Banking malware grows

1 November 2015 Information Security, Integrated Solutions

Rashmi Knowles, chief security architect, EMC RSA.
Rashmi Knowles, chief security architect, EMC RSA.

South Africa is well known for its concentration of financial resources and any region that transacts using the English language or deemed as affluent is always high on the target list for the adversaries. Banking malware targets user devices to steal financial information like credit card details and bank account passwords. The criminals then use this stolen information to transfer money from the compromised accounts.

The most common banking malware in South Africa is Zeus (Windows) and Carberp (Windows) which have long been popular malware for Windows computers and widely available public source code has enabled criminals to develop many variants of these. Zeus Gameover, the latest variant of Zeus has hit hard in many countries. However, Zeus Gameover was taken down by the FBI and Microsoft in June 2014.

The financial sector is one the most targeted of all vertical sectors – the prize is simple – lucrative financial gain. The recent Verizon DBIR 2015 Report cites financial services as the top five targeted verticals, which is down from previous years and other sectors such as healthcare have topped the list. The most common threats to this sector are crimeware, web application attacks, payment card skimmers and insider misuse.

Other verticals are targeted for valuable intellectual property or custodial data such as personal information. One of the big differences is that attacks to steal intellectual property tend to be nation-state sponsored as they are targeted, well-funded, well-resourced and persistent focusing on the defence sector, pharmaceuticals or any organisation that has high-value digital assets. Organised crime gangs tend to be the perpetrators of financial services attacks.

Banks typically invest heavily in Cyber Security tools and resources to keep the bank and their customers secure. Several major trends are disrupting how banks practice information security and protect their customers:

First, the adoption of cloud-based IT infrastructures and the pervasive use of mobile devices and mobile applications means that security departments are being asked to secure what they don’t own, manage, or control and your customers are expecting more ways for you to deliver your products and services. Banks are rapidly embracing various digital channels, especially mobile as a means to better attract and retain customers, improve the customer experience, and provide cross channel engagement using the unique features of modern devices.

We’re also in the midst of a transformation of how they conduct business. Leading financial organisations are seeking to take advantage of these technology advances – building new applications that are delivered through these new access models. They are interacting with a much more diverse supply chain, and employing a much more extended workforce and customer base. At the same time, these employee, supplier and customer relationships are increasingly more temporary – assembled as needed and frequently dissolved when no longer required. All of these changes place more strain on their ability to adequately secure the interactions between people and information.

For example, the mobile device acts as a vehicle for an effective, functional digital wallet, which is proving to be a disruptive technology in the payment services industry, enabling both new methods of instant funds transfer payments and direct payments between parties connected via a social media based relationship.

Finally, as the strategic value and complexity of the digital channel grows, so do the opportunities for cyber-crime and fraud. In response, the threat landscape and attacker tactics have fundamentally changed, resulting in adversaries that are more formidable than ever before, and who can’t be stopped effectively using today’s tools and methods.

For more information contact EMC South Africa, +27 (0)11 581 0033, [email protected], www.EMC.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...