Technology penetration has borne techie bank robbers

Written by
  • 4 years ago
  • Posted: February 8, 2016 at 9:51 pm

Bank robbers; Metel and GCMAN are now using their techie skills to rob banks.  They attack financial organisations using covert APT-style reconnaissance and customised malware along with legitimate software and new, innovative schemes to cash out.

Global Research and Analysis Team made this announcement at the Kaspersky Security Analyst Summit (SAS), an annual event connecting anti-malware researchers and developers, global law enforcement agencies and CERTs and members of the security research community.

The Metel bank robbers has lots of tricks in its playbook but is particularly interesting because of a remarkably clever scheme: by gaining control over machines inside a bank that have access to money transactions (e.g. the bank’s call centre / support computers) the gang can automate the rollback of ATM transactions.

The rollback capability ensures that the balance on debit cards remains the same regardless of the number of ATM transactions undertaken. In the examples observed to date, the bank robbers steal money by driving around cities in Russia at night and emptying ATM machines belonging to a number of banks, repeatedly using the same debit cards issued by the compromised bank. In the space of just one night they manage to cash out.

“Nowadays, the active phase of a cyberattack is becoming shorter. When the attackers become skilled in a particular operation, it takes them just days or a week to take what they want and run,” commented Sergey Golovanov, Principal Security Researcher at Global Research & Analysis Team, Kaspersky Lab.

During the forensic investigation, Kaspersky Lab’s experts uncovered that Metel operators achieve their initial infection through specially crafted spear-phishing emails with malicious attachments, and through the Niteris exploit pack, targeting vulnerabilities in the victim’s browser. Once inside the network, the cybercriminals use legitimate and pentesting tools to move laterally, hijacking the local domain controller and eventually locating and gaining control over computers used by the bank’s employees responsible for payment card processing.

The Metel group remains active and the investigation into its activities is ongoing. So far no attacks outside Russia have been identified. Still, there are grounds to suspect that the infection is much more widespread, and banks around the world are advised to proactively check for infection.

All three of the gangs identified are shifting toward the use of malware accompanied by legitimate software in their fraudulent operations: why write a lot of custom malware tools, when legitimate utilities can be just as effective, and trigger far fewer alarms?

But in terms of stealthiness, the GCMAN actor goes even further: sometimes it can successfully attack an organisation without the use of any malware, running legitimate and pentesting tools only. In the cases Kaspersky Lab’s experts have investigated, we saw GCMAN using Putty, VNC, and Meterpreter utilities to move laterally through the network till the attackers reached a machine which could be used to transfer money to e-currency services without alerting other banking systems.

In one attack, the bank robbers stayed in the network for one-and-a-half years before activating the theft. Money was being transferred in sums of about $200, the upper limit for anonymous payments in Russia. Every minute, the CRON scheduler fired a malicious script, and another sum was transferred to an e-currency accounts belonging to a money mule. The transaction orders were sent directly to the bank’s upstream payment gateway and did not show up anywhere in the bank’s internal systems.

In 2015, the targets of Carbanak 2.0 are not only banks, but the budgeting and accounting departments of any organisation of interest. And in one example observed by Kaspersky Lab, the Carbanak 2.0 gang accessed a financial institution and proceeded to alter the credentials of ownership for a large company. The information was modified to name a money mule as a shareholder of the company, displaying their ID information.

“Attacks on financial institutions uncovered in 2015 indicate a worrying trend of cybercriminals aggressively embracing APT-style attacks. The Carbanak gang was just the first of many: cybercriminals now learn fast how to use new techniques in their operations, and we see more of them shifting from attacking users to attacking banks directly. Their logic is simple: that’s where the money is,” warns Sergey Golovanov.

What is your opinion on the topic?
Erick Vateta
Tech Editor at Kachwanya.com
---
Erick Vateta is a lawyer by training, poet, script and creative writer by talent, a model, and tech enthusiast. He covers International tech trends, data security and cyber attacks.
Erick Vateta on FacebookErick Vateta on Twitter
Article Categories:
TECH NEWS