacular, but most are flawed in some way or another.

1. Spotify

User Experience


My only real complaint is that everything is on the cloud (unless you have a paid account, which we’ll discuss in a bit), so pages and songs can be slow to load at times. Switching between playlists takes a few more seconds than you might expect, and over time, this can be annoying.
Free vs Paid

2. YouTube Music

User Experience

But the selling point of this app is that it dynamically generates stations of similar songs whenever you play something. As you listen and like, it learns your tastes and the recommendations become more accurate.
Free vs Paid

3. Google Play Music

User Experience

The whole process of uploading is easy, too. Just transfer your music files onto the device — typically using a USB cable or a wireless connection — and use the app to pick and choose the ones you want uploaded to your account. (Or just use your PC’s browser instead.)
Free vs Paid

4. SoundCloud

User Experience

The interface is only okay, though. You’ll be able to get around just fine, but it feels a bit cramped and cluttered on devices with smaller screens (which is weird because it’s mostly just a case of excess whitespace). But overall, it’s smooth and fast, so I can’t complain too much.
Free vs Paid
5. Pandora

User Experience

But because Pandora’s database of music is relatively small (only a few million), you may get sick of it. After 7+ years of regular Pandora use, there’s little left for me to explore in the genres that interest me.
Free vs Paid

6. TuneIn Radio

User Experience

And lastly, unlike most other music streaming apps, TuneIn supports Chromecast, so you can cast whatever station you’re listening to onto any Chromecast-connected TV for better audio.
Free vs Paid
Which Music Streaming App Is Best?

Interesting Comments from readers.... So if you mainly stream music on Android, here are the apps you need to consider.
Spotify is the reigning king of streaming music. Its library is absolutely massive, spanning everything from mainstream goodies (except for Adele and Taylor Swift, unfortunately) to some of the most obscure artists you’ve never heard of.
In terms of popularizing the notion of streaming, Spotify is very much the Netflix of music, and there’s a reason for its excellent reputation: the service is high quality, and there aren’t any competitors that can play at Spotify’s level yet.
Overall, there’s a lot to love about Spotify’s Android interface. Whether you’re on a tight-screened smartphone or a big-screened tablet, everything is cleanly laid out and intuitive to follow — no hidden long-press menus for basic functions, which is a relief — and absolutely no clutter.
What’s particularly nice is that you can play Spotify on multiple devices, and they’ll stay synced up: if you move onto the next song with your smartphone, so will your tablet.

Be sure to heed these amazing Spotify tricks and tips to get the most out of it, especially if you bounce between the Android and desktop/Web versions.
The Free version of Spotify is quite unrestricted, but it does play audio ads every few songs. Premium accounts have no ads at all, allow for unlimited skips, and give you the ability to download songs for offline playback.
Don’t forget to take advantage of the offer for 3 months of Premium for $1 while you still can!
In late 2015, Google launched a new mobile app called YouTube Music, designed for users who love using YouTube as their main source of music. In fact, music is the most common content type of all YouTube traffic. Not too surprising, is it?
What is surprising is just how useful this app actually is. I immediately wrote it off as a gimmick when I first heard of it, but having given it a try, I have to say I’m impressed.
One downside is that it requires you to log into a YouTube account before you can start using the app. An anonymous (or guest) option would be really nice, but considering how Google likes to force app logins, I don’t expect that to change.
Note that the first time you use YouTube Music, you’ll be signed up for a free 14-day trial of YouTube Red. No payment information is required, so don’t worry. Just something to be aware of.
The best feature of YouTube Music is that it lets you listen in audio-only form (not available for free accounts). For users on slower connections or those who are tight on data, this feature is a game-changer over the regular YouTube app.
The interface is pretty straightforward — nothing fancy about it, but it never gets in the way either. One thing that I’m glad exists is the Liked Songs list, which is based on all the liked videos on your account.

And of course, the app allows you to cast the songs you’re listening to onto any Chromecast-connected device.
The app is completely free, but ad-supported. With a YouTube Red subscription — $10 per month — you can get rid of ads, download music for offline playback, and listen in audio-only mode. Though there have been some criticisms of YouTube Red since its launch.
Google Play Music comes pre-installed on most Android smartphones these days, but if you don’t have it, you can always get it for free right on the Play Store. And you should! Play Music is oft-considered to be one of the best Android music players.
It’s a two-in-one kind of deal: there is streaming music radio that you can listen to, or you can upload your own music and stream it on the Web or Android no matter where you go. It’s really convenient and the closest competitor to Spotify.
The interface is modern and easy to navigate — the same kind of experience you’d expect from any of Google’s other apps. It’s very fast and responsive, even on a last-gen device like mine, so you’ll rarely be frustrated by lag.
While it’s easiest to just browse stations and libraries based on titles, artists, or genres, Play Music can curate music for you based on decades, activity, or even your current mood. Want happy, uplifting songs? Google can deliver.

Free accounts are limited to 50,000 uploaded songs, which is way more than you think it is, and they have audio ads for radio. A subscription costs $10 per month, but it includes downloading for offline playback, no ads at all, and YouTube Red access.
SoundCloud is a bit different from the rest of the apps here, but this difference is what makes it a worthy mention. It’s not great for listening to your own music library, nor is it good for mainstream radio — it’s for the in-between: budding musicians and indie artists.
If you aren’t using SoundCloud already, you really should. There’s an entire world of undiscovered music out there that you won’t find on Spotify, Pandora, or YouTube.
The reason why SoundCloud is so great for indie artists is because it makes it incredibly easy to share your own music with others. The built-in Record feature records the audio playback of the device, and songs can be one-button shared to Facebook, Twitter, and Tumblr.
No other music service is as artist-centric as this one.

Everything about SoundCloud is free. No paid accounts or subscriptions to worry about.
Pandora pioneered the modern Internet radio trend and consistently lands among the best of the best when it comes to Internet radio apps for Android. You probably know all about it by now, but in case you don’t, just know that we think very highly of it.
The thing to understand about Pandora is that it isn’t a source for on-demand music. If there’s a specific song you want, there’s no way to guarantee that Pandora will play it. However, as a way to expand your music exposure, Pandora is perfect.
Because this app is all about dynamically-generated stations, you can search for any song, artist, or genre, and Pandora will start spitting out songs that are similar to your search query. I can’t even count how many amazing songs I’ve found with my dozens of stations.

Free users must deal with audio ads every few songs, a limit of 6 skips every hour, and standard audio quality. Pandora One costs $5 per month and removes the ads, greatly increases the skip limit, and improves the audio quality.
In the realm of Internet radio apps, TuneIn Radio is something special. Instead of just creating online music playlists — whether those playlists are dynamic or hand-crafted — TuneIn actually streams real-life radio. This instantly sets it apart from services like Pandora.
With over 100,000 radio stations available (including FM, AM, and digital) combined with the fact that it has talk shows, sports, and podcasts in addition to music, it’s pretty much impossible for you to explore everything it has to offer.
With so much to explore, it’s amazing that TuneIn never feels overwhelming. Everything is broken down into manageable categories, and the search bar is great at finding relevant stations.
But the thing that truly impresses me is Car Mode, which simplifies the interface into the bare essential functions represented by larger buttons. Since mobile music is often played during commutes and trips, it pleases me to know that they’re doing something to make it easier (and safer) for drivers.

Free accounts can only access non-premium stations (but there are lots of them available) and must deal with banner ads in the app. Premium costs $8 per month and unlocks premium stations, removes banner ads, and even grants access to 40,000+ audiobooks.
If I could only choose one music streaming app to use, I would probably go with Spotify for its massive library of music and beautiful-yet-practical interface, but I’d also greatly miss all of the other apps.
Do pay special attention to YouTube Music. The concept is wonderful, and if it’s this good at launch, one can only imagine how much better it will be given another year or two of serious development.
And whatever you do, make sure you use this awesome smartphone trick when you’re playing music on your phone but need a bit more volume than your device can handle.
Which app do you prefer for music streaming? Is there one that we missed? Share your thoughts with us in the comments below!

May 13, 2016

Five Steps to a Squeaky-Clean Online Identity

Five steps to managing your online identity and ensuring that when someone Googles you, they see the personal brand you build.
By William Arruda

In 2004, I delivered a personal-branding presentation that, for the first time, included a slide that asked the question: “If you don’t show up in Google, do you exist?” That slide got a huge audience reaction and has been in virtually every presentation I have delivered since.
The answer to the question is no, at least as far as hiring managers and executive recruiters are concerned.
But what if you do show up in Google, and what Google reveals is either unflattering or inconsistent with how you want to be known?
Googling (performing a Google search on someone) is quickly becoming the standard reference check in job searches and a key filter hiring managers and executive recruiters use to evaluate and cull candidates. Studies reveal that executive recruiters Google candidates and have eliminated candidates from the running based on their Google results. So knowing what Google says about you is important, and proactively managing your online identity is an essential element in your job-search strategy.
For $100K+ earners like yourself, you don’t have the same concern about beer-funnel photos that younger managers do, but that doesn’t mean that your online profile is squeaky clean.
There could be content online that does not represent who you are and what you have to offer prospective employers. We call this undesirable content “digital dirt.” Digital dirt includes any Web-based content that will prevent you from reaching your goals.
There are two kinds of dirt:

1. Self-posted dirt.
That’s right, you may have muddied up your own profile. The good news is that most of this self-created content can be easily vacuumed up. But it’s important to note what constitutes “dirt.” Remember, it is not just outright negative or inappropriate content that qualifies as dirt; if you have revealed a little too much about your political views or posted a comment to someone’s blog that is replete with typos and misspellings, you might be removing yourself from consideration for some jobs.
Too much content about what you did in a previous life can also impede your prospects. Be sure virtually everything you post on the Web reflects your unique value and positions you for the role you seek to fill.

2. Dirt posted by others.
This is a much more insidious kind of dirt and typically much harder to clean up. I once had a client who was fired from his investment-industry job, and a Wall Street Journal story about the seemingly fraudulent transactions in which his company was involved included his name. In fact, the word “fraud” was only three words away from his name in the Google description! It was a major problem for him since this data showed up as the first item in a Web search on his name. He was unable to get the Wall Street Journal to remove the story from its Web site.
Like it or not, today your Google results are as important as your resume or cover letter. So as you seek your next role, you must focus on building and maintaining an accurate and compelling online profile. Here’s the five-step process for managing your online identity — sweeping up as much digital dirt as possible.

Step 1: Know what’s out there.
The first step to resolving most challenges is to get the right information. In this case, the information you need is available just by Googling yourself (also known as “ego-surfing”). To help make sense of your Google results, use this free tool: When evaluating your results, focus on the first three pages of results. Those who perform Google searches rarely look beyond Page Three. Once you know what is out there and where you fall on the digital scale, you can make a plan to address it.

Step 2: Know what you want your Google results to say. 
Now that you know what is out there, you need to think about what you want your Google results to look like. You can’t get from here to there if you don’t know what “there” looks like. It’s time to uncover and define your personal brand. You need to answer these questions:
  • What do you want to be known for?
  • What makes you stand out from all your peers?
  • What’s your area of expertise/thought leadership?
  • What words do you want people to use to describe you?
  • What are your greatest accomplishments?
Learn more about personal branding here:

Step 3: Clean up the dirt and enhance your digital image.
If you posted anything that might be considered inappropriate or perhaps comes from a past life, remove it. If you have dirt that was posted by others, first ask those who posted it if they will remove it. If you can’t wipe your digital identity clean, you must create enough high-ranking content to move that dirt beyond page three (Steps 4 and 5 below); or, you must at least ensure the “clean” sits alongside the dirt so people have a better understanding of who you are.

