Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/16/2015
09:30 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Cyberciminals Target Bank Employees, Steal $1 Billion From Financial Institutions Worldwide

'Carbanak' includes operatives from Russia, Ukraine, China, and other parts of Europe.

KASPERSKY SECURITY ANALYST SUMMIT -- Cancun, Mexico -- An international cybercrime ring based out of Eastern Europe has pilfered some $1 billion in two years from 100 different banks in nearly 30 countries using spearphishing emails targeting bank employees.

Russian financial institutions so far have been hardest hit, followed by Denmark and the US, by the so-called Carbanak cybercrime gang that includes operatives from Russia, Ukraine, China, and other parts of Europe. The ring has also victimized financial institutions in Germany, China, Ukraine, Canada, Hong Kong, Taiwan, Romania, France, Spain, Norway, India, UK, Poland, Pakistan, Nepal Morocco, Iceland, Ireland, Czech Republic, Switzerland, Brazil, Bulgaria, and Australia.

What sets this cybercrime gang apart from others is its use of methods typically associated with cyber espionage:  spearphishing attacks, which target bank employees, as well as a remote Trojan backdoor based on Carberp that spies, steals data, and provides remote access to infected machines. The cybercriminals--who also digitally signed the malware to make it appear as legitimate code--do a little reconnaissance and then employ the appropriate tools to gain access to sensitive banking systems or to install remote administration tools, for instance. But unlike a nation-state, they don't employ zero-day attacks.

Kaspersky Lab teamed up with the Dutch National Police and INTERPOL to investigate the attacks. Peter Zinn, senior high tech crime advisor for the Dutch National Police, said in a presentation here today that the case is an example of how law enforcement and the private sector can work in concert. Among the evidence found: stolen credit card accounts, he said. "We found 1 million stolen credit cards," Zinn says, most of which already had been frozen in the wake of the theft. "There were 15% that were not blocked, so we" had those blocked as well, he said.

Sergey Golovanov, principal security researcher at Kaspersky Lab's global research and analysis team, who worked on the Carbanak research, says one victim bank his team assisted said all of its branches in that country had been hit, and another bank admitted it had been attacked multiple times by the gang.

The victim banks were hit by unpatched vulnerabilities in Office in some cases. "The trick was that the bank was patching Windows, but not Office," Golovanov says.

One of the more intriguing techniques they used was video surveillance to learn about and ultimately impersonate a bank clerk transferring money:  "They were sending screenshots … and updating the picture. Then it becomes live video when needed" to watch a specific action by the clerk, he says.

The victimized bank networks appear to have been infiltrated by the attackers for anywhere from two- to four months, and possibly infected several hundreds of computers in each institution. The gang would steal up to $10 million in each hack during that period, according to the researchers.

The spear phishing emails the researchers found used infected Microsoft Word files or Control Panel Applet (CPL) files. Interestingly, the exploits in the attachments have a possible China connection: Kaspersky Lab says the command and control servers for the attack campaign are located in China, as well as domain registrations with ties to Chinese citizens. But that could just as well be a false flag, according to the researchers.

The cyber criminals cashed by using online banking or e-payment systems to transfer the stolen money to their accounts, and in some cases, padding account balances in the accounting system to hide their transactions that depleted the account.

They also hijacked ATM machines to physically pick up the cash, with a money mule who collected it.

Kaspersky Lab has posted a blog with more details on the attacks.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
anon8414566375
50%
50%
anon8414566375,
User Rank: Apprentice
2/17/2015 | 8:11:22 AM
Financial services firms to tackle cybersecurity issues that are affecting the industry
Banks will need to rapidly develop and fast track any technology that will help in improve and focus on the common security concerns that plague the internet to mitigate these kinds of threats. I work with McGladrey and there's great advice on our website for financial services firms to tackle cybersecurity issues that are affecting the industry. McGladrey are also hosting a three-part webcast series to understand how you can step up your security posture and data breach preparedness you can register at the link.  bit.ly/mcgldrycybersec2
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26030
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
CVE-2021-26031
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI.
CVE-2021-27710
PUBLISHED: 2021-04-14
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system funct...
CVE-2021-28484
PUBLISHED: 2021-04-14
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send i...
CVE-2021-29654
PUBLISHED: 2021-04-14
AjaxSearchPro before 4.20.8 allows Deserialization of Untrusted Data (in the import database feature of the administration panel), leading to Remote Code execution.