Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Attacks on Consumers Intensify

Attackers are no longer waiting to steal data coming out of your computer - they're going in and taking it

A recent rash of computer crimes suggests that attackers are becoming more aggressive in their consumer attacks.

The U.S. Securities and Exchange Commission reports a surge in the number of complaints it is receiving about account break-ins by hackers in the last few months. "We've had more investigations in this area than we've ever had before," said John Stark, chief of the SEC's office of internal enforcement, in comments to reporters earlier today.

Stark's comments come on the heels of a report by the U.K.'s Metropolitan Police Computer Crime Unit that it had recovered credit card information and passwords stolen from 2,300 users in backdoor attacks by a U.S. attacker. "Identity theft by computer viruses is on the increase," said a spokesman from the unit.

The financial account attacks and the backdoor attacks both represent a new, more intrusive sort of exploit by identity thieves. Instead of phishing and waiting to steal select bits of information that might be useful in a crime, these new attacks allow perpetrators to go directly into the user's computer to find sensitive data or clean out the user's financial accounts.

In the case of online brokerage accounts, attackers are using spyware and keyloggers to steal account data, just as most phishers do. But instead of just taking the data, they actually enter the customer's account and sell all of the securities, funneling the proceeds to intermediary accounts where the money can be laundered, according to SEC officials.

In other cases, the perpetrators use the online accounts to "pump up" a certain stock. They buy up stock from a group of smaller companies, then sell all the stock in the account and use the proceeds to buy more stock from those same companies, in an effort to send share prices higher.

"When the price gets high enough, [the perpetrators] take profits out of a separate, unaffiliated account," said John Walsh, associate director and chief counsel at the SEC's Office of Compliance Inspections and Examinations in a speech earlier this month. "This is a clever fraud, because it avoids all of the back-end controls" brokerages have in place to prevent fraud.

Like brokerage account theft, the back door attacks uncovered in the U.K. last week suggested a more intrusive type of thief. Instead of waiting to steal personal information in transit over the Internet, the perpetrator introduced a virus that made it possible to search the victims' machines.

U.K. police said they found personal information belonging to some 83,000 British consumers on a single PC found in the U.S. Investigators do not know how far-reaching the attack was, but they said the data would have been enough to allow an attacker to clean out a customer's bank account.

Experts and researchers agree that end users are becoming more frequent targets for attackers because their systems are generally the easiest to penetrate. A BBC study published last week indicates that the average home PC in the U.K. is attacked around 50 times per night. Other studies suggest that consumers are among the most attractive and least-educated targets on hackers' lists. (See Hackers Target Consumers.)

SEC and U.K. law enforcement agencies offered few new tips on defending against these more intrusive attacks. Users should update their antivirus applications, deploy firewalls, and keep an eye on their accounts for suspicious activity, they said.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1990
PUBLISHED: 2020-04-08
A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions be...
CVE-2020-1991
PUBLISHED: 2020-04-08
An insecure temporary file vulnerability in Palo Alto Networks Traps allows a local authenticated Windows user to escalate privileges or overwrite system files. This issue affects Palo Alto Networks Traps 5.0 versions before 5.0.8; 6.1 versions before 6.1.4 on Windows. This issue does not affect Cor...
CVE-2020-1992
PUBLISHED: 2020-04-08
A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 9...
CVE-2020-10978
PUBLISHED: 2020-04-08
GitLab EE/CE 8.11 to 12.9 is leaking information on Issues opened in a public project and then moved to a private project through Web-UI and GraphQL API.
CVE-2020-10979
PUBLISHED: 2020-04-08
GitLab EE/CE 11.10 to 12.9 is leaking information on restricted CI pipelines metrics to unauthorized users.