Minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface.
A powerful, easy-to-use search engine that combines structured technical data with content from the open, deep, and dark web.
Digital Risk Protection
Read our new practical guide to reducing digital risk.
New report recognizes Digital Shadows for strongest current offering, strategy, and market presence of 14 vendors profiled
Read Full Report
In our last blog, we highlighted how banking trojans are a threat to banking customers and small businesses, normally delivered via phishing emails containing malicious attachments. While phishing is a threat to businesses and individuals in all industries, attackers targeting financial services organizations often use highly-crafted social engineering tactics to make sure they hit their mark. In the third blog of the series, we’ll take a deeper look into the techniques used to phish financial organizations, as well as ways in which you can mitigate these attacks.
Phishing is a tactic where the attacker poses as a legitimate individual or service to gather sensitive information such as credentials or payment card information, or install malware on the target’s device. This is usually achieved either with an email containing a malicious attachment, or a URL link that will redirect the victim to a malicious domain where they will be asked to provide sensitive information or install plug-ins.
Email phishing campaigns can be wide and indiscriminate in their targeting, hoping that recipients will not recognise the fraudulent nature of the email. In many cases these emails are used to deliver malware such as the banking trojans.
Spear phishing is a form of phishing that targets a specific individual or organization. Frequently, the emails are tailored to the recipient to make it more believable. Two common types of spear phishing are:
An attacker will often spend considerable time investigating their target, so they can tailor the email to them and make it as compelling as possible. In recent years we’ve seen threat groups specializing in specific industries and geographies, resulting in a high level of sophistication in their attacks.
Let’s take the example of the Carbanak malware, which has been associated with several different campaigns against financial institutions, retail businesses, ATM systems and point-of-sale service providers. As the malware is in public circulation, it has been attributed to more than one group, including both the Carbanak group and FIN7. It’s unclear whether these groups are associated or simply share use of the malware and similar tools.
Operators of the Carbanak malware use social engineering techniques such as spear phishing in combination with malicious attachments containing the malware. When targeting financial companies, the emails are tailored to employees, appearing to have been written by native English speakers familiar with both investment terminology and the inner workings of public companies (see Figure 1 below). The emails frequently play up shareholder and public disclosure concerns.
Figure 1: Example of FIN7 phishing email (Source: FireEye)
Digital Shadows recently discovered files and source code that were allegedly related to the Carbanak group. Whatever the actual provenance of the leaked source code and files, these findings provided significant insights on how criminal groups target financial organizations with a level of sophistication that displays a strong understanding of the industry. The files not only contained the malware used to target the organizations, but also included detailed information on banking systems, instructions on how to make fraudulent payments and bypass anti-fraud features, and a list of key personnel responsible for payment processing in each of the target banks.
But how can attackers collect the information needed to learn about their targets and make their emails more believable? An open source investigation can provide a lot of information during the reconnaissance phase of the attack. An attacker will try to find any social media accounts pertaining to their victim(s), credentials found in past breaches, email and phone numbers in company material, personal addresses and emails linked to possible domains registered under the individual or provided in public company registries and assets under their name. The most sophisticated attackers, such as the Carbanak group, will often have contacts or insiders within financial organizations who can provide them with more specialized information or even privileged access to perform their operations.
The lack of technical background or unfamiliarity with financial services terminology is not a hindrance to someone who wants to perform a phishing attack. If the attacker cares about harvesting credentials and credit card information from opportunistic targets, ‘finesse’ and technical capability is not a primary requirement. In many criminal marketplaces, aspiring attackers can find listings for complete phishing pages, usually clones of known organizations, that anyone can buy along with instructions on how to use them (See Figures 2 and 3).
Figure 2: Listing offering phishing pages for sale (Source: n0va[.]shop)
Figure 3: Tutorial on how to create a phishing page (Source: xplace[.]com)
During a BEC, the attacker will impersonate a company executive and attempt to get an employee, customer or supplier to transfer funds or sensitive information to the phisher. A 2017 advisory from the Federal Bureau of Investigation’s (FBI) Internet Crimes Complaint Centre (IC3) reported that BEC attacks between October 2013 and December 2016 caused worldwide losses totalling over $5 billion. Recently, a six-month coordinated global law enforcement effort under the name “Operation Wire Wire” targeted business email compromise schemes, which resulted in 74 arrests.
Two highly publicized BEC attacks that hit the news in recent years are those that targeted Xoom and Scoular. Both are financial companies where spoofed emails were sent to their employees, resulting in transfers of millions of dollars to third party accounts. In Xoom’s case the emails targeted their finance department, while in Scoular’s the emails impersonated the company CEO. In some scenarios, if the attacker is familiar with the organization and its processes, they could also take advantage of real life events such as tax deadlines or impending financial deals to make their phishing attempt more believable.
Standard countermeasures such as anti-spam filters and anti-malware protections will usually filter out part of these types of scam emails; however, they are not fool-proof, especially against the most targeted attacks such as spear phishing and whaling. Organizations should therefore look to adopt a broader approach, which can include:
In our next blog of the threats to financial services series, we’ll cover everything you need to know about payment card fraud. Stay tuned.
To stay up to date with the latest Digital Shadows threat intelligence and news, subscribe to our threat intelligence emails here.