Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Over a third of banking malware attacks in 2019 targeted corporate users – demonstrating the need for protection

April 2020 by Kaspersky

In 2019, 773,943 users of Kaspersky solutions were attacked by banking Trojans. Of those users, a third (35.1%) were in the corporate sector. This is among the findings from Kaspersky’s analysis of the financial threat landscape.

Banking Trojans or ‘bankers’ are one of the most widespread tools for cybercriminals as they focus on stealing money. Bankers usually search for users’ credentials for e-payment and online banking systems, hijacking one-time passwords, and then passing that data to the attackers.

A third of these attacks in 2019 targeted corporate users, an increase from the figure (24%-25%) that has remained fairly consistent for the previous three years. According to experts, the rationale of this is clear: attacks on the B2B sector could not only provide access to banking or payment system accounts, but, through employee exposure, could also compromise a company’s financial resources.
The collected data also shows that Russia held its position as the most targeted nation in 2019, accounting for more than 30% of global users attacked by banking malware. It is followed by Germany (with a share of over 7%) and China (more than 3%).

“While the overall number of attacks with bankers decreased in 2019, the growing interest for corporate users’ credentials indicates we are not yet seeing respite from financial threats. We therefore ask everyone to stay cautious when conducting financial operations online from PCs. While we are in the current peak of remote working during the coronavirus pandemic, it is especially important to not underestimate criminals’ desire for stealing money,” said Oleg Kupreev, security expert at Kaspersky.

The key findings of the report are:

Phishing:
 In 2019, the share of financial phishing increased from 44.7% of all phishing detections to 51.4%.
 Almost every third attempt to visit a phishing page blocked by Kaspersky products was related to banking phishing (27%).
 The share of phishing-related attacks on payment systems and online stores accounted for almost 17% and over 7.5% respectively in 2019. This is more or less the same as 2018 levels.
 The share of financial phishing encountered by Mac users fell slightly, accounting for 54%.

Banking malware (Windows):
 In 2019, the number of users attacked with banking Trojans was 773,943 – a decrease compared to the 889,452 attacked in 2018.
 35.1% of users attacked with banking malware were corporate users – an increase from 24.1% in 2018.
 Users in Russia, Germany, and China were attacked most frequently by banking malware.

Android banking malware:
 In 2019, the number of users that encountered Android banking malware dropped to just over 675,000 from around 1.8 million.
 Russia, South Africa, and Australia were the countries with the highest percentage of users attacked by Android banking malware.

Threats targeting businesses, such as banking Trojans and financial phishing, can and should be detected and blocked on a network level - even before they reach employee’s endpoints. In particular, the use of a secure internet gateway solution like Kaspersky Security for Internet Gateway, ensures secure internet traffic and transactions and prevents many types of malware and threats.

In addition to this, Kaspersky experts advise businesses take the following measures against financial threats:
 Invest in regular cybersecurity awareness training for employees to educate them not to click on links or open attachments received from untrusted sources. Conduct a simulated phishing attack to ensure that they know how to distinguish phishing emails.
 Leverage advanced detection and response technologies, such as Kaspersky Endpoint Detection and Response - part of the Threat Management and Defense solution. It makes it possible to catch even unknown banking malware and gives security operation teams full visibility over the network and response automation.
 Use mobile protection solutions or corporate internet traffic protection to ensure employees’ devices are not exposed to financial and other threats. The last one helps protect even those devices for which an anti-virus is not available
 Provide your security operation center team with access to Threat Intelligence so it remains up to date with the latest tactics and tools used by cybercriminals.

To learn more about financial phishing and the other findings from the report, Financial Cyberthreats in 2019, read our blogpost on Securelist.com


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts