18 April 2014
Your browser is unable to support Flash files.

High rolling cyber-crooks are smashing bank security safeguards

26 June 2012  |  6677 views  |  3 anonymous figure in front of stock exchange

A new, sophisticated breed of cyber-crooks targeting bank accounts belonging to businesses and high-net worth individuals around the world may have stolen EUR60 million over the last year, according to an investigation from McAfee and Guardian Analytics.

The pair say that they have observed a crime ring building on the established Zeus and SpyEye malware to develop attacks against at least 60 financial institutions in Europe, the US and Latin America.

Most Zeus/SpyEye attacks rely on manual components and active participation by the fraudster, using social engineering to compromise computers before planting malware and executing a Man-in-the-Browser attack to skim details that let them carry out transfers.

In contrast, although there can be live intervention in the most high-value transactions, most of the new 'High Roller' process is completely automated, allowing repeated thefts once the system has been launched at a given financial institution or for a given Internet banking platform.

In March crooks used server-side automated attacks to compromise more than 5000 - mainly business - accounts at two Dutch banks, attempting to wire around EUR35.6 million out of the country in transfers of up to EUE100,000 a time.

All of the attacks spotted by McAfee could bypass complex multi-stage authentication and chip and PIN. Unlike recent attacks that collect simple form authentication data - a security challenge question, a one-time token, or PIN - this can get past the extensive physical authentication required by swiping a card in a reader and typing the input into a field.

Separately, Jonathan Evans, director general of the UK's domestic security service, MI5, has claimed in a speech that state-sponsored cyber-attacks cost a single listed UK company around £800 million in lost potential revenues.

Evans says that his organisation is fighting "astonishing" levels of cyber attacks on UK industry, warning that the Olympic Games will prove an "attractive target" for terrorists".

Read the McAfee-Guardian Analytics report here:» Download the document now 1.1 mb (PDF File)

Comments: (3)

Alexander Peschkoff - TEDIPAY - London | 26 June, 2012, 11:29

It was not the "chip and PIN" that the attackers managed to bypass, it was a particular security protocol (badly designed and implemented).

 

Jan-Olof Brunila - Swedbank - Stockholm | 27 June, 2012, 07:33

If there is a secure chip card reader/pin pad similar to the ones uesd in merchant outlets for card payments, integrated to the workstation,  it should not be possible for "malware" to compromize the transaction. These wrongful and sensational news spur the authorities to regulate on "maximal security" measures for internet payments like the  European Central Bank proposed Recommendation on Security for Internet Payments does. There should be more fact based and analytical reporting explaining why fraud could happen and not simple bulletins in order to sell more anti fraud systems.  

Ketharaman Swaminathan - GTM360 Marketing Solutions - Pune | 28 June, 2012, 10:10

@Jan-OlofB+1.

Not saying that businesses should reconcile themselves to fraud but, as the famous saying goes, "No risk, no gain". End of the day, the Cost of Anti-Fraud Systems + Revenue Loss due to False Positives + Revenue Loss due to Friction-Caused Abandonment shouldn't exceed the Amount of Fraud Prevented.

Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Related blogs

Create a blog about this story (membership required)

Related stories

29 March, 2012
27 March, 2012
21 March, 2012
22 November, 2011

Related company news

 
Your browser is unable to support Flash files.

Featured job

Find your next job