Step 4: Build your own place on the WWW.
The best way to get people to understand exactly who you are is to tell your own story. First, you must buy your own domain name — e.g., You can buy domains at Then you can build (or have built for you) a personal Web site. Blogging platforms such as TypePad and WordPress are great tools for building a Web site — even if you choose not to blog. Remember to include:
  • Your bio
  • A professionally taken headshot
  • Links to all relevant content on the Web about you (making it a one-stop shop),
  • Testimonials from people who have worked with you
  • Proof of performance (PDFs of presentations, video, audio clips, and so on.)
  • Links to Web sites and content on the Web that you think are valuable and help showcase your area of expertise or thought leadership.
Ensure your site content and style reflect your personality. Use color, fonts and imagery to bolster your brand attributes.

Step 5: Use Web 2.0 tools to enhance your online ID.
If you aren’t ready for your own Web site or would like to increase your volume of Google results, take advantage of all the social-networking sites that are available — like LinkedIn, Naymz, Ziki and Ziggs (and countless others). Include your branded bio, professional headshot and other relevant information. You need not use the social networking aspects of these sites (in fact, you won’t have the time to be an active participant on all these sites), so use LinkedIn for networking and the others to enhance your online ID.
In addition, find blogs related to your area of expertise ( is a blog search engine that will help you find relevant blogs by keywords), and subscribe to them. Then append relevant comments to blog posts when you have something valuable to contribute. This becomes part of your online identity.
Of course, your Google results change all the time, so you need to be vigilant. I suggest Googling yourself weekly and subscribing to Google Alerts for your name ( Then, every time something shows up on the Web with your name on it, you’ll be the first to know.

William_Arruda.jpgCredited with turning the concept of personal branding into a global industry, William Arruda is the founder of Reach Personal Branding and author of "Career Distinction" and the upcoming book, "Ditch. Dare. Do!" You can learn more about him at


New Attack Reported by Swift Global Bank Network

Thieves have again found their way into what was thought to be the most secure financial messaging system in the world and stolen money from a bank. The crime appears to be part of a broad online attack on global banking.

New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that robbery, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines.

The second attack involves a commercial bank, which Swift declined to identify. But in a letter Swift plans to share with its users on Friday, the messaging network warned that the two attacks bore numerous similarities and were very likely part of a “wider and highly adaptive campaign targeting banks.”

The unusual warning from Swift, a copy of which was reviewed by The New York Times, shows how serious the financial industry regards these attacks to be. Some banking experts say they may be impossible to solve or trace. Swift said the thieves somehow got their hands on legitimate network credentials, initiated the fraudulent transfers and installed malware on bank computers to disguise their movements.

“The attackers clearly exhibit a deep and sophisticated knowledge of specific operation controls within the targeted banks — knowledge that may have been gained from malicious insiders or cyberattacks, or a combination of both,” Swift said in its warning, which is expected to be posted on a secure part of its website on Friday.
Security experts who have studied the attacks said the thieves probably were lurking inside the bank systems for months before they were detected.

In its warning, Swift pointed to another worrying situation: that the gang of thieves may have been able to recruit bank employees to hand over credentials and other key details.
In both cases, the core messaging system of Swift was not breached; rather, the criminals attacked the banks’ connections to the Swift network. Each bank is responsible for maintaining the security of its connection to Swift. Digital criminals have found ways to exploit loopholes in bank security to obtain login credentials and dispatch fraudulent Swift messages.
“As a matter of urgency, we remind all customers again to urgently review controls in their payments environments,” Swift urges its customers in the letter to be sent on Friday.
Banks — like many major corporations — are constantly under attack by criminals, seeking to find the weak point in their defenses. An attack in the summer of 2014 on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, but no money was stolen. Thieves frequently steal bank customer’s A.T.M. and credit card credentials.
But these attacks involving Swift stand out, because millions of dollars were stolen — not from a large number of customers, but from the banks themselves. It is as if the thieves used their hacking skills to reach inside a bank vault.

Emboldened and enriched, the thieves are likely to strike again, security experts predict.
“An event like this changes the risk profile for the banking system, since the attackers will inevitably reinvest some of their profits in new large-scale attacks,” said Paul Kocher, a security and encryption expert who is the president of Cryptography Research, a division of Rambus.
Initially, many banks and security experts dismissed the Bangladesh attacks as brazen, but probably isolated, events in a developing country. A stream of news reports from the capital of Dhaka cited rudimentary technology at Bangladesh Bank, like a $10 router and an absence of firewalls. Bangladesh officials have blamed the New York Fed, saying it failed to block the fraudulent transfers.

On Tuesday, representatives from Swift, the New York Fed and Bangladesh Bank met in Basel, Switzerland, to discuss the breach and the vulnerabilities it exposed in the system.
In a joint statement, the three sides said they had agreed to cooperate in trying to “bring the perpetrators to justice, and protect the global financial system from these types of attacks.”
But the details of the second attack — which Swift said occurred in the last few months — suggested a highly sophisticated threat that did not necessarily hinge on weak digital defenses. Swift declined to say how much money was stolen from the bank, which was not located in Bangladesh.

Somehow the thieves obtained a valid Swift credential that allowed them to “create, approve and submit” messages on the network. Those messages — sent from PCs in the bank’s back offices or from laptops — were then used to move money from one of the bank’s accounts.
Many banks have a system of checks and balances by which they can validate and review transactions to root out fraud.

But in this latest case, the thieves used a form of malware that targeted a PDF reader that the bank used to confirm that payments had been made. The malware, according to Swift, then manipulated the PDF to “remove traces of the fraudulent instructions.”
That the thieves knew that the bank used a PDF program to confirm its payments shows the level of detail gleaned about how the particular system worked. At Bangladesh Bank, Swift transactions were tracked using physical printouts. So the thieves tailored their malware in that attack to interfere with the printer and cover their tracks.
The attacks have been a major headache for the ubiquitous and publicity-shy Swift, an acronym for the Society for Worldwide Interbank Financial Telecommunication. Based in Belgium, Swift is partly owned and overseen by the world’s biggest banks, which have used the technology to facilitate money transfers since the 1970s. It prides itself on not disclosing any information about its users.

After the attacks, Swift has had to walk a fine line trying to shore up confidence in the security of its network among its 11,000 users, while urging those members to take additional security measures to defend against future attacks.

“Your first priority should be to ensure that you have all the preventative and detective measures in place to secure your own environment,” Swift said in its message. “This latest evidence adds further urgency to your work.”Nicole Perlroth contributed reporting.


May 1, 2016

Hackers’ $81 Million Sneak Attack on World Banking

Michael Corkery

“The trend is moving from opportunistic crime to Hollywood-scale attacks,” said Mr. Nish, whose firm has analyzed the malware believed to have been used in the Bangladesh breach.
In the United States, most banks take special precautions with their Swift computers, building multiple firewalls to isolate the system from the bank’s other networks and keeping the machines physically isolated in a separate locked room.
But elsewhere, some banks take far fewer precautions. And security experts who have analyzed the Swift breach said they had concluded that the Bangladesh bank may have been particularly vulnerable to an attack.

“Swift is a great organization,” said Chris Larsen, the founder of Ripple, a financial technology company that aims to speed up global money transmissions. “But the system is fractured and antiquated. The way it is set up, you cannot totally isolate problems in a place like Bangladesh from the whole network.”

