Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/8/2018
05:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Symantec Uncovers North Korean Group's ATM Attack Malware

Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs.

Researchers from Symantec have uncovered the malware tool North Korea's infamous Lazarus Group has been using since 2016 to empty millions of dollars in cash from ATMs belonging to mostly small and midsize banks in Asia and Africa.

In a report this week, the security vendor described the malware as designed to intercept and approve fraudulent ATM cash withdrawal requests before they reach a bank's underlying switch application server that processes them.

The malware is an executable file that can be injected into a running and legitimate process on application servers running IBM's AIX operating system. All of the switch application servers that the Lazarus Group has managed to compromise with the malware so far were running unsupported versions of AIX, Symantec said.

"The takeaway is not only one for banks but any organization that runs a production environment with legacy, outdated, or unsupported equipment and software," says Jon DiMaggio, senior threat intelligence analyst at Symantec.

The financial loss and public embarrassment accompanying such attacks far outweigh the cost of bringing obsolete infrastructure up to speed. "At a minimum, financial institutions should use current and supported systems and software in order to minimize the risk of exposure of both monetary losses as well as sensitive customer data, such as PII," DiMaggio says.

The US government has dubbed the Lazarus Group's ATM attacks as the FastCash campaign. In an Oct. 2 technical advisory, the FBI, Department of Homeland Security, and US Treasury Department described the attacks as costing banks tens of millions of dollars. The advisory noted two incidents, one in 2017 and another in 2018, where Lazarus Group actors enabled simultaneous cash withdrawals from ATMs spread across two dozen countries.

In each of Lazarus Group's multiple attacks, the threat actor configured and deployed legitimate scripts on the application servers to intercept and reply to fraudulent ATM withdrawal requests, the advisory said.

But Symantec's investigation has shown that the executable enabling the fraudulent activity is, in fact, malware, the security vendor said in its report this week. Symantec has named the malware Trojan.Fastcash and described it as having two functions.

One of them is to monitor for and read the Primary Account Number (PAN) in all incoming traffic from ATMs. The malware is designed to block all traffic containing PANs previously identified as belonging to the attackers. It then generates a fake response approving the fraudulent request, ensuring all attempts to withdraw money are successful. The US government's technical alert had previously noted that most of the accounts against which the fraudulent transactions were initiated had minimal or zero balances.

"The malware responds with formatted messages as documented in ISO 8583," DiMaggio says. ISO 8583 is a messaging standard that is used by banks for financial transactions. "This is how the attacker could get around the messaging system and essentially trick the ATM into believing it was receiving response from the banks legitimate internal systems."

The responses the malware is programmed to generate include an "Invalid PIN" message and one for insufficient funds, DiMaggio notes.

Symantec said it has discovered multiple versions of the FastCash Trojan so far, each equipped with different response logic. The vendor says it has been unable to determine why the attacks have programmed the different responses to withdrawal requests into the malware.

In all instances where the Lazarus Group successfully deployed the malware, the application servers were running versions of AIX well past their support dates.

The attacker targeted smaller banks with fewer resources in places like Asia and Africa because they likely were aware that larger, better-funded organizations would have better security, DiMaggio said. "The vulnerable version of AIX was simply what was in the environment the attacker targeted. It was not the driving piece of the attack as much as a characteristic of the specific environment the attacker had access to," he notes.

For the moment, there is little indication as to how exactly Lazarus Group actors might have gained access to the switch application servers in the first place. But it is quite likely that they employed spear-phishing emails to illicitly obtain credentials belonging to bank employees, which they then used to access the network.

Once they had gain an initial foothold, the attackers would have enumerated the network for high-value systems and gain access to them. "By taking the time to learn the environment and use legitimate credentials, the attacker was able to execute this attack from the inside out, meaning the banks firewalls would not play a factor in this attack," DiMaggio says.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7844
PUBLISHED: 2019-05-22
Adobe Media Encoder version 13.0.2 has an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2017-9809
PUBLISHED: 2019-05-22
OX Software GmbH OX App Suite 7.8.4 and earlier is affected by: Information Exposure.
CVE-2018-12886
PUBLISHED: 2019-05-22
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypas...
CVE-2019-7834
PUBLISHED: 2019-05-22
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execu...
CVE-2019-7835
PUBLISHED: 2019-05-22
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary co...