Story image

Hackers using spearphishing to target banks –Bitdefender

21 Aug 2018

Cybersecurity company Bitdefender has recently investigated a series of advanced cyber attacks aimed at financial institutions, designed to covertly exfiltrate massive amounts of money in coordinated strikes.

During the investigation, Bitdefender researchers found the presence Cobalt Strike components - usually associated with the Carbanak cybercriminal group that targeted more than 100 financial institutions in over 40 countries since 2013, responsible for cumulative financial losses estimated at over 1 billion Euros.

’’The investigated attacks occurred via spearphishing campaigns sent to Several Eastern European and Russian banks, usually during the first part of the week - Monday to Wednesday,” Bitdefender senior cybersecurity analyst Liviu Arsene explains.  

From March 2018, the spearphishing campaign impersonated security or financial institutions in order to trick bank employees into clicking malicious URLs and downloading malware-riddled payloads.

After establishing a foothold on the targeted machine, attackers would then escalate their privileges or look for admin users to compromise, in order to move laterally across the infrastructure.

Because of the surgical nature of the attacks, as only a small number of machines were compromised in order to remain undetected for as long as possible, the main targets were mostly employees with high privileges or access within the infrastructure.

To avoid detection, the cybercriminal organisation employed the use of fileless attack techniques, such as PowerShell scripts or Cobalt Strike payloads, as well as legitimate free tools that were mostly used for remotely connecting to the victim’s system.

To limit the risk of being discovered, attackers operated outside of normal business hours and cashout operations were planned for weekends.

However, the FBI’s recent warning - that seems to be generated by the attack against Indian bank Cosmos - that a wave of cyber attacks could be targeting financial institutions, corroborates with Bitdefender’s recent findings, placing Eastern European and Russian banks on high alert.

Although it is too early to determine if the 13.4 million dollar breach at the Cosmos financial institution is related to the attacks in Eastern Europe and Russia, the current Bitdefender investigation could be related to the same global scale attack that the FBI warned of.

The preferred modus operandi during the final phase for these cashout operations involves remotely instructing ATMs to dispense cash at a predetermined time while the money is immediately collected by members of the crime group, transferring money from the organisation’s bank accounts to the criminal accounts, or manipulating databases with account information while money mules collected the money.

Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.