Cybersecurity: The year in review, the year ahead

Cover art Erka Inciong

logo

Words by

In 2018, police arrested a number of well-known cybercrime group members responsible for infamous attacks on dozens, if not hundreds of companies and financial institutions around the world.

Unfortunately, the arrest of group members including the leader of Carbanak, did not lead to a complete halt in activities – in fact, it seemingly started the process of splitting the groups into smaller cells.

The most active actor of 2018 was Lazarus. This group is gradually expanding its arsenal of tools and looking for new targets. The area of interest today includes banks, fintech companies, crypto-exchanges, PoS (point-of-sale) terminals, ATMs, and in terms of geography, we have recorded infection attempts in dozens of countries, most of which are located in Asia, Africa and Latin America.

Before giving our forecasts for 2019, let’s see how accurate our forecasts for 2018 turned out to be:

  1. Attacks made through the underlying blockchain technologies of financial systems implemented by the financial institutions themselves – This did not happen in the financial field, but was seen in the online casino sector.
  2. More supply chain attacks in the financial world – Yes.
  3. Attacks on mass media (in general, including Twitter accounts, Facebook pages, telegram channels and more) including hacks and manipulation for getting financial profit through stock/crypto exchange trade – Yes.
  4. ATM malware automation – Yes. For example, there are malicious programs that immediately give money to attackers.
  5. More attacks on crypto exchange platforms – Yes.
  6. A spike in traditional card fraud due to the huge data breaches that happened in the previous year – No.
  7. More nation-state sponsored attacks against financial organizations – Yes.
  8. The inclusion of fintechs and mobile-only users in attacks: a fall in the number of traditional PC-oriented internet banking Trojans, with novice mobile banking users becoming the new prime target for criminals – Yes. In particular, some banking Trojans stopped attacking users of online banking on PCs, while the number of Trojans attacking users of mobile devices has more than doubled over the past year.

 

Predictions for 2019




 

The emergence of new groups due to the fragmentation of groups like Cobalt and Fin7

The arrest of leaders and separate members of major cybercrime groups has not stopped these groups from attacking financial institutions. Next year, we will most likely see the fragmentation of these groups and the creation of new ones by former members, which will lead to the intensification of attacks and the expansion of the geography of potential victims.

At the same time, local groups will expand their activities, increasing quality and scale. It is reasonable to assume that some members of the regional groups may contact former members of the Fin7 or Cobalt group to facilitate access to regional targets and gain new tools with which they can carry out attacks.

The first attacks through the theft and use of biometric data

Biometric systems for user identification and authentication are being gradually implemented by various financial institutions, and several major leaks of biometric data have already occurred. These two facts lay the foundation for the first POC (proof-of-concept) attacks on financial services using leaked biometric data.

The emergence of new local groups attacking financial institutions in the Indo-Pakistan region, South-East Asia, and Central Europe

The activity of cybercriminals in these regions is constantly growing. The immaturity of protective solutions in the financial sector and the rapid spread of various electronic means of payment among the population and companies in these regions are contributing to this. Now, all the prerequisites exist for the emergence of a new center for financial threats in Asia, in addition to the three already in Latin America, Korean Peninsula, and the ex-USSR.

Continuation of the supply-chain attacks: Attacks on small companies that provide their services to financial institutions around the world.

Attacks on software providers have proven effective and allowed attackers to gain access to several major targets. Small companies (that supply specialized financial services for the larger players) will be jeopardized first, such as the suppliers of money transfer systems, banks, and exchanges.

Traditional cybercrime will focus on the easiest targets and bypass anti-fraud solutions. Replacement of PoS (point-of-sale) attacks with attacks on systems accepting online payments

Next year, in terms of threats to ordinary users and stores, those who use cards without chips and do not use two-factor authorization of transactions will be the most at risk. The malicious community has focused on some simple goals that are easy to monetize. However, this does not mean that they do not use any complex techniques. For example, to bypass anti-fraud systems, they copy all computer and browser system settings.

On the other hand, this cybercriminal behavior will mean that the number of attacks on PoS terminals will decrease, and they will move towards attacks on online payment platforms instead.

The cybersecurity systems of financial institutions will be bypassed using physical devices connected to the internal network

Due to the lack of physical security and the lack of control over connected devices in many networks, cybercriminals will more actively exploit situations where a computer or mini-board can be installed, specifically configured to steal data from the network and transfer the information using 4G/LTE modems.

Attacks like this will provide cybergangs with an opportunity to access various data, including information about the customers of financial institutions, as well as the network infrastructure of financial institutions.

Attacks on mobile banking for business users

Mobile applications for business are gaining popularity, which is likely to lead to the first attacks on their users. There are enough tools for this, and the possible losses that businesses incur are much higher than the losses incurred when individuals are attacked. The most likely attack vectors are attacks at the Web API level and through the supply chain.

Advanced social engineering campaigns targeting operators, secretaries and other internal employees in charge of wires: result of data leaks

Social engineering is particularly popular in some regions, for example Latin America. Cybercriminals keep targeting specific people in companies and financial institutions to make them wire big sums of money. Due to high amount of data leakages previous years this type of attacks becomes more effective, since criminals are able to use leaked internal information about targeted organization to make their messages look absolutely legit.

The main idea remains the same: They make these targets believe that the financial request has come from business partners or directors. Like “simswaps”, these techniques use zero malware, but demonstrate how targeted social engineering gets results and will become more powerful in 2019.