In some ways, Swift is a testament to how technology has helped all countries — including poorer ones — gain access to the financial system. But that broader access has a downside.
The central bank in Bangladesh, by some accounts, employed fewer protections against cyberattacks than many other large banks. The bank, for example, used $10 routers and no firewalls, according to news reports.
The server software that the Bangladesh bank employed was a Swift product called Alliance Access, which connects banks to the central messaging system. In a sign of how seriously Swift regards the breach of Alliance Access, the group issued a “mandatory software update” last week to help its members identify possible irregularities.

The central bank of Bangladesh, in Dhaka, the capital. The heist was timed so that when Federal Reserve officials tried to contact Bangladesh, it was a weekend there and no one was working. By the time central bankers in Bangladesh discovered the theft, it was the weekend in New York and the Fed was closed. Ashikur Rahman/Reuters

“These hackers figured out this was a weak point on the periphery, and they went for it,” said Jeffrey Kutler, editor in chief at the Global Association of Risk Professionals, a trade group. “But they were not able to compromise the core.”

Swift’s core is built on technology that has been evolving for decades. What began in 1973 as a relatively small network of 240 banks in Europe and North America is now a sprawling network of 11,000 users that includes both banks and large corporations. At first, Swift could be used to authorize payments across national borders. But it is now also used to transmit messages related to domestic payments, securities settlements and other transactions.

Swift’s growth in recent years — it set a record for messages in March — reflects the increasingly global and interconnected nature of finance. But it also shows the risk of so many financial instructions running through a single system made up of a patchwork of banks and
companies with varying levels of online protection.

Each bank on the Swift network is identified by a set of codes. And it was the codes assigned to the Bank of Bangladesh that were recognized — correctly — by the Federal Reserve Bank of New York when it transferred $81 million of the Bangladesh bank’s money to the Philippines, not knowing that someone, somewhere, had stolen the credentials of the Bangladesh bank and installed malware to cover his or her tracks.
Initially, the thieves requested the transfer of $951 million into a handful of bank accounts in Sri Lanka and the Philippines — a number that prompted the New York Fed to ask the Bangladesh bank to reconfirm that it indeed wanted to move the money.
In the end, the Fed processed only five of the 35 fraudulent payment requests, after it could not reconfirm with officials in Bangladesh.
The hackers seemed to time the attack perfectly: When officials from the Fed tried to reach out to Bangladesh, it was a weekend there and no one was working. By the time central bankers in Bangladesh discovered the fraud, it was the weekend in New York and the Fed offices were closed.

To conceal the crime, the malware disabled a printer in the Bangladesh bank to prevent officials from reviewing a log of the fraudulent transfers.

Representative Carolyn B. Maloney, Democrat of New York, has called for an investigation into the theft. Robin Caplin/Bloomberg

The money was transferred to accounts in the Philippines and then into the Philippine casino system, which is exempt from many of the country’s anti-money-laundering requirements.
The New York Fed has been criticized for letting the $81 million slip out. Representative Carolyn B. Maloney, a New York Democrat and member of the Financial Services Committee, has called for an investigation, warning that the breach “threatens to undermine the confidence that foreign central banks have in the Federal Reserve, and in the safety and soundness of international monetary transactions.”
The New York Fed said in a statement that “there is no evidence that any Fed systems were compromised” and that the transfer of the money had been “fully authenticated” by Swift.
Swift, which prides itself on its secrecy and low public profile, also put out a statement about the attacks. But its executives declined to speak on the record about the episodes, which are still under investigation. The group’s chairman, Yawar Shah, who is a senior executive at Citigroup, also declined to comment.
In its statement, Swift emphasized that the hackers had been able to breach only some of the banks that communicate over Swift, not the network itself.
“The commonality in what we have seen is that (internal or external) attackers have successfully compromised banks’ own environments,” Swift said.
Even if officials at the Bangladesh bank had employed the highest of security measures, the thieves displayed a level of skill, cunning and determination that may have been able to penetrate a far more secure system.
“If you have an attacker who really wants to get in and knows there is a big prize,” Mr. Nish said, “keeping them out over the long term is really difficult.”