Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/13/2016
12:05 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

SWIFT Confirms Cyber Heist At Second Bank; Researchers Tie Malware Code to Sony Hack

Operator of global secure messaging system for banks warns of "highly adaptive campaign"

Concerns that the massive $81 million cyber heist at the Bangladesh Bank recently was just a precursor of things to come in the banking industry appeared to be confirmed Friday with news that another bank has been similarly compromised.

Meanwhile, in a related development, security researchers at BAE Systems digging into the Bangladesh Bank breach released a report Friday claiming they had found evidence linking the heist to the devastating intrusion at Sony Pictures in 2014.

SWIFT, the Society for Worldwide Interbank Financial Telecommunication, the organization that runs the core financial messaging system used by more than 11,000 financial institutions globally, Friday confirmed a second instance in which attackers had managed to illegally transfer funds from a member bank by using the SWIFT system.

As with the Bangladesh Bank theft, the second incident was the result of the attackers managing to exploit vulnerabilities in the banks’ funds transfer initiation process -- and not because of a security vulnerability in the SWIFT system itself, the banking organization said in a statement.

Security researchers believe the Bangladesh heist happened because the attackers were able to obtain valid credentials used by bank officials to log into the SWIFT system, and used that access to transfer funds. They then used malware to manipulate payment confirmations from the SWIFT system in an attempt to hide the transfers.

In the second instance too, the attackers were able to bypass security controls the bank had in place for initiating funds transfers over SWIFT. They also used malware to manipulate a PDF reader used by the bank to read payment confirmations in such a manner as to hide evidence of their illegal funds transfers, SWIFT said.

“Forensic experts believe this new discovery evidences that the malware used in the earlier reported customer incident was not a single occurrence, but part of a wider and highly adaptive campaign targeting banks,” the organization warned.  The attacks suggest a “deep and sophisticated knowledge” of the operational controls in the targeted banks that may have been obtained from a malicious insider, theft or a combination of both, SWIFT said. As is its customary practice, SWIFT did not identify the second victim.

But BAE said its research showed a commercial bank in Vietnam had been targeted in a manner similar to Bangladesh Bank. While the malware used in the second attack was tailored for use against that specific Vietnam bank, the code-base was the same as the one used in the Bangladesh Bank incident.

The authors of the malware also used a unique and distinctive file erase function in both attacks for wiping files from disk.

BAE’s investigation of the code used in the function showed that it had also been previously used in the malware toolkit associated with the attacks on Sony, BAE said. The BAE report does not mention Sony by name but instead refers to it as a major entertainment company that suffered a breach in late 2014.

In addition to the file-delete functionality, there are other similarities in the malware code used in the Sony attacks and the recent bank attacks to suggest a link, BAE said. For instance, both code samples include the same typos and spelling errors.

The exclusive use of Visual C++ 6.0, a development environment dating back to 1998, in the Sony and bank code samples is another clue. “The use of such infrastructure for development is not unheard of, but it does leave a distinctive tool-mark with which to link the malware samples,” BAE said in its report.

Researchers from other security firms have previously traced the Sony attacks back to a group of North Korean threat actors believed responsible for a series of earlier attacks on government, military and commercial targets in the US, South Korea, Japan, China and Taiwan. The US government itself has formally accused North Korea of being behind the attacks on Sony.

BAE’s research suggesting a link between the Sony attack and the bank attacks raises fresh questions over attribution. If BAE is right, then it must mean either that North Korean threat actors are behind the bank attacks, or that previous assumptions about North Korea’s role in the Sony attacks were premature. Another possibility is that the same attack kit and malware used in the Sony attack is now being used by another group of threat actors.

Related Stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20637
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connecti...
CVE-2020-11650
PUBLISHED: 2020-04-08
An issue was discovered in iXsystems FreeNAS 11.2 and 11.3 before 11.3-U1. It allows a denial of service.
CVE-2020-11653
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
CVE-2020-2732
PUBLISHED: 2020-04-08
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
CVE-2020-1627
PUBLISHED: 2020-04-08
A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending ...