Story image

Report finds major banks under assault from stealth attacks

29 May 18

Despite significant investments in cybersecurity, financial institutions are still under fire from cyberattacks.

A new report from Carbon Black has found that cyberattacks in the financial services sector are increasing in sophistication to the point where they are now often undetectable, global, and instantaneous.

Carbon Black’s recent report collected responses from chief information security officers (CISOs) at 40 major financial institutions, including six of the top 10 global banks.

A number of staggering findings were revealed in ‘Modern bank heists: Cyberattacks and lateral movement in the financial sector’, including:

23 percent of respondents experienced counter incident response

“Cyber attacks have moved from burglary to home invasion over the past few years, and cyber criminals, aware that there are humans on the other end devised to detect and respond to their activities, are increasingly reacting and adapting to defenders’ response efforts,” says Carbon Black chief cybersecurity officer Tom Kellerman.

“This trend will continue unless organisations establish specific threat hunting teams. These threat hunters should employ both active measures (agents deployed to endpoints) as well as passive measures (netflow, packet capture appliances) to both anticipate and better defend their organisation’s weaknesses.”

90 percent were targeted by ransomware, while 8 percent experienced destructive attacks beyond ransomware

Kellerman says the overwhelming majority of CISOs experiencing ransomware attacks is undoubtedly a concerning statistic, but what is even more concerning is that one in ten encountered destructive attacks unrelated to ransomware, a trend that Carbon Black expects to continue as hackers become more punitive.

“From application attacks to fileless malware, destructive attacks enable cybercriminals to move freely and laterally within an organisation’s network and often go completely overlooked until it’s too late,” says Kellerman.

44 percent were concerned with the security posture of their technology service provider (TSP)

“TSPs are regularly targeted by cybercriminals, who have been slow to adopt ‘intrusion suppression’ technologies and thus have become the weak links in the financial sectors information supply chain,” says Kellerman.

“Biggest weaknesses include visibility and time to detection, resulting in cybercriminals ‘island hopping’. To solve for these weaknesses, TSPs must shift to the cloud to enable delivery of faster, more accurate protection.”

8 percent are seeing secondary command and control (C2)

According to Kellerman, breach detection systems are being overcome as attackers develop new methods to not only penetrate a system’s defences, but also to dwell a lot longer in an organisation’s environment through C2.

“This new stage in the cyber kill chain – what we call the ‘maintenance stage’ – gives no reason for attackers to ever leave once they infiltrate an organisation’s system,” says Kellerman.

“Cyber defence is evolving into a high-stakes game of digital chess, and this latest report offers clear evidence that the cybersecurity challenges facing financial institutions will only worsen. Taking a more proactive approach to defence through the establishment of a threat hunting and incident response team is imperative to stopping future attacks.”

How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."