Endpoint Protection

 View Only

Financial malware more than twice as prevalent as ransomware 

Jun 01, 2017 08:59 AM

financial-threat-review-2017-cover-tn_0.jpg

Webinar: On June 28, Symantec will host a webinar where experts will discuss the most prevalent and significant financial threats of the past 12 months. Register now to attend.

 

With all the attention ransomware is getting lately it’s easy to overlook other threats, such as those that target the financial sector and its customers. However, these types of threats are a serious and costly problem for both businesses and consumers. While financial threats tend not to get as much news coverage as ransomware, maybe because they have a less visual impact, they are far more prevalent. With over 1.2 million annual detections, the financial threat space is 2.5 times bigger than that of ransomware. Take, for example, the financial Trojan Ramnit (W32.Ramnit) whose total number of detections for 2016 approximately equaled all ransomware detections combined.

Although we have seen a 36 percent decrease in global detection numbers for financial malware in 2016, this can be mainly attributed to earlier blocking in the attack chain and a switch to more focused attacks. But don’t be mistaken, financial threats are still profitable and therefore continue to be popular among cyber criminals. From financial Trojans that attack online banking, to attacks against ATMs, point of sale (POS) machines, and fraudulent interbank transactions, there are many different attack vectors utilized by criminals.

[click_to_tweet:1]

Triple trouble

Three malware families ruled the financial threat space in 2016: Ramnit, Bebloh (Trojan.Bebloh), and Zeus (Trojan.Zbot), who together were responsible for 86 percent of all global detection counts. However, with disruptions caused by arrests, takedowns, and regrouping, there has been some fluctuation over the course of the year. The most notable spike was in the second half of 2016 when Trojan.Bebloh and Trojan.Snifula both began heavily focusing on 20 banks in Japan. Both threats were spread through spam emails with double extension attachments masquerading as scanned documents—earlier variants used web exploit toolkits. It is unclear why the two threats both started targeting banks in Japan at the same time; however, they seem to share a common resource for dynamic web injects, allowing attackers to manipulate web traffic on the fly.

Symantec detections for the top four financial threats 2016.png
Figure 1. Symantec detections for the top five financial threats

Disruption

After the dismantling of the Avalanche malware-hosting network at the end of 2016, which was used by Bebloh, we saw a sharp drop in Bebloh activity. After the arrest of the alleged author behind Trojan.Snifula in January 2017, we saw a drop in detections of Snifula as well. Both of these events lead to a decrease in detection numbers: Bebloh dropped by 66 percent from December 2016 to March 2017, and Snifula numbers dropped by 83 percent in the same time frame. Now these threats appear to have almost vanished (Figure 2).

Globally, financial institutions in the U.S. were targeted the most by the samples analyzed by Symantec, followed by Poland and Japan. However, we have seen more threats hiding the configuration file from researchers, making it more difficult to generate statistics. For example, a BlackMoon (Infostealer.Boyapki.E) variant only stores the SHA1 hash of the URL, making it difficult to find out all monitored URLs. Another observed trend is the move to redirection attacks instead of local injects. This involves the whole page being redirected to a remote site, with the traffic replacement and defrauding happening on a remote server. We even noticed an increase in old-school DNS redirection attacks.

Detection numbers for Snifula and Bebloh in Q1 2017_0.png
Figure 2. Detection numbers for Snifula and Bebloh in Q1 2017

Special treatment

The attackers are also interested in learning more about their victims. The Dridex downloader (W32.Cridex), for example, now checks the installed software list for financial software packages. If anything interesting is found, like an offline payment tool, then the computer will be accessed manually through a remote access tool such as a hidden virtual network computing (VNC) server. The attacker will then study the compromised computer and learn what software is used and work out possible ways to carry out fraudulent transactions.

Other threats will wait until the end of the month, when many businesses make bulk transactions, and add their own fraudulent transaction or modify existing ones. This behavior is increasing as it clearly pays off. On average, 38 percent of the financial threats were detected in business locations over the course of 2016. Most of these infection attempts are not targeted and are due to widespread email campaigns. However, as noted earlier, some of the compromised computers may be flagged by the attackers as interesting and receive special manual treatment from them.

[click_to_tweet:2]

The attackers’ ultimate goal is to generate larger profits. This has led to more attacks against banks and financial institutions themselves instead of their retail customers. This trend peaked in 2016 with multiple widely discussed high-value heists against institutions connected to the SWIFT network, resulting in the loss of millions of dollars to cyber crime groups and nation-state supported attackers such as the Lazarus group.

As long as it remains profitable, we expect financial threats to continue being a problem for banking customers in the future, but attackers will also likely increase their focus on corporate finance departments. As IT protection measures improve, we expect attackers to increase their reliance on social engineering. Cyber criminals behind financial threats will also start focusing on other geographical locations, which may not be as well protected from financial threats as current targeted regions.

Protection

Adopting a multilayered approach to security minimizes the chance of infection. Symantec has a strategy that protects against malware, including financial threats, in three stages:

  • Prevent: Block the incursion or infection and prevent the damage from occurring
  • Contain: Limit the spread of an attack in the event of a successful infection
  • Respond: Have an incident response process, learn from the attack, and improve defenses

Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented. Email and infected websites are the most common infection vectors for malware. Adopting a robust defense against both these infection vectors will help reduce the risk of infection.

In addition, users should adhere to the following advice to reduce the risk of cyber attacks:

  • Exercise caution when conducting online banking sessions, in particular if the behavior or appearance of your bank’s website changes
  • Notify your financial institution of any strange behavior while using their services
  • Exercise caution when receiving unsolicited, unexpected, or suspicious emails
  • Keep security software and operating systems up to date
  • Enable advanced account security features, like 2FA and login notification, if available
  • Use strong passwords for all your accounts
  • Always log out of your session when done
  • Monitor bank statements regularly
  • Be wary of Microsoft Office attachments that prompt users to enable macros

Symantec and Norton products protect against the financial Trojans mentioned in this blog with their various detection engines, such as Advanced Machine Learning, file reputation, and behavior detection. In addition to proactive generic detections, we also have the following specific detections in place:

Further reading

To learn more about threats in the financial sector, read our white paper: Financial Threats Review 2017—An ISTR Special Report

financial-threat-review-2017-cover-tn.jpg

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Related Entries and Links

No Related Resource entered.