Story image

Australia key target as banking botnet cybercrims seek new sectors

23 Feb 2016

Australia was the third most targeted nation in the world for banking botnets, according to a new report, which warns that the top banking botnet organisations are expanding their remit beyond the banking sector.

The Dell SecureWorks Counter Threat Unit research says the top bank botnets have expanded their target list to not only include the standard targets of Australian financial institutions, online payment providers, social media sites and email providers but also cloud service providers, online tech stores, app stores and organisations in the shipping, warehousing, e-commerce and marketing industries.

The CTU says researchers observed an increase in persistent attacks targeting specific organisations to compromise financial accounts, illustrating use of a delivery method that was previously used onl in advanced persistent threat attacks.

Australia was one of the locations where the CTU saw shipping companies being targeted.

The CTU says it doesn’t know why warehouse and shipping company credentials were targeted.

“However, having this type of access certainly provides criminal operators with the potential to steal these companies’ banking credentials, so as to make fraudulent financial transactions.

“But one also wonders if the botnet operators were seeking access to these type services so as to store and ship high-price items, which had been purchased with stolen ATM/debit/credit card and online payment accounts, or were these criminals potentially interested in trying to reroute high value cargo so they may take possession of them?”

The Banking Botnets: The Battle Continues report says cybercriminals are learning from past experience and quickly adapting when banks and other financial institutions improve their security measures.

“Threats are becoming more sophisticated, incorporating emerging technologies, advanced cryptography and resilient infrastructure to resist surveillance and disruption.

“Modifications to banking trojans support stealing bank credentials and website cookies to impersonate victims, searching hard disks for specific files, granting threat actors remote access to a compauter and allowing threat actors to exfiltrate stolen information or download additoinal malware,” the report says.

Dell SecureWorks says the most popular trojans used to target Australian businesses were the Citadel (35%) and IceIX (24%).

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.