High rolling cyber-crooks are smashing bank security safeguards

A new, sophisticated breed of cyber-crooks targeting bank accounts belonging to businesses and high-net worth individuals around the world may have stolen EUR60 million over the last year, according to an investigation from McAfee and Guardian Analytics.

  0 3 comments

High rolling cyber-crooks are smashing bank security safeguards

Editorial

This content has been selected, created and edited by the Finextra editorial team based upon its relevance and interest to our community.

The pair say that they have observed a crime ring building on the established Zeus and SpyEye malware to develop attacks against at least 60 financial institutions in Europe, the US and Latin America.

Most Zeus/SpyEye attacks rely on manual components and active participation by the fraudster, using social engineering to compromise computers before planting malware and executing a Man-in-the-Browser attack to skim details that let them carry out transfers.

In contrast, although there can be live intervention in the most high-value transactions, most of the new 'High Roller' process is completely automated, allowing repeated thefts once the system has been launched at a given financial institution or for a given Internet banking platform.

In March crooks used server-side automated attacks to compromise more than 5000 - mainly business - accounts at two Dutch banks, attempting to wire around EUR35.6 million out of the country in transfers of up to EUE100,000 a time.

All of the attacks spotted by McAfee could bypass complex multi-stage authentication and chip and PIN. Unlike recent attacks that collect simple form authentication data - a security challenge question, a one-time token, or PIN - this can get past the extensive physical authentication required by swiping a card in a reader and typing the input into a field.

Separately, Jonathan Evans, director general of the UK's domestic security service, MI5, has claimed in a speech that state-sponsored cyber-attacks cost a single listed UK company around £800 million in lost potential revenues.

Evans says that his organisation is fighting "astonishing" levels of cyber attacks on UK industry, warning that the Olympic Games will prove an "attractive target" for terrorists".

Read the McAfee-Guardian Analytics report here:

Download the document now 1.1 mb (PDF File)
Sponsored [On-Demand Webinar] Global Workforce Payments: Mastering a world of complexity

Comments: (3)

A Finextra member 

It was not the "chip and PIN" that the attackers managed to bypass, it was a particular security protocol (badly designed and implemented).

 

A Finextra member 

If there is a secure chip card reader/pin pad similar to the ones uesd in merchant outlets for card payments, integrated to the workstation,  it should not be possible for "malware" to compromize the transaction. These wrongful and sensational news spur the authorities to regulate on "maximal security" measures for internet payments like the  European Central Bank proposed Recommendation on Security for Internet Payments does. There should be more fact based and analytical reporting explaining why fraud could happen and not simple bulletins in order to sell more anti fraud systems.  

Ketharaman Swaminathan

Ketharaman Swaminathan Founder and CEO at GTM360 Marketing Solutions

@Jan-OlofB+1.

Not saying that businesses should reconcile themselves to fraud but, as the famous saying goes, "No risk, no gain". End of the day, the Cost of Anti-Fraud Systems + Revenue Loss due to False Positives + Revenue Loss due to Friction-Caused Abandonment shouldn't exceed the Amount of Fraud Prevented.

[New Report] Managing Fraud Risks with Synthetic Data: A Practical Approach for Businesses ServicesFinextra Promoted[New Report] Managing Fraud Risks with Synthetic Data: A Practical Approach for Businesses Services Industry