Hackers Target SWIFT Users Using Bangladesh Heist Methods
A new group of hackers are trying to rob banks by exploiting the SWIFT money transfer system, using the same plan and techniques that led to the $81 million Bangladesh Bank heist in February, as reported by researchers at the security firm Symantec.
The Hackers' Main Method
Apparently, the tools they're using is related to the Odinaff Group, which has targeted financial companies in the .U.S, Hong Kong, Australia and many other countries. Symantec explained that about 100 financial institutions have been hit so far by this second hacking group since January, based on the 74 individual computer infections detected.
The hackers main method consists of using malware to watch SWIFT messages sent to infected computers to obtain bank account numbers. The most incredible part of the attack is that when a message that contains a targeted text string is intercepted, the hacker drives it out of the local file system with some kind of suppressor component, preventing their victims from learning about the money theft, as reported by IBT.
The Carbanak Group
Although it was believed that these actions could have been done by the Lazarus group (the North Korean affiliated group being blamed for the Bangladesh heist and the Sony Pictures hack), security experts think that the real actors are a cybercriminal group known as Carbanak, which allegedly have stolen more than $1 billion from some nations, according to Computer World.
Although it has been unknown how they do their tracking, Symantec explained that to perform this operation effectively, the hackers must be using a range of lightweight hacking tools and legitimate software, in addition to a back door Trojan called Odinaff.
"This is a shift from previous attacks that have been more focused on stealing from banking customers. After the success of the first SWIFT hack, it's unsurprising to see the headlines doing the rounds again and I'd be shocked if this is the last we see of it, " , chief cybersecurity strategist at Venafi Kevin Bocek told IBT.
Google Might Revoke Trust In Symantec SSL/TLS Certificates
Google’s decision to “distrust” Symantec is viewed as a significant move, as the latter is responsible for around one third SSL certificates around the web.
Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing “undetectable assassinations” by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples’ cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
Bangladesh's New Child Marriage Law Predicted To Rise Health Risk In Children
Human Rights watchers predict a rise in child health risks as Bangladesh passes new Child Marriage Bill. The controversial law effectively sets marriageable age to zero, placing young girls at risk for rape and child labor.
9 Hackers Involved In $17M Banking Theft Plot Arrested By Russian Authorities
It´s well known that Russia has some of the most dangerous and skillful hackers in the world, which has been quite inconvenient for this nation, considering that cyber crimes have been committed.
Apple iPhone Apps Vulnerable To Hackers
It has been reported that more than 40 iPhone apps are vulnerable to attacks from hackers. These hackers can potentially infiltrate these apps and disrupt any transactions and could even copy the user's credentials.
MORE IN ITECHPOST
These Are 5 of the Most Wanted IT Jobs in 2020
These are the most wanted IT jobs in 2020, considering different factors such as: education, salary and job outlook.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Game Developers’ Different Roles in the Studio
Learn about the different professionals involved in developing video games. Becoming a game developer is one of the coolest jobs around and your 14-year-old self, perched on the edge of your bed as you play PlayStation, will thank you for making such an awesome career move.
Michael Wiener of Albuquerque New Mexico Shares Fun Facts About the History of USA License Plates
Motor vehicle license plates are physical, historical records of motor vehicle history and license plate collecting attracts fans of history, motor vehicles, and classic design. In this article, license plate expert Michael Wiener of Albuquerque New Mexico shares fun facts about license plates in the United States.