A banking Malware has been detected which is termed as Carbanak APT

Cybercriminals have been involved in the financial sector for many years to carry out activities like infecting banking customer’s computers and either stealing passwords or manipulating online banking sessions to steal funds.

A recent report from Kaspersky Lab reveals that criminals have significantly raised their potential focused on infiltrating and stealing directly from more than 100 different banks. Kaspersky named the operation as the Carbanak APT.

Carbanak was estimated to have earned a total of $250 million over years of use which is considered as the most successful financial cybercrimes in history.

Banking networks have highly secure internal processes, software and systems. Infiltrating and stealing in such a convolution would seem to be very complicated. However, Carbanak is not some autonomous bit of code running on its own, in fact it is a vehicle for a remote human attacker to watch, learn and remotely drive the attack. With the application of this approach, hackers were able to assimilate the knowledge of the infected user and apply that information for further attack.

After successfully infecting a bank employee’s computer, the attackers patiently listened and learned. The employee’s desktop display had been recorded by the Carbanak malware and it also sent video to the remote attacker. The desktop display video allowed attacker to watch an employee and learn the internal processes of the bank. It empowers them to incessant attack. The attackers didn’t need prior knowledge of the victim network. They had enough time to learn and plan their next steps.

The attacker used their approach according to the infected user’s role. In some cases, the attacker subverted the bank’s ATM network to force cash machines to dispense money on command. In other cases, the attacker altered a banking database to add money to an account that would later be transferred out to the attacker.

 In all cases, the attacker learned what access the user of an infected computer had within in the network and used their access to steal money from the bank. In fact, the outside attacker became a malicious insider by using credentialed access and confidential knowledge of the banks business processes.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...