Scoop has an Ethical Paywall
Work smarter with a Pro licence Learn More

Gordon Campbell | Parliament TV | Parliament Today | News Video | Crime | Employers | Housing | Immigration | Legal | Local Govt. | Maori | Welfare | Unions | Youth | Search

 

Financial malware more than twice as prevalent as ransomware

Symantec Security Response

Financial malware more than twice as prevalent as ransomware

Three Trojans dominated the financial threat landscape in 2016 and attackers increased their focus on corporate finance departments

With all the attention ransomware is getting it’s easy to overlook other threats, such as those that target the financial sector and its customers. However, these types of threats are a serious and costly problem for both businesses and consumers. Financial threats tend to get less news coverage than ransomware, but they are far more prevalent. With over 1.2 million annual detections, the financial threat space is 2.5 times bigger than that of ransomware. For example, the financial Trojan Ramnit’s (W32.Ramnit) total number of detections for 2016 approximately equalled all ransomware detections combined.

Although we have seen a 36 percent decrease in global detection numbers for financial malware in 2016, this is mainly attributed to earlier blocking in the attack chain and a switch to more focused attacks. But don’t be mistaken, financial threats are still profitable and continue to be popular among cyber criminals. From financial Trojans that attack online banking, to attacks against ATMs, point of sale (POS) machines, and fraudulent interbank transactions, there are many different attack vectors utilised by criminals.

Advertisement - scroll to continue reading

Are you getting our free newsletter?

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.

Triple trouble

Three malware families ruled the financial threat space in 2016; Ramnit, Bebloh (Trojan.Bebloh), and Zeus (Trojan.Zbot), who together were responsible for 86 percent of all global detection counts.

In the second half of 2016 Trojan.Bebloh and Trojan.Snifula both began focusing on 20 banks in Japan. Both threats were spread through spam emails with double extension attachments masquerading as scanned documents — earlier variants used web exploit toolkits. It is unclear why the two threats both started targeting banks in Japan at the same time; however, they seem to share a common resource for dynamic web injects, allowing attackers to manipulate web traffic on the fly.

Special treatment

The attackers are interested in learning more about their victims. The Dridex downloader (W32.Cridex), checks installed software lists for financial software packages. If anything is found, like an offline payment tool, the computer is accessed manually through a remote access tool such as a hidden virtual network computing (VNC) server. The attacker will then study the compromised computer and learn what software is used and work out ways to carry out fraudulent transactions.


© Scoop Media

Advertisement - scroll to continue reading
 
 
 
Parliament Headlines | Politics Headlines | Regional Headlines

 
 
 
 
 
 
 

LATEST HEADLINES

  • PARLIAMENT
  • POLITICS
  • REGIONAL
 
 

InfoPages News Channels


 
 
 
 

Join Our Free Newsletter

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.