773-516-5658 | Se Habla Español

LOGO_COLOR_EXT_SMLLOGO_COLOR_EXT_SMLLOGO_COLOR_EXT_SMLLOGO_COLOR_EXT_SML
  • Home
  • SERVICES
    • In-store Services
      • Mobile Device Repair
      • Screen Repair
    • In-store Support
    • Remote Support
      • Why Remote Support?
    • Small Business Support
  • MEMBERS
    • Become a Member
    • Member Access
    • Pay Online
    • RESET USER PASSWORD
  • STORES
  • TECH BLOG
  • ABOUT US
    • FAQS
    • Videos & Testimonials
    • Partners and Certifications
  • CONTACT US

Cyber threats and the finance sector

February 29, 2016

2015Feb29_Security_AThe financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and procedures (TTP’s) that security professionals should know about.

Extortion

The cyber criminal Armada Collective gained notoriety for being the first to utilize distributed denial-of-service (DDoS) attacks. This occurs when multiple systems flood a targeted system to temporarily or completely disrupt service. They evolved the idea further and started to extort Bitcoins from victims who were initially notified of their vulnerability. If they didn’t comply with the ransom demands of the criminals, they would flood their systems until the victim’s network would shut down completely.

Social media attacks

This involved criminals using fake profiles to gather information for social engineering purposes. Fortunately, both Facebook and Twitter began to proactively monitoring for suspicious activity and started notifying users if they had been targeted by the end of 2015. However, you should still have your guard up when someone you don’t know, or even a friend or colleague, starts asking you suspicious questions.

Spear phishing

Phishers thrive off familiarity. They send out emails that seem to come from a business or someone that you know asking for credit card/bank account numbers. In 2015, phishers went to the next level and began whaling. This normally involved spoofing executives’ emails (often CEO’s) to dupe the finance departments to transfer large sums of money to fraudulent accounts.

Point-of-sale malware

POS malware is written to steal customer payment (especially credit card) data from retail checkout systems. They are a type of memory scraper that operates by instantly detecting unencrypted type 2 credit card data and is then sent to the attacker’s computer to be sold on underground sites.

ATM malware

GreenDispenser is an ATM-specific malware that infects ATM’s and allows criminals to extract large sums of money while avoiding detection. Recently reverse ATM attacks have also emerged, this is when compromised POS terminals and money mules to reverse transactions after money being withdrawn or sent to another bank account.

Credential theft

Dridex, a well known credential-stealing software, is a multifunctional malware package that leverages obfuscated macros in Microsoft Office and extensible markup language files to infect systems. The goal is to infect computers, steal credentials, and obtain money from victims’ bank accounts. It operates primarily as a banking Trojan where it is generally distributed through phishing email messages.

Other sophisticated threats

Various TTP’s can be combined to extracted data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATM’s of cash.

The creation of defensive measures requires extensive knowledge of the lurking threats and our team of experts is up-to-date on the latest security information. If you have any questions, feel free to contact us to find out more about TTP’s and other weapons in the hacker’s toolbox.

Published with permission from TechAdvisory.org. Source.

Related posts

November 23, 2019

What you need to know about Android malware


Read more
November 20, 2019

Simple tips to prevent Mac ransomware


Read more
November 7, 2019

Fix these enterprise security flaws now


Read more

Recent Posts

  • What you need to know about Android malware
  • Simple tips to prevent Mac ransomware
  • Save on electricity with these PC tips
  • The benefits of Google Tasks
  • Ways Office 365 migrations fail

Archives

  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015

Categories

  • Android
  • Android Phone
  • Android Tablet
  • Apple
  • Apple Mac OS
  • Business
  • Business Continuity
  • Business Value
  • Cloud-Google Apps
  • Cloud-Office 365
  • Google
  • Hardware
  • Healthcare
  • Internet Social Networking and Reputation Management
  • iPad
  • iPhone
  • Microsoft Office
  • Microsoft Windows News & Tips
  • Mobile
  • Mobile General
  • Motion
  • Office
  • Photography
  • Productivity
  • Security
  • Social Media
  • Uncategorized
  • Virtualization General
  • Web & Cloud
  • Windows
  • Windows Phone

South Holland Store

  • 516 E 162nd St
    South Holland, IL 60473
  • Phone: 708-333-2700

 

In-store hours

  • 11am – 6:30pm Mon – Sat

 

 

Remote Services

  • 9am – 6:30pm Mon-Fri
  • Phone: 773-516-5658

 

 

©2019 Chicago Computer Club All Rights Reserved.   Privacy Policy