A banking Malware has been detected which is termed as Carbanak APT

Cybercriminals have been involved in the financial sector for many years to carry out activities like infecting banking customer’s computers and either stealing passwords or manipulating online banking sessions to steal funds.

A recent report from Kaspersky Lab reveals that criminals have significantly raised their potential focused on infiltrating and stealing directly from more than 100 different banks. Kaspersky named the operation as the Carbanak APT.

Carbanak was estimated to have earned a total of $250 million over years of use which is considered as the most successful financial cybercrimes in history.

Banking networks have highly secure internal processes, software and systems. Infiltrating and stealing in such a convolution would seem to be very complicated. However, Carbanak is not some autonomous bit of code running on its own, in fact it is a vehicle for a remote human attacker to watch, learn and remotely drive the attack. With the application of this approach, hackers were able to assimilate the knowledge of the infected user and apply that information for further attack.

After successfully infecting a bank employee’s computer, the attackers patiently listened and learned. The employee’s desktop display had been recorded by the Carbanak malware and it also sent video to the remote attacker. The desktop display video allowed attacker to watch an employee and learn the internal processes of the bank. It empowers them to incessant attack. The attackers didn’t need prior knowledge of the victim network. They had enough time to learn and plan their next steps.

The attacker used their approach according to the infected user’s role. In some cases, the attacker subverted the bank’s ATM network to force cash machines to dispense money on command. In other cases, the attacker altered a banking database to add money to an account that would later be transferred out to the attacker.

 In all cases, the attacker learned what access the user of an infected computer had within in the network and used their access to steal money from the bank. In fact, the outside attacker became a malicious insider by using credentialed access and confidential knowledge of the banks business processes.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...