Vulnerabilities / Threats
4/26/2011
06:05 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

China Implicated In Hacking Of SMB Online Bank Accounts

FBI warns that small- to midsize businesses are being targeted in an attack that so far has bilked companies' accounts of millions of dollars and wired the money to Chinese companies

This time it wasn't an "advanced persistent threat" that China was associated with: a fraud alert issued by the FBI today implicates China in a cybercrime operation that bilked U.S.-based small- to midsize businesses of $11 million over the past year.

The FBI warned that it has identified 20 incidents in which SMBs' online banking credentials were stolen and their bank accounts siphoned, with the money wired to China-based economic and trade companies near the Russia border. The attackers attempted to steal some $20 million overall during the March 2010 and April 2011 timeframe.

What was most striking about the FBI alert was the rare level of detail the bureau provided for both SMBs and banks. It spelled out the transaction increments and paths used by the attackers, as well as their geographic drops and phony company names. The FBI says the stolen funds were wired to companies located in China's Heilongjiang province, with company names that include Chinese ports such as Raohe, Fuyuan, Jixi City, Xunke, Tongjiang, and Dongning, and the words "economic and trade," "trade," and "LTD."

The transactions ranged from $50,000 to $985,000, with most above $900,000. According to the FBI, the attackers had the most success in getting their hands on the money when they transferred under $500,000 per transaction. When the money is transferred, it's immediately withdrawn or transferred elsewhere. They also use money mules in the U.S. "The malicious actors also sent domestic ACH and wire transfers to money mules in the United States within minutes of conducting the overseas transfers. The domestic wire transfers range from $200 to $200,000. The intended recipients are money mules, individuals who the victim company has done business with in the past, and in one instance, a utility company located in another U.S. state," according to the FBI. These ACH transactions from the compromised bank accounts were anywhere from $222,500 to $1.3 million.

"We'd like see more of this from the FBI--specific and actionable information on a regular basis," say Nick Selby, managing director of consultancy Trident Risk Management, and a police officer. "The FBI is telling the banks what to look out for, and the business owners [as well]--both sides of the equation."

Read the rest of this article
on Dark Reading

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2174
Published: 2015-05-24
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors,...

CVE-2015-0713
Published: 2015-05-24
The web framework in Cisco TelePresence Advanced Media Gateway Series Software before 1.1(1.40), Cisco TelePresence IP Gateway Series Software, Cisco TelePresence IP VCR Series Software before 3.0(1.27), Cisco TelePresence ISDN Gateway Software before 2.2(1.94), Cisco TelePresence MCU Software befor...

CVE-2015-0722
Published: 2015-05-24
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.

CVE-2015-1894
Published: 2015-05-24
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2015-1895
Published: 2015-05-24
IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 relies on client-side code to verify authorization, which allows remote attackers to bypass intended access restrictions by modifying the client behavior.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.