Cyberthieves loot SMBs, transfer millions to firms in China, FBI warns
More than $11M stolen from 20 businesses in past month
Computerworld - Some U.S. companies may unwittingly be helping to provide millions of dollars in illicit financing to businesses in China.
An alert (download PDF) from the FBI and the Financial Services Information Sharing and Analysis Center (FS-ISAC) this week warned small and midsize U.S. businesses to be on the lookout for online account takeovers and fraudulent Automated Clearing House (ACH) transactions.
The warning comes in the wake of a rash of recent incidents in which online bank accounts belonging to small and midsize businesses (SMB) were hijacked and money from them was stolen and transferred to accounts apparently held by several legitimate businesses in China's Heilongjiang province along the Russian border.
Between March and April, the FBI identified at least 20 incidents in which cybercriminals gained access to SMBs' banking credentials, such as usernames, passwords or authentication tokens, and used them to electronically wire money to accounts held by "Chinese economic and trade companies," the alert said.
The amounts of the illegal wire transfers have ranged from $50,000 to $985,000, with the majority involving sums of more than $900,000.
Many of the companies that have received the money are registered in port cities such as Raohe, Fuyuan, Jixi City, Xunke, Tongjiang and Dongning. The companies appear to be legitimately registered businesses and typically have accounts at the Agricultural Bank of China, the Industrial and Commercial Bank of China and the Bank of China, the alert said.
So far, the break-ins have siphoned $11 million out of SMB accounts. In all, the crooks have attempted to steal $20 million from SMBs in the past month, the alert warned.
Such online account takeovers are not new. The FBI, the FS-ISAC and NACHA, the body that oversees the ACH network, issued a similar warning in the fall of 2009.
At that time, the FBI said several new cases were reported weekly. In most instances, the crooks used sophisticated keystroke logging and Trojan horse programs to steal log-in credentials from company employees authorized to initiate funds transfers on behalf of their employers, the FBI noted in its 2009 alert.
The same warnings were repeated in this week's alert. The alert noted that the malware used in the recent attacks had not been identified in all cases, but at least some instances involved the ZeuS banking Trojan, the Backdoor.bot keylogger and Spybot, an IRC backdoor Trojan.
In addition, one victim reported being hit with malware that allowed hackers to completely erase the hard disk of the infected computer before any investigations could be done, the alert said.
The FBI alerts urged banks to notify customers if they notice any wire transfers destined for Raohe, Fuyuan, Jixi City, Xunke, Tongjiang or Dongning.
Avivah Litan, an analyst at Gartner, said banks need to do more to protect themselves from such attacks, especially since they are in a better position to tackle the problem.
"These attacks are using the same techniques that have been used for a couple of years against business bank accounts and more recently against enterprise systems and security companies," Litan said. "The attacks keep coming, because most banks have yet to build up sufficient defenses.
There has been speculation that the Federal Financial Institutions Examination Council (FFIEC), a standards-setting body for the financial services industry, could soon require banks to implement stronger forms of user authentication, but no action has been taken.
A Gartner survey conducted in February found that many banks continue to rely on "crude" security measures, such as cookies and secret questions, to protect online accounts, Litan said.
"Nearly two-thirds of the surveyed banks manage their fraud detection and customer authentication projects by committee, which means [security is] always someone else's responsibility. It should come as no surprise, then, that the attacks are succeeding."
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
Read more about Financial IT in Computerworld's Financial IT Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Something-something “LASER” something-something-something.
The MtGox Bitcoin exchange is bankrupt. Not a huge surprise, but insiders are also alleging chronic incompetence within the company, flowing from the CEO, Mark Karpeles. Supposed hackers have also leaked some PHP code that appears to substantiate those allegations. But could it all be an elaborate ruse to steal customers'
MtGox Co., Ltd. is now aiming for "civil rehabilitation" in a Tokyo District Court (similar to Chapter 11 bankruptcy protection in the U.S.).
In IT Blogwatch, bloggers release the frickin’ ill-tempered, mutated sea bass.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Accelerating Speed to Market in the Highly Competitive Automotive Industry
- This White Paper discusses how an Enterprise Project Portfolio Management solution optimizes project analysis, management, reporting and risk mitigation processes to accelerate new...
- ERP in the Cloud and the Modern Business
- View IDC's White Paper, to review IDC CloudTrack Survey findings, gain expert insight into the challenges and opportunities the cloud presents, and determine...
- Financial Security: What smaller Institutions can learn from DDoS attacks on big banks
- Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. JPMorgan Chase,...
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data... All Financial IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Financial IT Webcasts