Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Ray Bryant, Idappcom: Extra security needed as hackers repurpose ZeuS to target business bank accounts

November 2010 by Ray Bryant, Idappcom

A report on the Associated Press, which goes into some detail about a string of real-world bank account draining sessions by hackers, highlights the fact that hackers are repurposing the ZeuS trojan to target business bank account users.

And the reason for this diversification, says Idappcom, the vulnerability testing specialist, is that business bank accounts tend to have higher bank balances, as well as having several people – and therefore several sets of user credentials - to access the account online within a given business.

"Ever since ZeuS first appeared back in the summer of 2007, we have been tracking its steady progress, especially since the trojan horse was successfully modified in the spring of last year, when hackers discovered they could extend the malware’s functionality through the use of extensible code and scripting," said Ray Bryant, Idappcom’s CEO.

"And now, as the AP newswire report of Monday shows, a number of US firms are discovering - to their cost - that the malware is still very much alive and kicking, and has drained their bank accounts of several hundreds of thousands of dollars," he added.

According to the Idappcom CEO, organisations as diverse as Detroit-based Experi-Metal and the Catholic Diocese in Des Moines, Iowa, are reported to have lost $1.14 million between them.

The roll call of business banking horror doesn’t end there, as the AP newswire notes that FBI has uncovered dozens of private and public sector organisations that have had their bank account contents siphoned off to so-called money mule bank accounts around the world.

These bank account mules, says Bryant, are often blissfully unaware that their accounts are being used for criminal purposes, and, on receipt of an email or text message from their `employer,’ wire the bulk of the money onwards to the criminal’s bank accounts, leaving them with their `commission.’

The FBI statistics are breath taking in terms of their diversity and the volume of money being hoovered up from business bank accounts, with 390 reported cases in the last two years, centering on attempted thefts of $220 million and actual losses of $70 million.

Bryant says that these cases - more than one every 48 hours - are just those that have been reported in the US and are almost certainly the tip of the iceberg in terms of business bank account losses.

"And as the AP newswire says, quite correctly, with the Automated Clearinghouse in the US processing an amazing 600 transactions per second, it’s almost impossible for the US banking agencies to monitor every transaction for fraud," he said.

"The big question, however, is for how long the banks and insurance companies will continue to reimburse losses due to ZeuS trojan activity, as the losses involved are bound to have had a negative effect on business insurance rates these last two years," he added.

"Businesses, as well as consumers, need to be ultra-vigilant when accessing their bank accounts online, and take every security precaution possible."

For more on the FBI ZeuS-driven fraud revelations: http://wapo.st/aWkLIE




See previous articles

    

See next articles