Risk
11/9/2010
11:45 PM
Connect Directly
RSS
E-Mail
50%
50%

Taking Cybersecurity Lessons To The Bank

Lessons learned from frequent attacks make banks good role models in defending against bad guys

Banks are under attack -- not so much from gun-toting bank robbers, but from sophisticated cybercriminals.

Using programs such as Zeus to compromise customers' PCs and siphon money from their bank accounts, cybercriminals stole or attempted to steal nearly $100 million in the first three quarters of 2009, according to the Internet Crime Complaint Center. Traditional bank robbers on average stole $4,029, and all the U.S. bank robberies in 2009 totalled about $35 million, according to the FBI's Uniform Crime Reporting (UCR) project.

"Criminals are out there right now harming both the commercial account holders and financial institutions," Sari Stern Greene, president of Sage Data Security, told attendees last week at the Cybercrime Symposium 2010 in Portsmouth, N.H. "And every time this happens, it harms the whole community."

Banks have the money, so they are today's targets. But they aren't the only ones. Zeus and other malicious programs can easily be used to provide access to corporate PCs in other industries as well. For that reason, security managers should look to what's working -- and what's not working -- for the banking industry, say security experts.

Even the most educated customer may not have a defense against a targeted Zeus attack. For that reason, James Woodhill, founder of Authentify and a cybercrime policy expert, argues that education is not the answer.

In his presentation, Woodhill pointed out that it took a noncontroversial medical practice -- the use of penicillin -- nearly 30 years to spread out to general medical practitioners. Innovative defenses against cybercrime could take just as long, he says.

"Education won't help a bit -- not at this scale," Woodhill says. "It takes a long time to get information through to a large group of people."

But being aware of the problem can at least help consumers know their options, argues Sage's Greene. "The challenge is how to inform customers without scaring them away," she says.

Any company that allows users to access corporate data from laptops or home computers is importing risk, says Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham.

"Work from home equals risk at home," Warner says. "If one of your employees has Zeus on their computer and they work from home, then so do their friends in the Ukraine."

Companies should have quarantine zones for home computers and laptops that have left the company premises until their security can be verified, Warner advises.

In the online world, attributing attacks is difficult, which makes online theft an attractive crime.

In the physical world, bank robberies are a low-percentage crime. They account for only about 2 percent of all robberies -- and arrests are made in 60 percent of the cases, according to the FBI's Uniform Crime Reporting (UCR) program. In the virtual world, criminals conduct attacks from safe havens where laws are vague or law enforcement agencies don't often pursue online criminals.

To prosecute cybercriminals, there must be attribution, experts say. But many companies want to clean up the crime scene -- their computers -- and sweep the incidents under a virtual rug. Companies should stop hiding these incidents and pursue investigations of attacks that use Zeus and other malware, experts say.

"If you go in and delete malware off a computer, you don't know why they got the malware, you don't know where the malware came from, you don't know what it might have stolen while it was there, you don't know what data left your company because of the infection, and you don't know if the user understands how he got infected so he won't go do it again," UAB's Warner says.

The current attacks on banks also show the limitations of both application whitelisting and intrusion detection that depends on blacklists, such as antivirus tools, observers say. Blacklisting cannot keep up with the changing threat, and whitelists are too hard to maintain in general-use computing environments, says James Lyne, a senior technologist for Sophos.

"Any one control fails to deal with the threat," Lyne says.

Rather than make binary decisions, organizations should use blacklists and whitelists -- plus reputation and other information -- to help decide whether to allow access to a user, Lyne says. In addition, companies and banks need to use policies and controls to make security a foundation of their corporate culture, he says.

Banks are good at building process controls that help protect them against fraud, says Rick Simonds, CTO of Sage Data Security. "You need controls," he says. "You have a lot of controls on bank employees, and that helps them with security."

But while some banks have a lot of controls to detect fraud committed by insiders, they don't always monitor outside transactions in as much detail, Lyne says. A good defense should account for both the external threat and the internal threat.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.