Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/13/2016
12:05 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

SWIFT Confirms Cyber Heist At Second Bank; Researchers Tie Malware Code to Sony Hack

Operator of global secure messaging system for banks warns of "highly adaptive campaign"

Concerns that the massive $81 million cyber heist at the Bangladesh Bank recently was just a precursor of things to come in the banking industry appeared to be confirmed Friday with news that another bank has been similarly compromised.

Meanwhile, in a related development, security researchers at BAE Systems digging into the Bangladesh Bank breach released a report Friday claiming they had found evidence linking the heist to the devastating intrusion at Sony Pictures in 2014.

SWIFT, the Society for Worldwide Interbank Financial Telecommunication, the organization that runs the core financial messaging system used by more than 11,000 financial institutions globally, Friday confirmed a second instance in which attackers had managed to illegally transfer funds from a member bank by using the SWIFT system.

As with the Bangladesh Bank theft, the second incident was the result of the attackers managing to exploit vulnerabilities in the banks’ funds transfer initiation process -- and not because of a security vulnerability in the SWIFT system itself, the banking organization said in a statement.

Security researchers believe the Bangladesh heist happened because the attackers were able to obtain valid credentials used by bank officials to log into the SWIFT system, and used that access to transfer funds. They then used malware to manipulate payment confirmations from the SWIFT system in an attempt to hide the transfers.

In the second instance too, the attackers were able to bypass security controls the bank had in place for initiating funds transfers over SWIFT. They also used malware to manipulate a PDF reader used by the bank to read payment confirmations in such a manner as to hide evidence of their illegal funds transfers, SWIFT said.

“Forensic experts believe this new discovery evidences that the malware used in the earlier reported customer incident was not a single occurrence, but part of a wider and highly adaptive campaign targeting banks,” the organization warned.  The attacks suggest a “deep and sophisticated knowledge” of the operational controls in the targeted banks that may have been obtained from a malicious insider, theft or a combination of both, SWIFT said. As is its customary practice, SWIFT did not identify the second victim.

But BAE said its research showed a commercial bank in Vietnam had been targeted in a manner similar to Bangladesh Bank. While the malware used in the second attack was tailored for use against that specific Vietnam bank, the code-base was the same as the one used in the Bangladesh Bank incident.

The authors of the malware also used a unique and distinctive file erase function in both attacks for wiping files from disk.

BAE’s investigation of the code used in the function showed that it had also been previously used in the malware toolkit associated with the attacks on Sony, BAE said. The BAE report does not mention Sony by name but instead refers to it as a major entertainment company that suffered a breach in late 2014.

In addition to the file-delete functionality, there are other similarities in the malware code used in the Sony attacks and the recent bank attacks to suggest a link, BAE said. For instance, both code samples include the same typos and spelling errors.

The exclusive use of Visual C++ 6.0, a development environment dating back to 1998, in the Sony and bank code samples is another clue. “The use of such infrastructure for development is not unheard of, but it does leave a distinctive tool-mark with which to link the malware samples,” BAE said in its report.

Researchers from other security firms have previously traced the Sony attacks back to a group of North Korean threat actors believed responsible for a series of earlier attacks on government, military and commercial targets in the US, South Korea, Japan, China and Taiwan. The US government itself has formally accused North Korea of being behind the attacks on Sony.

BAE’s research suggesting a link between the Sony attack and the bank attacks raises fresh questions over attribution. If BAE is right, then it must mean either that North Korean threat actors are behind the bank attacks, or that previous assumptions about North Korea’s role in the Sony attacks were premature. Another possibility is that the same attack kit and malware used in the Sony attack is now being used by another group of threat actors.

Related Stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13643
PUBLISHED: 2019-07-18
Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the...
CVE-2019-13644
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.1 is vulnerable to stored XSS due to lack of filtration of user-supplied data in a budget name. The JavaScript code is contained in a transaction, and is executed on the tags/show/$tag_number$ tag summary page.
CVE-2019-13645
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing.
CVE-2019-13646
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to reflected XSS due to lack of filtration of user-supplied data in a search query.
CVE-2019-13647
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing.