Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/8/2018
05:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Symantec Uncovers North Korean Group's ATM Attack Malware

Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs.

Researchers from Symantec have uncovered the malware tool North Korea's infamous Lazarus Group has been using since 2016 to empty millions of dollars in cash from ATMs belonging to mostly small and midsize banks in Asia and Africa.

In a report this week, the security vendor described the malware as designed to intercept and approve fraudulent ATM cash withdrawal requests before they reach a bank's underlying switch application server that processes them.

The malware is an executable file that can be injected into a running and legitimate process on application servers running IBM's AIX operating system. All of the switch application servers that the Lazarus Group has managed to compromise with the malware so far were running unsupported versions of AIX, Symantec said.

"The takeaway is not only one for banks but any organization that runs a production environment with legacy, outdated, or unsupported equipment and software," says Jon DiMaggio, senior threat intelligence analyst at Symantec.

The financial loss and public embarrassment accompanying such attacks far outweigh the cost of bringing obsolete infrastructure up to speed. "At a minimum, financial institutions should use current and supported systems and software in order to minimize the risk of exposure of both monetary losses as well as sensitive customer data, such as PII," DiMaggio says.

The US government has dubbed the Lazarus Group's ATM attacks as the FastCash campaign. In an Oct. 2 technical advisory, the FBI, Department of Homeland Security, and US Treasury Department described the attacks as costing banks tens of millions of dollars. The advisory noted two incidents, one in 2017 and another in 2018, where Lazarus Group actors enabled simultaneous cash withdrawals from ATMs spread across two dozen countries.

In each of Lazarus Group's multiple attacks, the threat actor configured and deployed legitimate scripts on the application servers to intercept and reply to fraudulent ATM withdrawal requests, the advisory said.

But Symantec's investigation has shown that the executable enabling the fraudulent activity is, in fact, malware, the security vendor said in its report this week. Symantec has named the malware Trojan.Fastcash and described it as having two functions.

One of them is to monitor for and read the Primary Account Number (PAN) in all incoming traffic from ATMs. The malware is designed to block all traffic containing PANs previously identified as belonging to the attackers. It then generates a fake response approving the fraudulent request, ensuring all attempts to withdraw money are successful. The US government's technical alert had previously noted that most of the accounts against which the fraudulent transactions were initiated had minimal or zero balances.

"The malware responds with formatted messages as documented in ISO 8583," DiMaggio says. ISO 8583 is a messaging standard that is used by banks for financial transactions. "This is how the attacker could get around the messaging system and essentially trick the ATM into believing it was receiving response from the banks legitimate internal systems."

The responses the malware is programmed to generate include an "Invalid PIN" message and one for insufficient funds, DiMaggio notes.

Symantec said it has discovered multiple versions of the FastCash Trojan so far, each equipped with different response logic. The vendor says it has been unable to determine why the attacks have programmed the different responses to withdrawal requests into the malware.

In all instances where the Lazarus Group successfully deployed the malware, the application servers were running versions of AIX well past their support dates.

The attacker targeted smaller banks with fewer resources in places like Asia and Africa because they likely were aware that larger, better-funded organizations would have better security, DiMaggio said. "The vulnerable version of AIX was simply what was in the environment the attacker targeted. It was not the driving piece of the attack as much as a characteristic of the specific environment the attacker had access to," he notes.

For the moment, there is little indication as to how exactly Lazarus Group actors might have gained access to the switch application servers in the first place. But it is quite likely that they employed spear-phishing emails to illicitly obtain credentials belonging to bank employees, which they then used to access the network.

Once they had gain an initial foothold, the attackers would have enumerated the network for high-value systems and gain access to them. "By taking the time to learn the environment and use legitimate credentials, the attacker was able to execute this attack from the inside out, meaning the banks firewalls would not play a factor in this attack," DiMaggio says.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17660
PUBLISHED: 2019-10-16
A cross-site scripting (XSS) vulnerability in admin/translate/translateheader_view.php in LimeSurvey 3.19.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the tolang parameter, as demonstrated by the index.php/admin/translate/sa/index/surveyid/336819/lang/ PATH_INFO.
CVE-2019-11281
PUBLISHED: 2019-10-16
Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input...
CVE-2019-16521
PUBLISHED: 2019-10-16
The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payl...
CVE-2019-16522
PUBLISHED: 2019-10-16
The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. A...
CVE-2019-16523
PUBLISHED: 2019-10-16
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.