Pirate Bay co-founder charged with hacking IBM mainframes, stealing money
The Logica and Nordea hack are somehow related because both companies used an IBM mainframe, said Olin, who could not specify which mainframe was used. The operative system of the mainframe is z/OS though, a 64-bit operating system for IBM mainframes, Olin said.
The Nordea bank won't comment on ongoing legal proceedings, said Helena Astman, head of communications at Nordea.
Logica, now part of CGI Sweden, is glad that people were charged with the breach, said Anders Sandell, head of security of CGI Sweden. While both Logica and Nordea use IBM mainframes, the companies use different systems, he said, adding that he could not disclose any more technical details nor provide any information about vulnerabilities used in the hacks.
IBM Sweden spokesman Andreas Lundgren declined to comment.
At the moment, it is not really clear why Logica was hacked, said Olin. But the intruders stole extensive personal and vehicle data, including social security numbers, he said. "I won't comment any further on that because there is no evidence what they wanted to use it for. At the moment we only have loose theories."
Court proceedings against Svartholm Warg and the other three are expected to begin at the Nacka district court at the end of May, Olin said.
Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to email@example.com
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts