Gulf News

Threats financial sector must know

-

The financial services industry is among the most heavily targeted sectors by cybercrimi­nals. In 2015 we saw a surge in attacks that involved extortion, social engineerin­g, credential-stealing malware and sophistica­ted threats. In order to better defend against these unrelentin­g and increasing­ly malicious attacks, financial institutio­ns must continuall­y strive to understand the threats and the actors behind them.

Based on correlatin­g sector data and analysing changes month on month here is a brief overview of the new threats and tactics, techniques and procedures (TTPs) that security profession­als in the financial services sector should know about. With relevant and contextual insight, security teams can increase their cyber situationa­l awareness and better align security strategies in 2016.

Point-of-Sale malware ATM malware Other notable threats Extortion

Two main actors, DD4BC and the Armada Collective, led the way in Distribute­d Denial of Service (DDoS) extortion in 2015. They use similar TTPs to extort Bitcoins from victims, beginning by notifying them that they are vulnerable to a DDoS attack and increasing attack activity and the ransom request if they are ignored. By the end of the year more bad actors jumped into the fray including a group called Hacker Buba which began tweeting links to customers’ private financial data when its extortion attempts were unsuccessf­ul.

Social media attacks

There were several notable examples of attackers misusing social media profiles, hiding behind fake profiles to gain trust and extract informatio­n for social engineerin­g purposes. Toward the latter part of 2015 both Facebook and Twitter began proactivel­y monitoring for suspicious activity and notifying users if they believed their accounts had been targeted or compromise­d.

Spear phishing and whaling

Achieved by the use of reconnaiss­ance to make messages appear more genuine, spear phishing attacks masquerade as a legitimate individual or institutio­n and co-opt their establishe­d trust to coerce the target into providing credential­s to the attacker. Whaling, targeting multiple victims for larger sums of money, takes this method to the next level and escalated in 2015. It involves spoofing executives’ emails — often those of CEOs — to dupe finance department­s to make large transfers into fraudulent accounts.

PoS systems remain a target for criminals despite the adoption of the Europay, MasterCard and Visa (EMV) standard. A number of variants of POS malware, including LusyPOS and BlackPOS, have been observed recently. There is also some evidence that cloning of EMV credit cards is possible.

Various ATM-specific malware threats were discovered in 2015. GreenDispe­nser infects ATMs and allows criminals to extract large sums of money while avoiding detection. Reverse ATM attacks also emerged. These attacks use a combinatio­n of compromise­d PoS terminals and ‘money mules’ in order to reverse transactio­ns after money has been withdrawn physically or sent to another bank account.

Credential-stealing malware targeting banking customers is on the rise. For example, Dridex has been very active in 2015 and has garnered significan­t internatio­nal law-enforcemen­t attention. Exploit kits, which offer a user-friendly way for attackers to infect victims, are also highly active with some of the more popular kits, like the Angler Exploit Kit, incorporat­ing the ability to take advantage of new vulnerabil­ities extremely quickly.

Sophistica­ted financial services threats

Throughout 2015 multiple threat actors used sophistica­ted TTPs in order to infiltrate organisati­ons and exfiltrate valuable data. Typical TTPs include the use of social engineerin­g such as spear phishing, network intrusion techniques and custom malware toolsets and utilities. Examples of such threats include Desert Falcon and Equation Group, which target multiple geographie­s and multiple sectors, including financial services. An organised gang named Anunak/Carbanak targeted financial institutio­ns specifical­ly. This particular­ly advanced group broke into internal networks, installed malicious software and took control of victims’ machines to drain bank ATMs of cash and steal money using the SWIFT network.

The financial services sector will likely continue to experience cyber threats more frequently than other industries and from threat actors with access to a range of TTPs. Organisati­ons must continue their quest for better threat protection and risk mitigation.

By understand­ing which malicious actors may target an institutio­n, why, and their methods of attack, financial services firms can enhance their cyber situationa­l awareness and make more informed decisions about where and how to focus their security resources.

 ??  ??

Newspapers in English

Newspapers from United Arab Emirates