Bangladesh Initially, Bangladesh Bank was uncertain if its system had been compromised. The governor of the central bank engaged
World Informatix Cyber Security, a US-based firm, to lead the security incident response, vulnerability assessment and remediation. World Informatix Cyber Security brought in the forensic investigation company
Mandiant, for the investigation. These investigators found "footprints" and malware of hackers, which suggested that the system had been breached. The investigators also said that the hackers were based outside Bangladesh. An internal investigation has been launched by Bangladesh Bank regarding the case.
The Philippines The Philippines'
National Bureau of Investigation (NBI) launched a probe and looked into a Chinese-Filipino who allegedly played a key role in the money laundering of the illicit funds. The NBI is coordinating with relevant government agencies including the country's
Anti-Money Laundering Council (AMLC). The AMLC started its investigation on 19 February 2016, of bank accounts linked to a
junket operator. A
Philippine Senate hearing was held on 15 March 2016, led by Senator
Teofisto Guingona III, head of the
Blue Ribbon Committee and Congressional Oversight Committee on the Anti-Money Laundering Act. A closed-door hearing was later held on 17 March.
Philippine Amusement and Gaming Corporation (PAGCOR) has also launched its own investigation. Prior to that, the bank reorganized its board of directors by increasing the number of independent directors from four to seven. On 10 January 2019, Maia Santos Deguito, a former manager at RCBC, was convicted on 8 counts of money laundering and sentenced to 4 to 7 years imprisonment for each count at a Makati City
Regional Trial Court. On 12 March 2019, RCBC sued Bangladesh Bank for embarking "on a massive ploy and scheme to extort money from plaintiff RCBC by resorting to public defamation, harassment and threats geared towards destroying RCBC's good name, reputation, and image." On 6 February 2023, the First Division of the
Court of Appeals dismissed Deguito's appeal and upheld the Makati City Regional Trial Court's conviction in 2019. In the February 29, 2024
judgment on the Bangladesh Bank robbery, the
New York Supreme Court dismissed 3 causes of action—conversion, aiding and abetting conversion, and conspiracy to commit conversion—against
Rizal Commercial Banking Corporation and defendants Ismael Reyes, Brigitte Capiña, Romualdo Agarrado and Nestor Pineda for lack of personal jurisdiction. It however allowed the Bangladesh Bank case concerning the $81-million cyberheist to proceed on other grounds including the return of money received.
United States FireEye's Mandiant forensics division and
World Informatix Cyber Security, both US-based companies, investigated the hacking case. According to investigators, the perpetrators' familiarity with the internal procedures of Bangladesh Bank was probably gained by spying on its workers. The US
Federal Bureau of Investigation (FBI) reported that agents have found evidence pointing to at least one bank employee acting as an accomplice. The FBI also alleged that there is evidence that points to several more people as possibly assisting hackers in navigating the Bangladesh Bank's computer system. The government of Bangladesh has considered suing the
Federal Reserve Bank of New York in order to recover the stolen funds. According to this report, U.S. prosecutors suspected that the theft was perpetrated by criminals backed by the government of North Korea. The report also said that to be included in the charges are "alleged Chinese middlemen", who facilitated the transfer of the funds after it had been diverted to the Philippines. Some security companies, including
Symantec Corp and
BAE Systems, claimed that the North Korea-based
Lazarus Group, one of the world's most active state-sponsored hacking collectives, were probably behind the attack. They cite similarities between the methods used in the Bangladesh heist and those in other cases, such as the hack of
Sony Pictures Entertainment in 2014, which U.S. officials also attributed to North Korea. Cybersecurity experts say Lazarus Group was also behind the
WannaCry ransomware attack in May 2017 that infected hundreds of thousands of computers around the world. The
Cybersecurity and Infrastructure Security Agency published an alert "FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks", which attributed the Bank of Bangladesh hack in 2016 to BeagleBoyz. The agency claimed that BeagleBoyz is a threat actor group under the North Korean government's Reconnaissance General Bureau, and have been active since 2014. US
National Security Agency Deputy Director
Richard Ledgett was also quoted as saying that, "If that linkage from the Sony actors to the Bangladeshi bank actors is accurate—that means that a nation state is robbing banks." The U.S. has charged a North Korean computer programmer,
Park Jin Hyok, with hacking the Bangladesh Bank, alleging this was carried out on behalf of the regime in Pyongyang. The same programmer has also been charged in connection with the
WannaCry 2.0 virus and the
2014 Sony Pictures attack.
Other attacks Computer security researchers have linked the theft to as many as
eleven other attacks, and alleged that North Korea had a role in the attacks, which, if true, would be the first known incident of a state actor using cyberattacks to steal funds. ==Response from linked organizations==