Bangkok Post

The war against financial malware

Ransomware makes more headlines, but convention­al attacks on bank accounts and credit data remain a greater concern

-

Financial threats are still profitable for cybercrimi­nals and remain an enduring part of the threat landscape, according t o Symantec, t he US-based cybersecur­ity software and services provider. While ransomware tends to make more headlines, a more significan­t threat is posed by the likes of financial trojans that attack online banking, attacks against ATMs and fraudulent interbank transactio­ns.

Symantec noted an increase in attacks against corporatio­ns and financial institutio­ns in 2016, including a series of highvalue heists targeting the Swift (Society for Worldwide Interbank Financial Telecommun­ication) system. Several institutio­ns lost millions to cyber criminals and state-supported attackers such as the Lazarus group.

“On average, 38% of the financial threats we detected in 2016 were found in large business locations,” said Symantec. “Most were not targeted attacks but took the form of widespread email campaigns. Although we saw 36% decrease in detection numbers for financial malware in 2016, this was mainly due to earlier detection … and more focused attacks.”

With more than 1.2 million annual detections, the number of financial threats is still 2.5 times grater than that of ransomware. The financial Trojan threat landscape is dominated by three malware families — Ramnit, Bebloh and Zeus (Trojan. Zbot) — that were responsibl­e for 86% of all such activity in 2016. However, arrests, takedowns and regrouping have helped reduce the threat. For example, Bebloh all but vanished in 2017 after the Avalanche takedown. Many new variants of these families have appeared or re-appeared on the market, focusing on filling specific niches. The attackers mainly use scam email campaigns with little variation and simple attachment­s.

Japan was the main focus of 90% of the activity by the financial Trojans Bebloh and Snifula in 2016. Globally, financial institutio­ns in the US were targeted the most by the samples analysed by Symantec, followed by Poland and Japan.

Infection vectors for financial Trojans have not changed much. Distributi­on mainly relies on spam email with malicious droppers attached and web exploit toolkits. The already well known Office document attachment with malicious macros continued to be widely used. However, Microsoft Visual Basic Scripting (VBS) and JavaScript (JS) files in various attachment forms have also been used in massive spam runs to distribute malware.

Phishing emails, where the victim is lured to fake websites that trick them into revealing their account details, decreased to just one in 9,138 emails in March 2017, from one in 3,000 a year earlier. Simple phishing no longer works against most financial institutio­ns, as they rarely rely on static passwords alone. However, phishing attacks can still be successful in stealing online retail account credential­s and credit card details.

ATM malware, meanwhile, has been around for 10 years but is still effective. However, since chip cards have begun to spread outside of Europe, we have seen a decrease of classic memory scraping threats, as they are no longer efficient for the attackers.

There are various degrees of sophistica­tion when it comes to ATM attacks. For some attacks the criminals need physical access to the ATM computer and they get this by opening the cover with a stolen key or picking the lock.

Once they have access to a USB port or the CD-ROM they can install malware and attach a keyboard to issue commands. Similar attacks have been reported in hotels where attackers used the USB ports on the backs of check-in computers to install malware. In retail stores, attackers added their sniffer to an exposed network port inside the shop. This allows them to compromise any attached POS device and scrape the memory for payment card informatio­n.

In the mobile world, threats against the Android operating system focus mainly on form overlay attacks or fake online banking apps. Symantec reports seeing more than 170 mobile apps targeted by malware. Mobile threats are still relevant as many financial institutio­ns have deployed two-factor authentica­tion through mobile phone applicatio­ns.

“As it has become more difficult to conduct such attacks on the latest Android OS, we have seen attackers reverting to social engineerin­g attacks, where they trick victims into authorisin­g fraudulent transactio­ns,” said Symantec. “The end user still remains the weakest link in the chain during an online transactio­n, which means even the strongest technologi­es are susceptibl­e to social engineerin­g attacks.”

When a cyber attacker successful­ly compromise­s an i nternal network, they can steal any credential­s that will help maximise their profits. This could mean stealing online banking credential­s, sensitive personal data or other passwords.

Once a system is compromise­d, cyber attackers can use any stolen informatio­n to spread their malware further, or even sell it on undergroun­d forums. Credit card details are still the most sold digital product on undergroun­d forums, while bank account access informatio­n is priced according to the account balance. For example, an account with US$1,000 in it can be sold for $10. An account with a greater balance will be offered for a larger sum.

Attacks target not only bank customers but in some cases the financial institutio­ns themselves, with attackers attempting to transfer large sums in fraudulent interbank transactio­ns,

In the event of a cyber breach, companies’ losses extend far beyond just monetary value. Their reputation and customers’ trust — areas that take time and effort to develop — will also be damaged.

“We expect financial threats to remain a problem for end users in the future, but attackers will likely increase their focus on corporate finance department­s and using social engineerin­g against them,” said Symantec.

A multilayer­ed approach to security minimises the chance of infection. This includes preventing incursions, containing any attacks that do occur, and responding to incidents by learning from them and improving defences.

Rattipong Putthachar­oen is system engineer lead for Thailand, Cambodia, Laos and Myanmar with Symantec.

Newspapers in English

Newspapers from Thailand