A banking Malware has been detected which is termed as Carbanak APT

Cybercriminals have been involved in the financial sector for many years to carry out activities like infecting banking customer’s computers and either stealing passwords or manipulating online banking sessions to steal funds.

A recent report from Kaspersky Lab reveals that criminals have significantly raised their potential focused on infiltrating and stealing directly from more than 100 different banks. Kaspersky named the operation as the Carbanak APT.

Carbanak was estimated to have earned a total of $250 million over years of use which is considered as the most successful financial cybercrimes in history.

Banking networks have highly secure internal processes, software and systems. Infiltrating and stealing in such a convolution would seem to be very complicated. However, Carbanak is not some autonomous bit of code running on its own, in fact it is a vehicle for a remote human attacker to watch, learn and remotely drive the attack. With the application of this approach, hackers were able to assimilate the knowledge of the infected user and apply that information for further attack.

After successfully infecting a bank employee’s computer, the attackers patiently listened and learned. The employee’s desktop display had been recorded by the Carbanak malware and it also sent video to the remote attacker. The desktop display video allowed attacker to watch an employee and learn the internal processes of the bank. It empowers them to incessant attack. The attackers didn’t need prior knowledge of the victim network. They had enough time to learn and plan their next steps.

The attacker used their approach according to the infected user’s role. In some cases, the attacker subverted the bank’s ATM network to force cash machines to dispense money on command. In other cases, the attacker altered a banking database to add money to an account that would later be transferred out to the attacker.

 In all cases, the attacker learned what access the user of an infected computer had within in the network and used their access to steal money from the bank. In fact, the outside attacker became a malicious insider by using credentialed access and confidential knowledge of the banks business processes.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Why You Need a Disaster Recovery Plan (DRP)

Although an apocalyptic IT network disaster may be unthinkable, a company should plan for its eventual occurrence and remediation. Sooner or later, catastrophe will...

Access Target’s Webcam, Microphone, Device location, and more

Cybercriminals and black hat hackers exploit system vulnerabilities and human weaknesses as well. This hacking tutorial discusses how a malicious actor can access any...

The Benefits of Automated Penetration Testing

Penetration testing has been one of the industries that are relatively slow adopters of automation. As security firms started automating many parts of the...

Wii Features That We Loved The Most and Would Like to See on Other Consoles

The Wii was released in the US on November 19, 2006, for $249 and is the smallest of the 7th generation consoles. Its dimensions...