CIP Cyber

A banking Malware has been detected which is termed as Carbanak APT

Table of Contents

Cybercriminals have been involved in the financial sector for many years to carry out activities like infecting banking customer’s computers and either stealing passwords or manipulating online banking sessions to steal funds.

A recent report from Kaspersky Lab reveals that criminals have significantly raised their potential focused on infiltrating and stealing directly from more than 100 different banks. Kaspersky named the operation as the Carbanak APT.

Carbanak was estimated to have earned a total of $250 million over years of use which is considered as the most successful financial cybercrimes in history.

Banking networks have highly secure internal processes, software and systems. Infiltrating and stealing in such a convolution would seem to be very complicated. However, Carbanak is not some autonomous bit of code running on its own, in fact it is a vehicle for a remote human attacker to watch, learn and remotely drive the attack. With the application of this approach, hackers were able to assimilate the knowledge of the infected user and apply that information for further attack.

After successfully infecting a bank employee’s computer, the attackers patiently listened and learned. The employee’s desktop display had been recorded by the Carbanak malware and it also sent video to the remote attacker. The desktop display video allowed attacker to watch an employee and learn the internal processes of the bank. It empowers them to incessant attack. The attackers didn’t need prior knowledge of the victim network. They had enough time to learn and plan their next steps.

The attacker used their approach according to the infected user’s role. In some cases, the attacker subverted the bank’s ATM network to force cash machines to dispense money on command. In other cases, the attacker altered a banking database to add money to an account that would later be transferred out to the attacker.

 In all cases, the attacker learned what access the user of an infected computer had within in the network and used their access to steal money from the bank. In fact, the outside attacker became a malicious insider by using credentialed access and confidential knowledge of the banks business processes.

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings