Just in:
UN Acknowledges Uneven Progress on Energy Goals During Sustainability Week // Evolution and current state of global crypto adoption – Octa // Tech Giant Discharges Workers Following Disruptive Protest // Global Energy Leaders Chart Course for Sustainable Future at IRENA Assembly // Emirates Offer Support as Wildfires Ravage Greece // NEOM welcomes leading industry figures and investors to Hong Kong showcase as part of its ‘Discover NEOM’ China tour // UAE Delegation Engages in Arab Parliament Committee Discussions // A Bridge Between Deserts and Rainforests: UAE and Costa Rica Forge Economic Ties // Petrochemical Storm Clouds Gather Over Saudi Arabia // Boeing Eyes 2030 Launch for Electric Flying Cars // Keung To Trams Return! “KeungShow HKFanClub” Sponsor Free Tram Rides for All on 30 April to Celebrate Keung To’s 25th Birthday // Abu Dhabi Launches ‘Medeem’ Initiative to Promote Emirati Values in Marriage // DFA Hong Kong Young Design Talent Award 2024 // Andertoons by Mark Anderson for Fri, 19 Apr 2024 // AI Race Heats Up: Meta Unveils Powerful New Llama // Gen Zs Trust User and Expert Insights on Shopee // Saadiyat Grove Set for Smart Transformation Through Aldar-Siemens Alliance // VinFast expands access to comprehensive aftersales network in France and Germany through agreement with Mobivia // Hong Kong’s R&D Receives International Recognition HKPC’s “InspecSpider” Wins Prestigious “Edison Award” in Innovation Field // Takeoff After Turbulence: Flydubai Restarts Operations at Dubai International Airport //

Hackers responsible for $80m bank heist show 'no signs of stopping'

1491248191 screen shot 2017 04 03 at 2 23 46 pm

screen-shot-2017-04-03-at-2-23-46-pm.png

ZDNet

ST. MAARTEN: The cybercriminals allegedly responsible for an attack on Bangladesh’s central bank which left the country’s wallet millions of dollars lighter is showing “no signs of stopping,” according to security experts.

The group, dubbed Lazarus, managed to dupe banking staff into transferring $80 million from the Central Bank of Bangladesh’s New York Federal Reserve account after spending several months studying how the financial institutions communicated and conducted transfers.

ADVERTISEMENT

In February 2016, cyberattacker made over three dozen large and rapid money requests from the account by using stolen SWIFT credentials, a financial messaging system used by banks worldwide for transactions.

The group, unidentified at the time, attempted to steal a total of $851 million and were able to make off with $80 million, sent to agents in the Philippines and Sri Lanka, before a simple typographical error was spotted by an employee that raised the red flag needed to prevent additional transfers going through.

The Bangladesh bank heist is considered one of the “largest, most successful cyber heists ever,” according to Kaspersky, and on Monday at the Kaspersky Security Analyst Summit in St. Maarten, researchers Vitaly Kamluk and Aleks Gostev from the cybersecurity firm said Lazarus is the subject of an investigation which has continued for over a year in relation to the theft.

Investigations conducted by the cybersecurity firm and BAE Systems suggest there is a high chance the attacks were conducted by Lazarus, known for debilitating attacks on entities including manufacturing companies, media, and financial institutions in at least 15 countries worldwide since 2009.

Bitcoin-related websites have also been compromised by the group recently, which suggests the group may be interested in the theft of virtual currency for laundering purposes.

ADVERTISEMENT

Evidence including similar malware being used in related cases and wipers pointed the cybersecurity experts in the direction of Lazarus, and it is believed at least several individuals were involved in the heist.

Kaspersky says that a sub-group, dubbed Bluenoroff, are also potentially involved in modern cyberattacks against financial institutions. The group does not have its own command-and-control (C&C) systems, but act more like “engineers,” according to Gostev, as they are not interested in false flag operations or concealing their tracks — unlike Lazarus — but do make use of the same toolkit.

There were also distant connections present by following infection chains back through servers, some of which are believed to be controlled by the Lazarus group.

Kaspersky says that following the successful $80 million theft, the group laid low for several months. However, Lazarus was not sitting on its laurels; instead, the group was preparing for a fresh operation to steal money from other banks.

Lazarus had set its sights on financial entities in Southeast Asia, and then Europe, but were caught in both attempts.

Lazarus first breaches a single system inside a bank by way of vulnerable web servers or through watering hole attacks. Once a bank employee has been lured to websites baited with malicious code, the trap springs, and the malware, when executed, brings in additional tools to compromise the financial institution’s systems.

The threat actor’s toolkit allows Lazarus to migrate to other bank hosts and to deploy persistent backdoors, allowing them to spy on bank activities for months on end, learning the network and giving them the opportunity to identify the most valuable resources hosted financial systems.

“One such resource may be a backup server, where authentication information is stored, a mail server or the whole domain controller with keys to every “door” in the company, as well as servers storing or processing records of financial transactions,” the researchers say.

Once these resources have been identified, Lazarus then deploys what Kaspersky calls “special malware” which is able to bypass the internal security features of financial software and issue rogue transactions on behalf of legitimate parties.

The recent spate of Lazarus attacks in Southeast Asia and Europe were investigated for a number of weeks, but the researchers admit this could have been going under the radar for months.

Since December 2015, malware samples connected to Lazarus have appeared in financial institutions, banks, casinos, and systems used by software developers for investment companies in countries including Korea, India, Bangladesh, Thailand, Vietnam, and Costa Rica.

As the last known sample was found in March 2017, the research team believes Lazarus has “no intention of stopping” anytime soon, and rather than stop after failed attempts, Gostev said that cyberattackers would simply “evolve” and refine their approaches.

The Kaspersky team were able to continue tracking Lazarus for months, but now the threat actors have gone quiet — at least, for now.

“We’re sure they’ll come back soon,” said Kamluk. “In all, attacks like the ones conducted by Lazarus group show that a minor misconfiguration may result in a major security breach, which can potentially cost a targeted business hundreds of millions of dollars in loss.”

“We hope that chief executives from banks, casinos and investment companies around the world will become wary of the name Lazarus,” the researcher added.

Disclosure: The trip to St. Maarten was sponsored by Kaspersky.

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Sharjah Charity International Extends Helping Hand to Flood Victims // The International Exhibition of Inventions in Geneva Reveals More than 40 Scientific and Technological Innovation Achievements from Hong Kong // Saadiyat Grove Set for Smart Transformation Through Aldar-Siemens Alliance // Evolution and current state of global crypto adoption – Octa // Abu Dhabi Launches ‘Medeem’ Initiative to Promote Emirati Values in Marriage // AI Race Heats Up: Meta Unveils Powerful New Llama // DFA Hong Kong Young Design Talent Award 2024 // Takeoff After Turbulence: Flydubai Restarts Operations at Dubai International Airport // Hong Kong’s R&D Receives International Recognition HKPC’s “InspecSpider” Wins Prestigious “Edison Award” in Innovation Field // Navigating Business Setup in Dubai: A Comprehensive Guide by Czar Bizserv // UN Acknowledges Uneven Progress on Energy Goals During Sustainability Week // NEOM welcomes leading industry figures and investors to Hong Kong showcase as part of its ‘Discover NEOM’ China tour // VinFast expands access to comprehensive aftersales network in France and Germany through agreement with Mobivia // Emirates Offer Support as Wildfires Ravage Greece // UAE Delegation Engages in Arab Parliament Committee Discussions // Gen Zs Trust User and Expert Insights on Shopee // Petrochemical Storm Clouds Gather Over Saudi Arabia // Congress Is Set To Perform Well In Lok Sabha Polls In Karnataka // Global Energy Leaders Chart Course for Sustainable Future at IRENA Assembly // Galaxy Macau Unveils the New Galaxy Kidz: An Edutainment Center for Play Time //