Banking malware grows

1 November 2015 Information Security, Integrated Solutions

Rashmi Knowles, chief security architect, EMC RSA.
Rashmi Knowles, chief security architect, EMC RSA.

South Africa is well known for its concentration of financial resources and any region that transacts using the English language or deemed as affluent is always high on the target list for the adversaries. Banking malware targets user devices to steal financial information like credit card details and bank account passwords. The criminals then use this stolen information to transfer money from the compromised accounts.

The most common banking malware in South Africa is Zeus (Windows) and Carberp (Windows) which have long been popular malware for Windows computers and widely available public source code has enabled criminals to develop many variants of these. Zeus Gameover, the latest variant of Zeus has hit hard in many countries. However, Zeus Gameover was taken down by the FBI and Microsoft in June 2014.

The financial sector is one the most targeted of all vertical sectors – the prize is simple – lucrative financial gain. The recent Verizon DBIR 2015 Report cites financial services as the top five targeted verticals, which is down from previous years and other sectors such as healthcare have topped the list. The most common threats to this sector are crimeware, web application attacks, payment card skimmers and insider misuse.

Other verticals are targeted for valuable intellectual property or custodial data such as personal information. One of the big differences is that attacks to steal intellectual property tend to be nation-state sponsored as they are targeted, well-funded, well-resourced and persistent focusing on the defence sector, pharmaceuticals or any organisation that has high-value digital assets. Organised crime gangs tend to be the perpetrators of financial services attacks.

Banks typically invest heavily in Cyber Security tools and resources to keep the bank and their customers secure. Several major trends are disrupting how banks practice information security and protect their customers:

First, the adoption of cloud-based IT infrastructures and the pervasive use of mobile devices and mobile applications means that security departments are being asked to secure what they don’t own, manage, or control and your customers are expecting more ways for you to deliver your products and services. Banks are rapidly embracing various digital channels, especially mobile as a means to better attract and retain customers, improve the customer experience, and provide cross channel engagement using the unique features of modern devices.

We’re also in the midst of a transformation of how they conduct business. Leading financial organisations are seeking to take advantage of these technology advances – building new applications that are delivered through these new access models. They are interacting with a much more diverse supply chain, and employing a much more extended workforce and customer base. At the same time, these employee, supplier and customer relationships are increasingly more temporary – assembled as needed and frequently dissolved when no longer required. All of these changes place more strain on their ability to adequately secure the interactions between people and information.

For example, the mobile device acts as a vehicle for an effective, functional digital wallet, which is proving to be a disruptive technology in the payment services industry, enabling both new methods of instant funds transfer payments and direct payments between parties connected via a social media based relationship.

Finally, as the strategic value and complexity of the digital channel grows, so do the opportunities for cyber-crime and fraud. In response, the threat landscape and attacker tactics have fundamentally changed, resulting in adversaries that are more formidable than ever before, and who can’t be stopped effectively using today’s tools and methods.

For more information contact EMC South Africa, +27 (0)11 581 0033, sonelia.dupreez@emc.com, www.EMC.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...