Attacks/Breaches
8/28/2014
04:05 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Feds Investigating Breaches At JPMorgan, Other Banks

JPMorgan working with FBI, US Secret Service to determine scope of breach, but other newly reported intrusions at financial firms may not be related.

[8/29/14 UPDATE: Bloomberg today reports that the JP Morgan breach began in June and exploited multiple zero-day software vulnerabilities, with the attackers running custom malware in the attack against the firm]

US financial institutions are in the bullseye again as the FBI and US Secret Service are investigating possible data breaches earlier this month at JPMorgan Chase and other US banks. This time the financial community isn't battling distributed denial-of-service (DDoS) attacks, but attacks that reportedly stole customers' bank account information.

The FBI today confirmed that it was investigating reports of attacks against multiple US financial institutions. "We are working with the United States Secret Service to determine the scope of recently reported cyber attacks against several American financial institutions," an FBI spokesperson said in a statement. "Combating cyber threats and criminals remains a top priority for the United States Government, and we are constantly working with American companies to fight cyber attacks."

JPMorgan said it has not detected any fraudulent activity thus far and is working with law enforcement to determine the scope of the breach. The financial firm is asking customers to report any suspicious activity on their accounts, and will contact anyone who was affected. "Companies of our size unfortunately experience cyber attacks nearly every day. We have multiple layers of defense to counteract any threats and constantly monitor fraud levels," a JPMorgan spokesperson said.

The firm expects to spend more than $250 million per year in cyber security, with some 1,000 employees dedicated to those operations by the end of this year.

Word that JPMorgan and at least one other bank had been hit in mid-August by hackers who stole gigabytes of information initially came via a Bloomberg report late yesterday and then The New York Times. The attackers reportedly exploited a zero-day vulnerability found on one of the banks' websites in a multi-stage attack that, in the case of JPMorgan, ultimately led the attackers to the sensitive banking account information. Published reports suggest the attacks came out of Russia.

Sean Mason, global IR leader at CSC, says the attack is mostly likely the handiwork of cyber criminals, not a nation-state or hacktivist group.

Financially driven cybercrime traditionally has originated out of Eastern Europe, and mainly Russia, but details about this breach so far don't sync with the typical cybercrime M.O. The absence thus far of fraudulent transaction activity in the wake of the stolen banking information, which is unusual for a typical cybercrime hack, has led to speculation about the intent of the attackers. And adding to the confusion, zero-day attacks are more often the earmark of state-sponsored attacks associated with cyber espionage.

One theory about why no banking fraud has yet been seen suggests a possible political move by Russia in retaliation for recent US sanctions against the nation for its actions in Ukraine.

Tom Kellermann, chief cybersecurity officer at Trend Micro, says world political developments indeed can yield cyber attack responses. "Geopolitics are harbingers of cyber attacks, and thus economic sanctions will be met by cyber sanctions in 2014," Kellerman says. "Regardless of whether the regime was in involved, the untouchables of Russian cyber have unleashed a cyber crime wave upon our financial institutions just in time for autumn."

But other security experts are skeptical that the reported attacks constitute an orchestrated attack campaign against US financial institutions. According to one source with insight into the attacks, published reports about the attacks inaccurately connect unrelated financial institution breaches: In fact, some of the intrusions and breaches were probably not at all related, the source notes. Banks are regularly being targeted by attackers, and several published reports this week mistakenly connected unrelated security incidents, the source says.

Sophisticated attacks don't necessarily equal Chinese hacker groups or nation-state attackers, either. "I have noticed that there's been a lot of hastiness to speculate... The 'highly sophisticated attacker' of last year is now the norm. And they usually aren't sophisticated attacks," out of China, anyway, notes J.J. Thompson, CEO of Rook Security.

[How an organization reacts to hackers infiltrating its network is becoming the key to damage control for data -- and the corporate image. Read Incident Response Now Shaping Security Operations.]

Meantime, the possibility of the heavily fortressed financial industry suffering a major breach is yet another reality-check that no one is immune to a determined attacker. There are plenty of unanswered questions, such as whether the stolen information was encrypted.

"The question to ask is how much of the data was encrypted, given it was sensitive financial information.  What we have seen again and again with these types of attacks against banks is that breach prevention and threat monitoring alone will not keep the cyber criminals out," says Tsion Gonen, chief strategy officer at SafeNet. "Companies need to focus on a defense-in-depth strategy and securing the breach, and that means using data encryption as the last line of defense. That is only way to make the data useless to hackers and cyber criminals."

Bob Stratton, general partner at MACH37, cautions that concluding where the attacks came from this early in the investigation is premature. "The fact that an attack comes from someone's network does not automatically imply that that someone is the attacker," he says. "It will take some time to forensically sort this out."

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
8/29/2014 | 4:19:30 PM
Re: "sophistication"
You can buy or download everything technical that you will need to craft an attack from the internet, and the only thing left is a delivery mechanism. Well, you can get that from the internet as well - just shop for botnets for rent. Why reinvent the wheel, right?

I'm not saying that the bad guys are not smart people; I'm just simply stating that attacking an entity is not that difficult these days. The flip side however, is mitigating a risk, which is an entirely different undertaking with complexities that are sometimes difficult to overcome. It really does take a culture change within an organization to better position itself against a threat.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
8/29/2014 | 3:47:53 PM
Re: "sophistication"
I agree with you.  Often the attack isn't very sophisticated but rather the attackers are smart and use simple, slow techniques which often avoid detection.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
8/29/2014 | 11:05:32 AM
update from Bloomberg today
Just updated my piece with a new report from Bloomberg that says the attack began in June, used multiple 0day exploits, and went undiscovered until mid-August when the bank found signs of a breach. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/29/2014 | 10:50:27 AM
Re: Chase encourages phishing
Kelly did a great job sorting out the facts from the initial media pile-on. Double kudos for that!
JohnRS
50%
50%
JohnRS,
User Rank: Apprentice
8/29/2014 | 10:38:44 AM
Chase encourages phishing
I have some accounts with Chase.  Recently I realized that the boilerplate at the bottom of many of their messages includes instructions regarding phishing messages which is the OPPOSITE of what you should do.  Here it is, from a block boldly labelled "E-mail Security Information":

If you are concerned about the authenticity of this message, please click here or call the phone number on the back of your credit card. If you would like to learn more about e-mail security or want to report a suspicious e-mail, click here

Yes, Chase is telling you (twice) to click on a link in a suspected phishing message.  Duh!

DarkReadingTim
50%
50%
DarkReadingTim,
User Rank: Strategist
8/29/2014 | 10:05:32 AM
Re: "sophistication"
I agree with this point, Bob, as well as the one you made in the story about attribution. It's difficult for us as reporters to wrestle with these breaking breach stories, because we are limited by what the victim is willing to tell us. Whether the attack was sophisticated, and where it came from, are sometimes things that even the victim organization doesn't know in the early stages.

I sometimes feel like we would get more value from studying breaches that have been executed, investigated, and remediated than we get from studying yesterday's breach, where so little information is available.
securityaffairs
50%
50%
securityaffairs,
User Rank: Ninja
8/29/2014 | 2:03:30 AM
Re: "sophistication"
The circumstance is very concerning, it is crucial to understand the extend of the attack in term of compromised systems and impacted users.

Another element to understand is the attack chain of the gang to understand if they are linked to the recent wave of cyber attacks which hit European banks. 

The media reported on an alleged zero-day exploited in US and EU attacks ... anyway law enforcement and numerous forensic companies are already investigating ...

 
Bob Stratton
50%
50%
Bob Stratton,
User Rank: Apprentice
8/28/2014 | 5:21:31 PM
"sophistication"
I'm not speaking specifically to the JPMC case, because we have yet to see, but I have long been awaiting the day when someone would address the seemingly obligatory "It was a highly sophisticated attack" canard from victim organizations.  In general, it often isn't. I'm still trying to divine what cover people think they're actually gaining when they assert that. 

Kudos to both J. J. Thompson and our author for actually raising that point in any forum. 
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant