WELCOME TO EHOST.COM.NP

Friday, April 28, 2017

$108m bank heist with no drill, gun or getaway car

ads space

Just one example of a scam email trying to trick internet users.

IMAGINE if it were possible to perform a $100 million bank heist without a drill, mask, gun or getaway car in sight.

This sort of crime is not only a very real threat, but is growing in popularity as criminals turn their attention from stealing the credentials of account holders to focus on the banks themselves.

The Annual Threat Report from Symantec highlights many instances of this type of cyber crime, with the most notorious of the past 12 months being the successful $A108 million heist from a Bangladesh Bank.

Hackers sent more than three dozen fraudulent money transfer requests to the Federal Reserve Bank of New York using credentials of Bangladesh Central Bank employees.

The scam resulted in millions of dollars being transferred to accounts in the Philippines, Sri Lanka and other parts of Asia.

Symantec security expert Nick Savvides said the attacks were a fascinating case study in cybercrime.

“Typically, banks have good security controls so the attackers have focused on stealing from their customers,” he told news.com.au.

“This attack needed detailed knowledge of the systems and processes used inside banks, the communication methods and the monitoring systems indicating a very skilled and well-resourced crime-group.

“In these attacks, the banks rather than their customers were the targets, using the SWIFT network that banks use to transfer money between themselves.”

The Symantec report also found for the first time that nation states appear to be involved in sophisticated cyber crime.

Just one example of a scam email trying to trick internet users.

Just one example of a scam email trying to trick internet users.Source:Supplied

“On analysing the tools used in the bank heists, they were found to be similar to the ones used by the Lazarus crime group the FBI has associated with North Korea,” he said.

“It’s the first time Symantec has seen a nation state turn to cybercrime for money, rather than for espionage or sabotage.

“It’s a worrying sign as government cyber teams are typically well resourced, have access to a wealth of information about their targets that comes from the other branches of their intelligence services.”

On a more personal level, email attacks are the highest they have been in five years, with one in every 121 emails containing a malicious link or attachment.

Mr Savvides said while it might seem easy to spot a nasty email, many consumers continue to fall victim to these attacks.

“The cyber-criminals wouldn’t use this method if it wasn’t successful and they are always improving the content of their emails to make them very convincing,” he said.

“For example, while many people have learned that the federal police will never send you a speeding fine by email, pretty much every Australian is buying goods online, so the fake invoice, fake delivery docket or parcel pick up emails can be very convincing.”

TIPS TO PROTECT YOURSELF

Change the default passwords on your devices and services: Use strong and unique passwords for computers, IoT devices and Wi-Fi networks. Don’t use common or easily guessable passwords such as “123456” or “password”.

Keep your operating system and software up to date: Software updates will frequently include patches for newly discovered security vulnerabilities that could be exploited by attackers.

Be extra careful on email: Email is one of the top infection methods. Delete any suspicious-looking email you receive, especially if they contain links and/or attachments. Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.

Back up your files: Backing up your data is the single most effective way of combating a ransomware infection. Attackers can have leverage over their victims by encrypting their files and leaving them inaccessible. If you have backup copies, you can restore your files once the infection has been cleaned up.

ads space
ADS SPACE

0 comments:

Post a Comment

Categories

Article How-to All Posts WordPress Android Web design Blogger Plugins CSS Google JQuery Plugins Programming Reviews Web Hosting Blogger Blogging Blogging Tips Tricks Web Development Facebook Git Internet Make Money Online Social Plugins Tips Tips and Tricks Tools Tutorials Windows WordPress Plugins Blogging Tips and Tricks Freebies GSM Google Analytics HTML How To's JavaScript Plugin Development S.E.O SEO SMS SmartPhone Social Media Tips amp; Tricks Top-Most Updates Webmaster Tools Whatsapp Applications Apps Blogger Basics Documentary Downloads Entertainment Gadgets Games Gmail Google AdSense Guest Post IPhone Make Money Blogging SVN Security Softwares Web Hosting Tips and Tricks Wordpress Tips Wordpress Tips and Tricks hostgator iOS Advertising Networks Advertising Technology Affiliates Antivirus Audience amp; Traffic Biography Blog post Blog post Blogger Blogger Errors Blogger Tips Blogger Tools Blogger Widget Blogosphere Bogger Widgets CSS selectors CSS symbols CSS3 Computer amp; Internet Content Writing Coupon Codes Data amp; Analytics Deleted blog Design DoubleClick for Publishers Email and newsletter marketting Email marketing Excel Tips Excel Tips and Tricks Facebook Tricks Feed Feedburner Feedburner subscribers Font Fun GitHub Giveaways Gmail primary inbox Gmail tabs Google sign-in Guides HTML amp; CSS HTML5 Infographics Inspirational Instagram Internet Marketing Internet Tips amp; Tricks Job Listings Knowledge Life Hacks Lists Make-Money Monetization amp; Conversion Monetize Navigation Online Marketing Other PHP Tutorials Passport Publishing amp; Content Quotes RSS Sidebar Smartphones Social Networking Status Tech Tech Blog Technology Telegram Themes UI / UX User Psychology amp; Research VB.Net Web Tools Web browser Widget Windows Tips Windows-10 ad viewability admin notice blogging tools bluehost cherry-pick clone cors custom scrollbar customizer dismissible notices duplicate post feed title git branch git clone gpg gpg2 hybridauth iPad icon font notice responsive wordpress theme same origin policy scrollbar signed git commit smartsvn theme customizer vcs wordpress theme wordpress themes

Blog Archive