Hybrid cyber attacks on banks in former Soviet states has already resulted in estimated losses of $100m.
Security researchers at Trustwave report that cybercriminals are using mules to open accounts with counterfeit documents while hackers compromise the bank’s systems to obtain unauthorised privileged access and break into the network of third-party processors.
The hackers ultimately target privileged access to card management systems before activating overdraft facilities, and reducing the risk ratings associated with the counterfeit bank accounts. At this point the mules are able to withdraw funds from cash machines running up huge debts.

The crooks use a combination of opportunistic phishing, social engineering, and Windows exploits to gain entry into the banking systems. Trustwave reports that key loggers are planted on compromised networks to snaffle login credentials of bank employees authorised to approve overdrafts. Although the attacks originated in Eastern Europe/Russia, Trustwave believes that there is a very high probability that this technique will spread globally.
The multiple stages of a hybrid bank attack [source: Trustwave]
网络安全公益短片小心披露您的地理位置信息
公司应该对信息系统的运行维护负责,保持运行维护控制力。加强安全入侵检测监控,进行风险评估与安全扫描,及时发现并处置安全事件。
The SpiderLabs team at Trustwave found linked scams after it was asked to investigate a series of bank breaches originating in ex-Soviet countries during mid-to-late 2017. The actual amount of money stolen was different in each case, with the average amount around $5m (in cash), ranging from $3m to $10m.
The investigations revealed that multiple attacks shared a number of common features, such as large losses from what initially appeared to be legitimate customer accounts. In all cases, the theft took place using normal withdrawals from various cash terminals outside the bank’s originating country.
In some cases, the banks didn’t realise a breach had taken place and a significant amount of money was stolen well after the attack was completed. In a few cases, the malicious activity was reported to the banks by third-party firms responsible for processing the bank’s debit and credit card transactions. The common tie between all the scams was that money was stolen using legitimate cards provided by each bank. ®
Sponsored:
The Joy and Pain of Buying IT – Have Your Say
核心的机密数据外泄会造成公司的竞争力丧失,严重到威胁生存和发展,所以有必要考虑部署数据防漏洞系统,降低可能从各个渠道泄密造成的损失。

猜您喜欢

能源市场化改革的三个原则和四个机制
医疗行业数据安全漫谈
网络安全法实施宣传
上海首座“光储充”充电站投运 关注受益股
FULLHD-FILMIZLET MHCAMS
信息安全及保密知识在线