Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Kaspersky – Carbanak was most active in June 2014

by The Gurus
February 16, 2015
in Editor's News
Share on FacebookShare on Twitter

Kaspersky Lab has said that the Carbanak attackers are targeting financial entities directly in an unprecedented, determined, highly professional and coordinated attack which is still ongoing.
 
Named Carbanak as it based on the Trojan Carberp and the name of the configuration file is “anak.cfg”, Kaspersky’s analysis says that according to what it has found, the first malicious samples were compiled in August 2013 when the controllers started to test the Carbanak malware.
 
It said that the first infections were detected in December 2013, and the gang were able to successfully steal from their first victims during the period between February-April 2014, while the peak of infections was recorded in June 2014. It believed that the campaign is still active, while Dutch security investigations firm Fox-IT said in its update that “since early December, the group has decreased their activities and might now have even stopped entirely”.
 
Fox-IT said: “We don’t have evidence that the group is currently very active, but they might start at any time they want. Another option is that they have started again and we simply have not received any reports and evidence of their new activity.”
 
Kaspersky Lab said that detection of Carbanak began upon investigating the hard disk of the ATM system, and later when the CSO of a Russian bank said that data was being sent from their Domain Controller to the People’s Republic of China.
 
“When we arrived on site, we were quickly able to find the malware on the system,” it said. “We wrote a batch script that removed the malware from an infected PC, and ran this script on all the computers at the bank. This was done multiple times until we were sure that all the machines were clean.”
 
Martin Lee, cyber crime manager at Alert Logic, said: “Forensic examinations take a long time to conduct. Once discovered it is quick and easy to announce that malware has been found, however it takes many weeks and months of forensic examination to identify exactly what which systems were affected, what was stolen and how far did the attack spread. I think what we are seeing here is the results of the in depth investigation being released.”
 
Asked why he felt that a group which ceased activity three months ago was receiving attention now, TK Keanini, CTO of Lancope, said that there could be several reasons: that these are advanced threat actors and while it may seem like they are laying low, he was certain that they are working on new techniques as their old tools and techniques have been discovered.
 
“Also, so many other events were happening that this particular attack and criminal group was just caught up in the noise,” he said. “There are many variants of crimeware or banking malware and these threat actors are just one of the groups. These numbers are growing, not shrinking.
 
“Also attribution takes time and is ultimately very hard to do with in the digital domain. These groups were also employing physical processes in their acts and if this were all digital, the attribution would have been incredibly difficult.”
 
Looking at the pattern of stealing $1BN in two years from 30 countries, Keanini said that it is safe to say that there are banks in other countries that maybe were even more vulnerable at this point in time, but the overall pattern is that while IT systems are similar in operation, their defences and detection systems vary greatly and it is here that the attacker sets out their tactics and strategies.
 
“The pattern is so common in the fact that the techniques used by these attackers were predictable and sequential, and yet these victims were all unable to detect these operations,” he said.
 
“The attacker must be thinking ‘we have something that works, let’s just keep using it globally’, and so they did. Anywhere where there is an IT system used for business, this attack strategy would work and so many systems are still vulnerable to this type of attack.”

FacebookTweetLinkedIn
Tags: APTattackBank
ShareTweet
Previous Post

What is good ‘cyber hygiene’ and how do you achieve it?

Next Post

$15 million – enough for the job of securing Sony?

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information